Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 09:58
Behavioral task
behavioral1
Sample
e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe
Resource
win10v2004-20220901-en
General
-
Target
e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe
-
Size
121KB
-
MD5
0d651f176a0f1b2659a0f6f578ceb1f1
-
SHA1
198b746ca2c0272e03717c52fe089716313ae62c
-
SHA256
e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66
-
SHA512
171f6d8c2fce3cdd4b59de425266e9770e0a248d9f7a39d201e341b86d02b6dcca20ba685450be3e3a45f67e5e1a300ed414166cbeadd189b545b630ce5cd44e
-
SSDEEP
3072:0tJ6Ypo3U3zGNCgDvKz1jYjfiS4dTCGv:m83iaCgDymP6Cc
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3040-132-0x0000000000400000-0x0000000000700000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run mspaint.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jumtmc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Jumtmc.exe" mspaint.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\D: mspaint.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\L: svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3040 set thread context of 5012 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 81 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{79C89B33-5EF2-11ED-A0EE-7ADCB3813C8F} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1315347330" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374628079" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30995199" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1315347330" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995199" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995199" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1320346382" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4964 mspaint.exe 4964 mspaint.exe 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2976 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe Token: SeDebugPrivilege 5028 svchost.exe Token: SeDebugPrivilege 4964 mspaint.exe Token: SeDebugPrivilege 3264 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4964 mspaint.exe 4964 mspaint.exe 4964 mspaint.exe 4964 mspaint.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 3264 IEXPLORE.EXE 3264 IEXPLORE.EXE 3264 IEXPLORE.EXE 3264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3040 wrote to memory of 5028 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 80 PID 3040 wrote to memory of 5028 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 80 PID 3040 wrote to memory of 5028 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 80 PID 3040 wrote to memory of 5028 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 80 PID 3040 wrote to memory of 5028 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 80 PID 3040 wrote to memory of 5028 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 80 PID 3040 wrote to memory of 5012 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 81 PID 3040 wrote to memory of 5012 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 81 PID 3040 wrote to memory of 5012 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 81 PID 3040 wrote to memory of 5012 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 81 PID 3040 wrote to memory of 5012 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 81 PID 3040 wrote to memory of 5012 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 81 PID 3040 wrote to memory of 5012 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 81 PID 3040 wrote to memory of 5012 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 81 PID 3040 wrote to memory of 5012 3040 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 81 PID 5028 wrote to memory of 4964 5028 svchost.exe 82 PID 5028 wrote to memory of 4964 5028 svchost.exe 82 PID 5028 wrote to memory of 4964 5028 svchost.exe 82 PID 5012 wrote to memory of 2076 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 86 PID 5012 wrote to memory of 2076 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 86 PID 5012 wrote to memory of 2076 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 86 PID 2076 wrote to memory of 2976 2076 iexplore.exe 87 PID 2076 wrote to memory of 2976 2076 iexplore.exe 87 PID 2976 wrote to memory of 3264 2976 IEXPLORE.EXE 88 PID 2976 wrote to memory of 3264 2976 IEXPLORE.EXE 88 PID 2976 wrote to memory of 3264 2976 IEXPLORE.EXE 88 PID 5012 wrote to memory of 5028 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 80 PID 5012 wrote to memory of 5028 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 80 PID 5012 wrote to memory of 4964 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 82 PID 5012 wrote to memory of 4964 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 82 PID 5012 wrote to memory of 3264 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 88 PID 5012 wrote to memory of 3264 5012 e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe"C:\Users\Admin\AppData\Local\Temp\e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe"C:\Users\Admin\AppData\Local\Temp\e036b18e95697132235622eb0d29f30257cc783105ce8e0e13ebe2204a106c66.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3264
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:3412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD55f49b65bdc1713b58ed97d0e9625a968
SHA184b74e55478c9abb163aa6629e3fd3b91bed4806
SHA256a681ab9abc281fd12a7bd06f56e36a21e8ee28b5294815c5e07b781e324a32f9
SHA5124b502288bef324db8ad33e63c7b6f242ef7954a6fbec3ed012530044c82fee3ad1158febe088bc0deea67ac35646a0a1bd6d961c0f67b11fee584e4f1abd753a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD57b8c42484a181162fddb763d68b6957a
SHA133ce18c4d5b6d97b6b4586f0253f53eba82e435c
SHA2567952ce69b40193154fd39d06828531ddb3a3dc7303745afb894920884c81a8c4
SHA512514928a588e93420fc432aa7cae6fea1d5d796c2ec5ee2aca3d05ab28cfc3bb87564d0655647c6eaae40e4320e3f51484b01340b6c34e04e98837b3ac469f14b