Analysis

  • max time kernel
    173s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 10:59

General

  • Target

    cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe

  • Size

    503KB

  • MD5

    aaf1572112e467c4667ab84bcdee33b2

  • SHA1

    a1b4610140a1901995bedacb82ac1392d0890067

  • SHA256

    cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1

  • SHA512

    3f86ed1eb5a123a93c789c6165784f92ddd389ff680e3b0d96a0d334e31650c7bf21bd2dd973c697446d83d02427aea729574a61e80ac787e574eef4d958b0c9

  • SSDEEP

    12288:mN7OjRhWIqHcFED5g3GrkppAkpmRhW3J8lBhZLTt2:eOllqHcCF2IHWZ8ltLTt2

Malware Config

Signatures

  • Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3412
    • C:\Windows\system32\backgroundTaskHost.exe
      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
      1⤵
        PID:628
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:4804
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3776
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:3488
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3336
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                  PID:3240
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                  1⤵
                    PID:404
                  • C:\Windows\Explorer.EXE
                    C:\Windows\Explorer.EXE
                    1⤵
                      PID:2552
                      • C:\Users\Admin\AppData\Local\Temp\cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe
                        "C:\Users\Admin\AppData\Local\Temp\cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe"
                        2⤵
                        • Suspicious use of SetThreadContext
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:4216
                        • C:\Users\Admin\AppData\Local\Temp\cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe
                          "C:\Users\Admin\AppData\Local\Temp\cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:220
                          • C:\Users\Admin\AppData\Roaming\Qiuxt\kaas.exe
                            "C:\Users\Admin\AppData\Roaming\Qiuxt\kaas.exe"
                            4⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:768
                            • C:\Users\Admin\AppData\Roaming\Qiuxt\kaas.exe
                              "C:\Users\Admin\AppData\Roaming\Qiuxt\kaas.exe"
                              5⤵
                              • Drops file in Drivers directory
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:1756
                              • C:\Windows\SYSTEM32\bcdedit.exe
                                bcdedit.exe -set TESTSIGNING ON
                                6⤵
                                • Modifies boot configuration data using bcdedit
                                PID:1288
                              • C:\Windows\SYSTEM32\bcdedit.exe
                                bcdedit.exe -set TESTSIGNING ON
                                6⤵
                                • Modifies boot configuration data using bcdedit
                                PID:5000
                              • C:\Windows\SYSTEM32\bcdedit.exe
                                bcdedit.exe -set TESTSIGNING ON
                                6⤵
                                • Modifies boot configuration data using bcdedit
                                PID:4184
                              • C:\Windows\SYSTEM32\bcdedit.exe
                                bcdedit.exe -set TESTSIGNING ON
                                6⤵
                                • Modifies boot configuration data using bcdedit
                                PID:2680
                              • C:\Windows\SYSTEM32\bcdedit.exe
                                bcdedit.exe -set TESTSIGNING ON
                                6⤵
                                • Modifies boot configuration data using bcdedit
                                PID:3640
                              • C:\Windows\SYSTEM32\bcdedit.exe
                                bcdedit.exe -set TESTSIGNING ON
                                6⤵
                                • Modifies boot configuration data using bcdedit
                                PID:1592
                              • C:\Windows\SYSTEM32\bcdedit.exe
                                bcdedit.exe -set TESTSIGNING ON
                                6⤵
                                • Modifies boot configuration data using bcdedit
                                PID:3532
                              • C:\Windows\SYSTEM32\bcdedit.exe
                                bcdedit.exe -set TESTSIGNING ON
                                6⤵
                                • Modifies boot configuration data using bcdedit
                                PID:4108
                              • C:\Windows\SYSTEM32\bcdedit.exe
                                bcdedit.exe -set TESTSIGNING ON
                                6⤵
                                • Modifies boot configuration data using bcdedit
                                PID:4116
                              • C:\Windows\SYSTEM32\bcdedit.exe
                                bcdedit.exe -set TESTSIGNING ON
                                6⤵
                                • Modifies boot configuration data using bcdedit
                                PID:396
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\JFNF894.bat"
                            4⤵
                              PID:5012
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        1⤵
                          PID:2912
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                          1⤵
                            PID:2760
                          • C:\Windows\system32\sihost.exe
                            sihost.exe
                            1⤵
                              PID:2632
                            • C:\Windows\system32\backgroundTaskHost.exe
                              "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                              1⤵
                                PID:4448
                              • C:\Windows\system32\backgroundTaskHost.exe
                                "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                1⤵
                                  PID:4140
                                • C:\Windows\system32\LogonUI.exe
                                  "LogonUI.exe" /flags:0x4 /state0:0xa39a2855 /state1:0x41c64e6d
                                  1⤵
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of SetWindowsHookEx
                                  PID:896

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\JFNF894.bat

                                  Filesize

                                  303B

                                  MD5

                                  9a1f52b5e2951ad3f973182f9e0d0e92

                                  SHA1

                                  1d95f7a92c0e1b7e9f7e87405703256b7ade76f7

                                  SHA256

                                  9d03f148587073ded6b54e08eee121dd2980208b79e85a934bfad63f05f95b0d

                                  SHA512

                                  e44270b40241729e930d29e243bb5caac90a4068d5eb3029b9b88aede8e46ef568629327a425bbde85f9c0ca0769f87611b67e7e5a172b8577526ffab8c46842

                                • C:\Users\Admin\AppData\Roaming\Qiuxt\kaas.exe

                                  Filesize

                                  503KB

                                  MD5

                                  1a0a58c64f798d4ad8df9004bd6607e6

                                  SHA1

                                  379213bfd251b1758f5cebfc30ea0da396dcffd5

                                  SHA256

                                  7caa45621094494a9df8ed1f4da334d6dcb67afea45500b2baad2e997c3b5059

                                  SHA512

                                  fb4eec9b1af9be190166eb270ebd314419794ce81aa3ec33bc57a788c2dc03e46ad6685228757eb615bb80d4817def6afebf6b6b5aa670de4498c99b163f4031

                                • C:\Users\Admin\AppData\Roaming\Qiuxt\kaas.exe

                                  Filesize

                                  503KB

                                  MD5

                                  1a0a58c64f798d4ad8df9004bd6607e6

                                  SHA1

                                  379213bfd251b1758f5cebfc30ea0da396dcffd5

                                  SHA256

                                  7caa45621094494a9df8ed1f4da334d6dcb67afea45500b2baad2e997c3b5059

                                  SHA512

                                  fb4eec9b1af9be190166eb270ebd314419794ce81aa3ec33bc57a788c2dc03e46ad6685228757eb615bb80d4817def6afebf6b6b5aa670de4498c99b163f4031

                                • C:\Users\Admin\AppData\Roaming\Qiuxt\kaas.exe

                                  Filesize

                                  503KB

                                  MD5

                                  1a0a58c64f798d4ad8df9004bd6607e6

                                  SHA1

                                  379213bfd251b1758f5cebfc30ea0da396dcffd5

                                  SHA256

                                  7caa45621094494a9df8ed1f4da334d6dcb67afea45500b2baad2e997c3b5059

                                  SHA512

                                  fb4eec9b1af9be190166eb270ebd314419794ce81aa3ec33bc57a788c2dc03e46ad6685228757eb615bb80d4817def6afebf6b6b5aa670de4498c99b163f4031

                                • memory/220-141-0x00000000021C0000-0x00000000021C6000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/220-139-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/220-140-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/220-142-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/220-155-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/220-138-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/220-137-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/220-136-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/220-135-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/220-134-0x0000000000000000-mapping.dmp

                                • memory/396-167-0x0000000000000000-mapping.dmp

                                • memory/768-143-0x0000000000000000-mapping.dmp

                                • memory/1288-157-0x0000000000000000-mapping.dmp

                                • memory/1592-163-0x0000000000000000-mapping.dmp

                                • memory/1756-151-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/1756-156-0x0000000000600000-0x0000000000606000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/1756-169-0x0000000000600000-0x0000000000606000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/1756-168-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/1756-148-0x0000000000000000-mapping.dmp

                                • memory/1756-152-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/1756-154-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/2680-160-0x0000000000000000-mapping.dmp

                                • memory/3532-164-0x0000000000000000-mapping.dmp

                                • memory/3640-161-0x0000000000000000-mapping.dmp

                                • memory/4108-165-0x0000000000000000-mapping.dmp

                                • memory/4116-166-0x0000000000000000-mapping.dmp

                                • memory/4184-159-0x0000000000000000-mapping.dmp

                                • memory/5000-158-0x0000000000000000-mapping.dmp

                                • memory/5012-153-0x0000000000000000-mapping.dmp