Analysis
-
max time kernel
232s -
max time network
257s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:35
Static task
static1
Behavioral task
behavioral1
Sample
60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exe
Resource
win10v2004-20221111-en
General
-
Target
60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exe
-
Size
724KB
-
MD5
c147ba02443132bcacfc2ba4ffc9af3a
-
SHA1
8dbde866273a66ebe9670d6fb6f6a7eaa0405d62
-
SHA256
60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0
-
SHA512
a41e1ccb47e22269dbd91d6a0637280a62031f915192015cc8a44836b11444000315d88f4197f861a7d6a6c064295202dda05cdb38b83fe01160ee8271d1f116
-
SSDEEP
12288:aNIQAPGsAqY9IMVYd38sJdpQHlGlY8KfT4F4+CpENqTScb++ycb/l9TXQCrv:HPGSY91VwNJcFMqTePNqT7ZycbdVXlrv
Malware Config
Signatures
-
Processes:
Charles.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Charles.exe -
Executes dropped EXE 1 IoCs
Processes:
Charles.exepid process 1876 Charles.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Charles.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run Charles.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Charles = "\"C:\\Users\\Admin\\AppData\\Roaming\\Charles.exe\"" Charles.exe -
Processes:
Charles.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Charles.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Charles.exepid process 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe 1876 Charles.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exeCharles.exepid process 3672 60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exe 3672 60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exe 1876 Charles.exe 1876 Charles.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exeCharles.exedescription pid process target process PID 3672 wrote to memory of 1876 3672 60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exe Charles.exe PID 3672 wrote to memory of 1876 3672 60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exe Charles.exe PID 3672 wrote to memory of 1876 3672 60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exe Charles.exe PID 1876 wrote to memory of 5108 1876 Charles.exe schtasks.exe PID 1876 wrote to memory of 5108 1876 Charles.exe schtasks.exe PID 1876 wrote to memory of 5108 1876 Charles.exe schtasks.exe PID 1876 wrote to memory of 4712 1876 Charles.exe schtasks.exe PID 1876 wrote to memory of 4712 1876 Charles.exe schtasks.exe PID 1876 wrote to memory of 4712 1876 Charles.exe schtasks.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
Charles.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Charles.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Charles.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exe"C:\Users\Admin\AppData\Local\Temp\60111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Roaming\Charles.exeC:\Users\Admin\AppData\Roaming\Charles.exe2⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1876 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /TN GoogleUpdateTaskMachineCore /F3⤵PID:5108
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /TN GoogleUpdateTaskMachineUA /F3⤵PID:4712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Charles.exeFilesize
724KB
MD5c147ba02443132bcacfc2ba4ffc9af3a
SHA18dbde866273a66ebe9670d6fb6f6a7eaa0405d62
SHA25660111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0
SHA512a41e1ccb47e22269dbd91d6a0637280a62031f915192015cc8a44836b11444000315d88f4197f861a7d6a6c064295202dda05cdb38b83fe01160ee8271d1f116
-
C:\Users\Admin\AppData\Roaming\Charles.exeFilesize
724KB
MD5c147ba02443132bcacfc2ba4ffc9af3a
SHA18dbde866273a66ebe9670d6fb6f6a7eaa0405d62
SHA25660111203bea5231ae089cde35cb1da64af8df3a57b9893f0c6b3f1517d6b1da0
SHA512a41e1ccb47e22269dbd91d6a0637280a62031f915192015cc8a44836b11444000315d88f4197f861a7d6a6c064295202dda05cdb38b83fe01160ee8271d1f116
-
memory/1876-132-0x0000000000000000-mapping.dmp
-
memory/4712-136-0x0000000000000000-mapping.dmp
-
memory/5108-135-0x0000000000000000-mapping.dmp