Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2023 11:06
Static task
static1
Behavioral task
behavioral1
Sample
b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe
Resource
win10v2004-20230220-en
General
-
Target
b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe
-
Size
7.0MB
-
MD5
ea1aededc8a182bb29ef29adc349451e
-
SHA1
4e2786e2b09ffce8585dde47e66f3fc567947b0e
-
SHA256
b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b
-
SHA512
16a2048e20abdbef0bc35c56f22c13abac139c4d09f73d67311819be0ac84bcc66ab94e5493ec61ec00341b63d71414787e0d79f3027ed6867dadff119980310
-
SSDEEP
98304:Hbbqjl0pzd20zdSe+lsPWF3A8Qa8XxIXJTsKCY/H8TP62nbxzLj8N2Es3pU:Q0NdLSe+lsuF3ATEJGY/czjb9a2EsW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exepid process 1836 WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows\CurrentVersion\Run b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3 = "C:\\ProgramData\\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3\\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exe" b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exedescription pid process target process PID 3032 wrote to memory of 1836 3032 b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exe PID 3032 wrote to memory of 1836 3032 b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe"C:\Users\Admin\AppData\Local\Temp\b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exeC:\ProgramData\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exeFilesize
757.0MB
MD579dd598609dfe928b7f3940cae592c01
SHA17f4e0280e3197a529c5e53a98adf2cf2e4c2b022
SHA256f849ccce87a1c759f4e4522909fc04d47ea6cf93f00a6a53aff5cba628cc7086
SHA51255d1b1deb528e26f3b02fdafee15dc4f73b52c791a2e766bfa54bcbdb2d3c40287dfada28b9f88202e7804169901b5eb6dcf22a0706857092e24aee06b3a26ff
-
C:\ProgramData\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exeFilesize
757.0MB
MD579dd598609dfe928b7f3940cae592c01
SHA17f4e0280e3197a529c5e53a98adf2cf2e4c2b022
SHA256f849ccce87a1c759f4e4522909fc04d47ea6cf93f00a6a53aff5cba628cc7086
SHA51255d1b1deb528e26f3b02fdafee15dc4f73b52c791a2e766bfa54bcbdb2d3c40287dfada28b9f88202e7804169901b5eb6dcf22a0706857092e24aee06b3a26ff
-
memory/1836-138-0x00007FF6E5750000-0x00007FF6E5E4E000-memory.dmpFilesize
7.0MB
-
memory/3032-133-0x00007FF7528E0000-0x00007FF752FDE000-memory.dmpFilesize
7.0MB