Analysis
-
max time kernel
139s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe
Resource
win10v2004-20230703-en
General
-
Target
vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe
-
Size
363KB
-
MD5
2c96fccde01969b176eb800cfb932175
-
SHA1
4eca90fe0816517426f20bc70be56ad4074e00d0
-
SHA256
d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d
-
SHA512
87aacc4bde8557ad1195372009d666e9910017e067eeea648241c6ac9c178e5f0c57f44eb49e19cb7bf5dc2d458d61a8244122fa9260f6868a00c938d03c54a6
-
SSDEEP
3072:eK/bIeQ4Crvgf7aSelKqDIvb3IdT55Bc5csmMf8bFJt4tEwBsmpczHp8d00UbU7P:eK5IrCkIv035EcfMUN42LLrCG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3428 Winp6FD.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\High Definition Audio Component = "\"C:\\Program Files (x86)\\Common Files\\Winp6FD.exe\"" vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Winp6FD.exe vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe File opened for modification C:\Program Files (x86)\Common Files\Winp6FD.exe vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 3428 Winp6FD.exe 3428 Winp6FD.exe 3428 Winp6FD.exe 3428 Winp6FD.exe 3428 Winp6FD.exe 3428 Winp6FD.exe 3428 Winp6FD.exe 3428 Winp6FD.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe Token: SeDebugPrivilege 3428 Winp6FD.exe Token: SeRestorePrivilege 4364 dw20.exe Token: SeBackupPrivilege 4364 dw20.exe Token: SeBackupPrivilege 4364 dw20.exe Token: SeBackupPrivilege 4364 dw20.exe Token: SeBackupPrivilege 4364 dw20.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3428 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 86 PID 4960 wrote to memory of 3428 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 86 PID 4960 wrote to memory of 3428 4960 vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe 86 PID 3428 wrote to memory of 4364 3428 Winp6FD.exe 89 PID 3428 wrote to memory of 4364 3428 Winp6FD.exe 89 PID 3428 wrote to memory of 4364 3428 Winp6FD.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe"C:\Users\Admin\AppData\Local\Temp\vt_d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files (x86)\Common Files\Winp6FD.exe"C:\Program Files (x86)\Common Files\Winp6FD.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 11603⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD52c96fccde01969b176eb800cfb932175
SHA14eca90fe0816517426f20bc70be56ad4074e00d0
SHA256d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d
SHA51287aacc4bde8557ad1195372009d666e9910017e067eeea648241c6ac9c178e5f0c57f44eb49e19cb7bf5dc2d458d61a8244122fa9260f6868a00c938d03c54a6
-
Filesize
363KB
MD52c96fccde01969b176eb800cfb932175
SHA14eca90fe0816517426f20bc70be56ad4074e00d0
SHA256d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d
SHA51287aacc4bde8557ad1195372009d666e9910017e067eeea648241c6ac9c178e5f0c57f44eb49e19cb7bf5dc2d458d61a8244122fa9260f6868a00c938d03c54a6
-
Filesize
363KB
MD52c96fccde01969b176eb800cfb932175
SHA14eca90fe0816517426f20bc70be56ad4074e00d0
SHA256d4ea39c5d5e521a3251696a89d5b9b4bfa3b95793dba4385d697c61ea08db07d
SHA51287aacc4bde8557ad1195372009d666e9910017e067eeea648241c6ac9c178e5f0c57f44eb49e19cb7bf5dc2d458d61a8244122fa9260f6868a00c938d03c54a6