Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2023 01:41
Static task
static1
Behavioral task
behavioral1
Sample
Fgmre.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Fgmre.exe
Resource
win10v2004-20230831-en
General
-
Target
Fgmre.exe
-
Size
6.1MB
-
MD5
fab73af287c1c2d2c9f7eb56ae418c2a
-
SHA1
b9afbf362fd3a04290b37a2abafece67fba21b1b
-
SHA256
33d1fbfef24cf1945248cfdc35c9338aec58774838d2c8b16d7609e8badd60a3
-
SHA512
c5a5803b097509967ff09a401d4f8d055a837c66f4bb257576513519233b40890bb8663ce08eddead348dacdace3d1212e3522480fbd6fe3a5e909970f442bab
-
SSDEEP
98304:wVV8V0jkxwDuoUprzpnNHNVDNHVq4t2KsNStyoXpGQL4+bMzvIBkKAPLf:w7E0oCu9NtVJFRGQLcH
Malware Config
Extracted
bitrat
1.38
smgqnt3eixxksasu.xyz:1234
-
communication_password
30afda4853ef5b1bc36463ba95d84247
-
tor_process
tor
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
GF70e43mIRdB8ZgR.exepid process 2388 GF70e43mIRdB8ZgR.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Fgmre.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2415528079-3794552930-4264847036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\checkupdater = "C:\\Users\\Admin\\AppData\\Local\\checkupdater.exe" Fgmre.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
aspnet_compiler.exepid process 180 aspnet_compiler.exe 180 aspnet_compiler.exe 180 aspnet_compiler.exe 180 aspnet_compiler.exe 180 aspnet_compiler.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Fgmre.exedescription pid process target process PID 3300 set thread context of 180 3300 Fgmre.exe aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Fgmre.exepid process 3300 Fgmre.exe 3300 Fgmre.exe 3300 Fgmre.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
svchost.exeFgmre.exeaspnet_compiler.exedescription pid process Token: SeManageVolumePrivilege 2772 svchost.exe Token: SeDebugPrivilege 3300 Fgmre.exe Token: SeShutdownPrivilege 180 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
aspnet_compiler.exepid process 180 aspnet_compiler.exe 180 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Fgmre.exeaspnet_compiler.exedescription pid process target process PID 3300 wrote to memory of 3496 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 3496 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 3496 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 3300 wrote to memory of 180 3300 Fgmre.exe aspnet_compiler.exe PID 180 wrote to memory of 2388 180 aspnet_compiler.exe GF70e43mIRdB8ZgR.exe PID 180 wrote to memory of 2388 180 aspnet_compiler.exe GF70e43mIRdB8ZgR.exe PID 180 wrote to memory of 2388 180 aspnet_compiler.exe GF70e43mIRdB8ZgR.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fgmre.exe"C:\Users\Admin\AppData\Local\Temp\Fgmre.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵PID:3496
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Users\Admin\AppData\Local\Temp\GF70e43mIRdB8ZgR.exe"C:\Users\Admin\AppData\Local\Temp\GF70e43mIRdB8ZgR.exe"3⤵
- Executes dropped EXE
PID:2388
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4308
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfmFilesize
16KB
MD5b1247ef92503269c0965f5542bf92225
SHA191489c119f5cfd13bed7a6c91e295344933f8742
SHA2568d1d737c29ae6f346f83957fca60d6548f6c0464596bc253e7b52b1876de2999
SHA5128b84c0299fedb44c3da777d79859a6c241899e2b9c29bbb2e819159cb58e1d10f4372af9642756eadc61da6b32a4c6add2b2c8add63cb3ff13961fef95f8c6ab
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0XT81K5W\Fgmre[1].exeFilesize
6.1MB
MD5fab73af287c1c2d2c9f7eb56ae418c2a
SHA1b9afbf362fd3a04290b37a2abafece67fba21b1b
SHA25633d1fbfef24cf1945248cfdc35c9338aec58774838d2c8b16d7609e8badd60a3
SHA512c5a5803b097509967ff09a401d4f8d055a837c66f4bb257576513519233b40890bb8663ce08eddead348dacdace3d1212e3522480fbd6fe3a5e909970f442bab
-
C:\Users\Admin\AppData\Local\Temp\GF70e43mIRdB8ZgR.exeFilesize
6.1MB
MD5fab73af287c1c2d2c9f7eb56ae418c2a
SHA1b9afbf362fd3a04290b37a2abafece67fba21b1b
SHA25633d1fbfef24cf1945248cfdc35c9338aec58774838d2c8b16d7609e8badd60a3
SHA512c5a5803b097509967ff09a401d4f8d055a837c66f4bb257576513519233b40890bb8663ce08eddead348dacdace3d1212e3522480fbd6fe3a5e909970f442bab
-
C:\Users\Admin\AppData\Local\Temp\GF70e43mIRdB8ZgR.exeFilesize
6.1MB
MD5fab73af287c1c2d2c9f7eb56ae418c2a
SHA1b9afbf362fd3a04290b37a2abafece67fba21b1b
SHA25633d1fbfef24cf1945248cfdc35c9338aec58774838d2c8b16d7609e8badd60a3
SHA512c5a5803b097509967ff09a401d4f8d055a837c66f4bb257576513519233b40890bb8663ce08eddead348dacdace3d1212e3522480fbd6fe3a5e909970f442bab
-
memory/180-90-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-87-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-76-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-78-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-95-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-91-0x0000000075170000-0x00000000751A9000-memory.dmpFilesize
228KB
-
memory/180-79-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-89-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-88-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-81-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-86-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-85-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-84-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/180-83-0x0000000074DF0000-0x0000000074E29000-memory.dmpFilesize
228KB
-
memory/2388-120-0x0000000072A10000-0x00000000731C0000-memory.dmpFilesize
7.7MB
-
memory/2388-127-0x00000000059C0000-0x00000000059D0000-memory.dmpFilesize
64KB
-
memory/2388-126-0x0000000072A10000-0x00000000731C0000-memory.dmpFilesize
7.7MB
-
memory/2388-121-0x00000000059C0000-0x00000000059D0000-memory.dmpFilesize
64KB
-
memory/2772-42-0x00000188F8950000-0x00000188F8951000-memory.dmpFilesize
4KB
-
memory/2772-44-0x00000188F8950000-0x00000188F8951000-memory.dmpFilesize
4KB
-
memory/2772-69-0x00000188F86A0000-0x00000188F86A1000-memory.dmpFilesize
4KB
-
memory/2772-71-0x00000188F86B0000-0x00000188F86B1000-memory.dmpFilesize
4KB
-
memory/2772-72-0x00000188F86B0000-0x00000188F86B1000-memory.dmpFilesize
4KB
-
memory/2772-73-0x00000188F87C0000-0x00000188F87C1000-memory.dmpFilesize
4KB
-
memory/2772-5-0x00000188F0240000-0x00000188F0250000-memory.dmpFilesize
64KB
-
memory/2772-54-0x00000188F8560000-0x00000188F8561000-memory.dmpFilesize
4KB
-
memory/2772-51-0x00000188F8570000-0x00000188F8571000-memory.dmpFilesize
4KB
-
memory/2772-49-0x00000188F8560000-0x00000188F8561000-memory.dmpFilesize
4KB
-
memory/2772-21-0x00000188F0340000-0x00000188F0350000-memory.dmpFilesize
64KB
-
memory/2772-48-0x00000188F8570000-0x00000188F8571000-memory.dmpFilesize
4KB
-
memory/2772-47-0x00000188F8950000-0x00000188F8951000-memory.dmpFilesize
4KB
-
memory/2772-46-0x00000188F8950000-0x00000188F8951000-memory.dmpFilesize
4KB
-
memory/2772-45-0x00000188F8950000-0x00000188F8951000-memory.dmpFilesize
4KB
-
memory/2772-57-0x00000188F84A0000-0x00000188F84A1000-memory.dmpFilesize
4KB
-
memory/2772-43-0x00000188F8950000-0x00000188F8951000-memory.dmpFilesize
4KB
-
memory/2772-37-0x00000188F8920000-0x00000188F8921000-memory.dmpFilesize
4KB
-
memory/2772-41-0x00000188F8950000-0x00000188F8951000-memory.dmpFilesize
4KB
-
memory/2772-40-0x00000188F8950000-0x00000188F8951000-memory.dmpFilesize
4KB
-
memory/2772-39-0x00000188F8950000-0x00000188F8951000-memory.dmpFilesize
4KB
-
memory/2772-38-0x00000188F8950000-0x00000188F8951000-memory.dmpFilesize
4KB
-
memory/3300-0-0x0000000074EE0000-0x0000000075690000-memory.dmpFilesize
7.7MB
-
memory/3300-80-0x0000000074EE0000-0x0000000075690000-memory.dmpFilesize
7.7MB
-
memory/3300-74-0x0000000006180000-0x0000000006724000-memory.dmpFilesize
5.6MB
-
memory/3300-4-0x0000000005450000-0x0000000005460000-memory.dmpFilesize
64KB
-
memory/3300-3-0x0000000074EE0000-0x0000000075690000-memory.dmpFilesize
7.7MB
-
memory/3300-2-0x0000000005450000-0x0000000005460000-memory.dmpFilesize
64KB
-
memory/3300-1-0x00000000004F0000-0x0000000000B14000-memory.dmpFilesize
6.1MB