Analysis

  • max time kernel
    151s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2023 11:55

General

  • Target

    36760031f32d49732c57b467815c5d813bebefb72cd5dc0a0bf6323d4c98841f.exe

  • Size

    3.1MB

  • MD5

    efda9415c7d2405599057b21fb7ceaf2

  • SHA1

    a3f761a171590454a74861a2b13f45d94a1cd686

  • SHA256

    36760031f32d49732c57b467815c5d813bebefb72cd5dc0a0bf6323d4c98841f

  • SHA512

    26489daca3272beaecce31ed76fe0cfe665b5285f1b7b7a09ba8d54c5a21e979999e6810e7f21b301f1ba5a7a6c980f85a3836ed2e8789508c3c3295e54a9f92

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTllmlrXpsj1wHd6l:c+8X9G3vP3AMalFsDl

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 11 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\36760031f32d49732c57b467815c5d813bebefb72cd5dc0a0bf6323d4c98841f.exe
    "C:\Users\Admin\AppData\Local\Temp\36760031f32d49732c57b467815c5d813bebefb72cd5dc0a0bf6323d4c98841f.exe"
    1⤵
      PID:1160
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3932
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1352
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:2756
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4088
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3900
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3308
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2188
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:440
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1764
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3872
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
        PID:3484

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TEK1SANF\microsoft.windows[1].xml

        Filesize

        97B

        MD5

        88e99175b1b7d310e0fbe53c60d388c3

        SHA1

        ac3c326df344a8240d9abf82eff3ef99eae6b430

        SHA256

        fea3a8d15530a744cbbd8c0b32672badcbd06fd19b2e311600c1bc016de37af2

        SHA512

        197b140abfc809b8da6348b2340ff93c06244a188f12ab0307877792597f36dbebc2c004ea1987c5b7dc5f9786f99a2201e655852c4e7ae6195400f1fe212154

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{0A6AC72E-ED8C-C16F-38B6-05831557CF24}

        Filesize

        36KB

        MD5

        8aaad0f4eb7d3c65f81c6e6b496ba889

        SHA1

        231237a501b9433c292991e4ec200b25c1589050

        SHA256

        813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

        SHA512

        1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_charmap_exe

        Filesize

        36KB

        MD5

        406347732c383e23c3b1af590a47bccd

        SHA1

        fae764f62a396f2503dd81eefd3c7f06a5fb8e5f

        SHA256

        e0a9f5c75706dc79a44d0c890c841b2b0b25af4ee60d0a16a7356b067210038e

        SHA512

        18905eaad8184bb3a7b0fe21ff37ed2ee72a3bd24bb90cbfcad222cf09e2fa74e886d5c687b21d81cd3aec1e6c05891c24f67a8f82bafd2aceb0e0dcb7672ce7

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133405485582625060.txt

        Filesize

        75KB

        MD5

        62d81c2e1e8b21733f95af2a596e4b18

        SHA1

        91c005ecc5ae4171f450c43c02d1ba532b4474c6

        SHA256

        a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

        SHA512

        c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133405485582625060.txt

        Filesize

        75KB

        MD5

        62d81c2e1e8b21733f95af2a596e4b18

        SHA1

        91c005ecc5ae4171f450c43c02d1ba532b4474c6

        SHA256

        a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

        SHA512

        c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TEK1SANF\microsoft.windows[1].xml

        Filesize

        97B

        MD5

        88e99175b1b7d310e0fbe53c60d388c3

        SHA1

        ac3c326df344a8240d9abf82eff3ef99eae6b430

        SHA256

        fea3a8d15530a744cbbd8c0b32672badcbd06fd19b2e311600c1bc016de37af2

        SHA512

        197b140abfc809b8da6348b2340ff93c06244a188f12ab0307877792597f36dbebc2c004ea1987c5b7dc5f9786f99a2201e655852c4e7ae6195400f1fe212154

      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TEK1SANF\microsoft.windows[1].xml

        Filesize

        97B

        MD5

        88e99175b1b7d310e0fbe53c60d388c3

        SHA1

        ac3c326df344a8240d9abf82eff3ef99eae6b430

        SHA256

        fea3a8d15530a744cbbd8c0b32672badcbd06fd19b2e311600c1bc016de37af2

        SHA512

        197b140abfc809b8da6348b2340ff93c06244a188f12ab0307877792597f36dbebc2c004ea1987c5b7dc5f9786f99a2201e655852c4e7ae6195400f1fe212154

      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TEK1SANF\microsoft.windows[1].xml

        Filesize

        97B

        MD5

        88e99175b1b7d310e0fbe53c60d388c3

        SHA1

        ac3c326df344a8240d9abf82eff3ef99eae6b430

        SHA256

        fea3a8d15530a744cbbd8c0b32672badcbd06fd19b2e311600c1bc016de37af2

        SHA512

        197b140abfc809b8da6348b2340ff93c06244a188f12ab0307877792597f36dbebc2c004ea1987c5b7dc5f9786f99a2201e655852c4e7ae6195400f1fe212154

      • memory/440-86-0x0000027AA3D60000-0x0000027AA3D80000-memory.dmp

        Filesize

        128KB

      • memory/440-90-0x0000027AA41F0000-0x0000027AA4210000-memory.dmp

        Filesize

        128KB

      • memory/440-88-0x0000027AA3D20000-0x0000027AA3D40000-memory.dmp

        Filesize

        128KB

      • memory/1764-110-0x0000021F72DB0000-0x0000021F72DD0000-memory.dmp

        Filesize

        128KB

      • memory/1764-113-0x0000021F72D70000-0x0000021F72D90000-memory.dmp

        Filesize

        128KB

      • memory/1764-117-0x0000021F73380000-0x0000021F733A0000-memory.dmp

        Filesize

        128KB

      • memory/2188-76-0x0000022D80430000-0x0000022D80450000-memory.dmp

        Filesize

        128KB

      • memory/2188-72-0x0000022D80020000-0x0000022D80040000-memory.dmp

        Filesize

        128KB

      • memory/2188-69-0x0000022D80060000-0x0000022D80080000-memory.dmp

        Filesize

        128KB

      • memory/3308-35-0x000002BA8FD80000-0x000002BA8FDA0000-memory.dmp

        Filesize

        128KB

      • memory/3308-33-0x000002BA8F8D0000-0x000002BA8F8F0000-memory.dmp

        Filesize

        128KB

      • memory/3308-31-0x000002BA8F910000-0x000002BA8F930000-memory.dmp

        Filesize

        128KB

      • memory/3872-126-0x0000018CF61C0000-0x0000018CF61E0000-memory.dmp

        Filesize

        128KB

      • memory/3872-129-0x0000018CF6180000-0x0000018CF61A0000-memory.dmp

        Filesize

        128KB

      • memory/3872-132-0x0000018CF67A0000-0x0000018CF67C0000-memory.dmp

        Filesize

        128KB

      • memory/3900-10-0x0000020996420000-0x0000020996440000-memory.dmp

        Filesize

        128KB

      • memory/3900-16-0x0000020996870000-0x0000020996890000-memory.dmp

        Filesize

        128KB

      • memory/3900-13-0x00000209963E0000-0x0000020996400000-memory.dmp

        Filesize

        128KB