Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 07:24
Behavioral task
behavioral1
Sample
9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe
Resource
win10v2004-20230915-en
General
-
Target
9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe
-
Size
3.9MB
-
MD5
a210ccf78e948bcb7d49eb48352a3e03
-
SHA1
08772750be2687ddb4c391ab9d7d32e3968ec1e6
-
SHA256
9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3
-
SHA512
9b984cb39a5cdc65fc6e20292c258f6c746de2b5072239e6f09d3aec8a2f202089db650c5c66f895a9d138aaf875761221163e3b65a033d281b11d86d356023d
-
SSDEEP
49152:wTGkQH5QZuTtS0rQMYOQ+q8PEDTG4QDTGHQI9KFeM3:wKkEWsM0r1QCsK4WKHn0Fe2
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\dGd77uUh.sys mcbuilder.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation 9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe -
Executes dropped EXE 2 IoCs
pid Process 3752 17898304 4852 mcbuilder.exe -
resource yara_rule behavioral2/memory/2848-0-0x0000000000180000-0x0000000000209000-memory.dmp upx behavioral2/files/0x0007000000023258-2.dat upx behavioral2/memory/3752-3-0x0000000000B10000-0x0000000000B99000-memory.dmp upx behavioral2/files/0x0007000000023258-4.dat upx behavioral2/memory/2848-34-0x0000000000180000-0x0000000000209000-memory.dmp upx behavioral2/memory/3752-37-0x0000000000B10000-0x0000000000B99000-memory.dmp upx behavioral2/memory/2848-44-0x0000000000180000-0x0000000000209000-memory.dmp upx behavioral2/memory/3752-73-0x0000000000B10000-0x0000000000B99000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\SysWOW64\17898304 9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DED9969D7ED2C6E555C5C9254A43EDE4 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE 17898304 File created C:\Windows\system32\ \Windows\System32\SwakA5kPb.sys mcbuilder.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content 17898304 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DED9969D7ED2C6E555C5C9254A43EDE4 17898304 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\403c50 17898304 File created C:\Windows\2gGNcJV.sys mcbuilder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 mcbuilder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 mcbuilder.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName mcbuilder.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3244 timeout.exe 5072 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\New Windows\Allow mcbuilder.exe Set value (data) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\www.hao774.com mcbuilder.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 17898304 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing 17898304 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 17898304 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 17898304 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 17898304 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 17898304 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 17898304 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 17898304 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 17898304 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3752 17898304 3164 Explorer.EXE 3164 Explorer.EXE 3164 Explorer.EXE 3164 Explorer.EXE 3752 17898304 3752 17898304 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3164 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2848 9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe Token: SeTcbPrivilege 2848 9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe Token: SeDebugPrivilege 3752 17898304 Token: SeTcbPrivilege 3752 17898304 Token: SeDebugPrivilege 3752 17898304 Token: SeDebugPrivilege 3164 Explorer.EXE Token: SeDebugPrivilege 3164 Explorer.EXE Token: SeIncBasePriorityPrivilege 2848 9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe Token: SeDebugPrivilege 3752 17898304 Token: SeDebugPrivilege 4852 mcbuilder.exe Token: SeDebugPrivilege 4852 mcbuilder.exe Token: SeDebugPrivilege 4852 mcbuilder.exe Token: SeShutdownPrivilege 3164 Explorer.EXE Token: SeCreatePagefilePrivilege 3164 Explorer.EXE Token: SeIncBasePriorityPrivilege 3752 17898304 Token: SeDebugPrivilege 4852 mcbuilder.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe 4852 mcbuilder.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4852 mcbuilder.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3164 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3752 wrote to memory of 3164 3752 17898304 30 PID 3752 wrote to memory of 3164 3752 17898304 30 PID 3752 wrote to memory of 3164 3752 17898304 30 PID 3752 wrote to memory of 3164 3752 17898304 30 PID 3752 wrote to memory of 3164 3752 17898304 30 PID 3164 wrote to memory of 4852 3164 Explorer.EXE 90 PID 3164 wrote to memory of 4852 3164 Explorer.EXE 90 PID 3164 wrote to memory of 4852 3164 Explorer.EXE 90 PID 3164 wrote to memory of 4852 3164 Explorer.EXE 90 PID 3164 wrote to memory of 4852 3164 Explorer.EXE 90 PID 3164 wrote to memory of 4852 3164 Explorer.EXE 90 PID 3164 wrote to memory of 4852 3164 Explorer.EXE 90 PID 3752 wrote to memory of 584 3752 17898304 3 PID 3752 wrote to memory of 584 3752 17898304 3 PID 3752 wrote to memory of 584 3752 17898304 3 PID 3752 wrote to memory of 584 3752 17898304 3 PID 3752 wrote to memory of 584 3752 17898304 3 PID 2848 wrote to memory of 3152 2848 9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe 95 PID 2848 wrote to memory of 3152 2848 9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe 95 PID 2848 wrote to memory of 3152 2848 9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe 95 PID 3152 wrote to memory of 5072 3152 cmd.exe 97 PID 3152 wrote to memory of 5072 3152 cmd.exe 97 PID 3152 wrote to memory of 5072 3152 cmd.exe 97 PID 3752 wrote to memory of 4272 3752 17898304 99 PID 3752 wrote to memory of 4272 3752 17898304 99 PID 3752 wrote to memory of 4272 3752 17898304 99 PID 4272 wrote to memory of 3244 4272 cmd.exe 101 PID 4272 wrote to memory of 3244 4272 cmd.exe 101 PID 4272 wrote to memory of 3244 4272 cmd.exe 101 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30 PID 4852 wrote to memory of 3164 4852 mcbuilder.exe 30
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:584
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe"C:\Users\Admin\AppData\Local\Temp\9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\9496334706480b9909d07a2bd70c336f037579c1ad8a4837fb53579fec7d36a3.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:5072
-
-
-
-
C:\ProgramData\Microsoft\mcbuilder.exe"C:\ProgramData\Microsoft\mcbuilder.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4852
-
-
C:\Windows\Syswow64\17898304C:\Windows\Syswow64\178983041⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\17898304"2⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:3244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD59ee06f45cf8d8154fa53bc0b0397e2d2
SHA12cd73f065f259027610bf59b4dd6448e90c5104a
SHA256b139d09d95e5a1de02a00324054fd3db7d7e874e881c2420441f2576496f8695
SHA51249666ef990d4a31b268fa7c7de8ac12cf0f8f00199fe982eecb92b190a55b8c0f33f1c6f806a1dbc8f167c5e5877a0c7adf2143006eb4c83cfdf71758f7e1820
-
Filesize
906B
MD5e29eb5a467704360d087e4940463769d
SHA199c37c9f9571757a93e2595ef775b7ccb5b7c3e5
SHA256e11533f9e5ca4664e331677cd1211c34c9533774bd16bc04e55657e5ea4537d4
SHA512f75c3b3f9c712b2a03683ae7369ed8bb3c111fab98724ed0cade0a92a4c4486f714b22a081a3bce17366e45e476c68962fb03426ac52a43137d9c2ddcd172036
-
Filesize
3.9MB
MD528c8391a453f42fafca43012c2e662ea
SHA1eb28ccc8815a298c37e159f8a75e5aafe563dcdd
SHA2565015eb65d51b79813d46790a8bcb1e147e1acd30df0cfe66fd5bd7e914404b1c
SHA5129c22521a4a060975e92b174dfa8d0f63db0658ef8239eb3ddd0af9b495e378fdbdaae7318b0194e22a78fc6dfa7d7c536506ff896c4b25122abaa8e1409d7382
-
Filesize
3.9MB
MD528c8391a453f42fafca43012c2e662ea
SHA1eb28ccc8815a298c37e159f8a75e5aafe563dcdd
SHA2565015eb65d51b79813d46790a8bcb1e147e1acd30df0cfe66fd5bd7e914404b1c
SHA5129c22521a4a060975e92b174dfa8d0f63db0658ef8239eb3ddd0af9b495e378fdbdaae7318b0194e22a78fc6dfa7d7c536506ff896c4b25122abaa8e1409d7382