Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 07:25
Behavioral task
behavioral1
Sample
55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe
Resource
win10v2004-20230915-en
General
-
Target
55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe
-
Size
2.4MB
-
MD5
cdba0f463c3c17cb03b3469c0cebbcdf
-
SHA1
ed3d05d4a1833d6bc4fc2514dd6b1ca6f49581bd
-
SHA256
55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7
-
SHA512
f7bd544ed1325cb3754e9cbc3de0cb3c7a634157d780fc86956f292ec9d463f5afe0bf187c9235b69fc058eef2a4baf3791cc03f9e37b26c76bedc33eaaf24f4
-
SSDEEP
49152:is5SkP2lS1mdM03aT1PcXPwh11sXIAyT9tN93p:B5SQrWM03o1wPs1sByTJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe -
resource yara_rule behavioral2/memory/2820-0-0x0000000000940000-0x0000000000A7C000-memory.dmp upx behavioral2/memory/2820-2-0x0000000000940000-0x0000000000A7C000-memory.dmp upx behavioral2/memory/2820-3-0x0000000000940000-0x0000000000A7C000-memory.dmp upx behavioral2/memory/2820-38-0x0000000000940000-0x0000000000A7C000-memory.dmp upx behavioral2/memory/2820-39-0x0000000000940000-0x0000000000A7C000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\System32\bthpropsgek.sys expand.exe File created C:\Windows\System32\UtcManagedjiM6.sys expand.exe File created C:\Windows\System32\icaclsKBI.sys expand.exe File created C:\Windows\System32\C_G18030HL.sys expand.exe File created C:\Windows\System32\INETRESxDH.sys expand.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\WindowsShell56173.log 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe File opened for modification C:\Windows\WindowSystemNewUpdate748.log find.exe File opened for modification C:\Windows\WindowsShell4720524.log find.exe File opened for modification C:\Windows\WindowTerminalVaild800.log find.exe File opened for modification C:\Windows\WindowMicrosoftNET45.log find.exe File opened for modification C:\Windows\WindowRedSystem275.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 5100 find.exe 5100 find.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe 4928 expand.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe Token: SeDebugPrivilege 5100 find.exe Token: SeIncBasePriorityPrivilege 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe Token: SeDebugPrivilege 5100 find.exe Token: SeDebugPrivilege 5100 find.exe Token: SeDebugPrivilege 5100 find.exe Token: SeDebugPrivilege 5100 find.exe Token: SeDebugPrivilege 4928 expand.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2820 wrote to memory of 5100 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe 87 PID 2820 wrote to memory of 5100 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe 87 PID 2820 wrote to memory of 5100 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe 87 PID 2820 wrote to memory of 5100 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe 87 PID 2820 wrote to memory of 5100 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe 87 PID 2820 wrote to memory of 5100 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe 87 PID 2820 wrote to memory of 4880 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe 92 PID 2820 wrote to memory of 4880 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe 92 PID 2820 wrote to memory of 4880 2820 55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe 92 PID 5100 wrote to memory of 4804 5100 find.exe 101 PID 5100 wrote to memory of 4804 5100 find.exe 101 PID 5100 wrote to memory of 4804 5100 find.exe 101 PID 5100 wrote to memory of 4804 5100 find.exe 101 PID 5100 wrote to memory of 4804 5100 find.exe 101 PID 5100 wrote to memory of 4804 5100 find.exe 101 PID 4804 wrote to memory of 4928 4804 makecab.exe 103 PID 4804 wrote to memory of 4928 4804 makecab.exe 103 PID 4804 wrote to memory of 4928 4804 makecab.exe 103 PID 5100 wrote to memory of 4928 5100 find.exe 103 PID 5100 wrote to memory of 4928 5100 find.exe 103 PID 5100 wrote to memory of 4928 5100 find.exe 103 PID 5100 wrote to memory of 1324 5100 find.exe 74 PID 5100 wrote to memory of 1324 5100 find.exe 74 PID 5100 wrote to memory of 1324 5100 find.exe 74 PID 1324 wrote to memory of 1520 1324 svchost.exe 105 PID 1324 wrote to memory of 1520 1324 svchost.exe 105 PID 1324 wrote to memory of 1520 1324 svchost.exe 105 PID 5100 wrote to memory of 1520 5100 find.exe 105 PID 5100 wrote to memory of 1520 5100 find.exe 105 PID 5100 wrote to memory of 1520 5100 find.exe 105
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\CheckNetIsolation.exe"C:\Windows\SysWOW64\CheckNetIsolation.exe"2⤵PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe"C:\Users\Admin\AppData\Local\Temp\55005aceec6939133327c0cc3924880e7fde2fd785174e529e78425ea11aa0a7.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\find.exe"C:\Windows\SysWOW64\find.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\makecab.exe"C:\Windows\SysWOW64\makecab.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\expand.exe"C:\Windows\SysWOW64\expand.exe"4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\55005A~1.EXE > nul2⤵PID:4880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5def1008797a03eae11abac9599182d39
SHA1916ac79282ce53bd68037ef1e055910e514560d5
SHA256b646588a2e7219838bf957c145ea888d43905769b0c2423aa38e77be2af0a8dd
SHA512d6d5ff3f175b9c0caf018d59d2bb986b0eb8de60da87475941c26082ec3a8e7163c2a44757c34f24656210d21c77b76b1fe9ea5fa2a7ca90512a993b47231dfe
-
Filesize
6KB
MD5cd6a45cd87f819bcb8e7ba6da6c9bc09
SHA1b9cb688654030065a3cbfc7a1a5a73fc8beaa6b3
SHA2568e282d13f9151bd3c95709569a4ebde09ce5fd6816bad380c68eed711726468b
SHA51225e9cdceb9f12b35786325b811a000fd34b9fedf8d3e357e7e975fa13dc659087e097a8e7ee0cc594f04633bfb698c2c46004918e8621d49968950b0f72f3764