Analysis

  • max time kernel
    114s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 09:00

General

  • Target

    8fa5da9c3bc742f840d8ea4e9f382ac0a94b2ff896f2fa4d5fb28c935c3dd325.exe

  • Size

    3.0MB

  • MD5

    fc00b4ee4cecdd5589ea07e7bc4167c6

  • SHA1

    8c2d43c8428a89617e7a06aa456ec311ce39474a

  • SHA256

    8fa5da9c3bc742f840d8ea4e9f382ac0a94b2ff896f2fa4d5fb28c935c3dd325

  • SHA512

    7ba9f6ba84e55ffd450fd15b2918f2b581e805a1975b869aef7db0d2aa150c2a6776325741cf1052d448641e1a5039439ee857c66a79b185318d133f78a9592f

  • SSDEEP

    49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlXx8dTjezHwSXRW:Q+8X9G3vP3AMdxCXkHwShW

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 12 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fa5da9c3bc742f840d8ea4e9f382ac0a94b2ff896f2fa4d5fb28c935c3dd325.exe
    "C:\Users\Admin\AppData\Local\Temp\8fa5da9c3bc742f840d8ea4e9f382ac0a94b2ff896f2fa4d5fb28c935c3dd325.exe"
    1⤵
      PID:1652
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4532
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2976
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4680
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3596
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:972
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4872
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2896
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1084
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:1944
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4228
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:1256
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3516
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4528
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:1084
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:3744
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:4440
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:4112
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:2948
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:4056
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:532
                • C:\Windows\system32\werfault.exe
                  werfault.exe /hc /shared Global\f8a4f6856aca43d9b723f314d1e6a74e /t 956 /p 3176
                  1⤵
                    PID:4780
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:3648
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:1408
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:4212
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:4412
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:2204

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                              Filesize

                              471B

                              MD5

                              0085711bef17acad9eacf0bbf9bf3906

                              SHA1

                              20041eb81473c406da0ebfd7717231c0852ba344

                              SHA256

                              98c31705ae2dbde79cc8916db28c40c875597004ae24d94ac42433e0989d70a1

                              SHA512

                              3354239703701d843124bc466fd9794dd65ed766e4a1df64f784250292be3f24239a9e7156738d07a1c12316952cc1ee71ae9feba9b8fdbfb545e273ae871a6e

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                              Filesize

                              412B

                              MD5

                              fc70f157e43d97992c9274fa23770db0

                              SHA1

                              66bf631edb50badc5fb819fea3a9e88e073a2373

                              SHA256

                              495513818253c4981f04193547aa70cd3ecc13d10ef734f942a4e8664c239ecb

                              SHA512

                              7572018791e61629004b5d2ad9b6ab60543ec40d590a61e87b5fc1872a7fc844c8e7a76a4ae5326b6929ed77a58bf5615db0fc0aca0d3ae10b9b471377ece81d

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                              Filesize

                              96B

                              MD5

                              4114b63fafc98d9307dc8bfae1c379cd

                              SHA1

                              8959adf99facaf14c6be813470286c448b0e0b44

                              SHA256

                              f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                              SHA512

                              51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133415047347660157.txt

                              Filesize

                              75KB

                              MD5

                              62d81c2e1e8b21733f95af2a596e4b18

                              SHA1

                              91c005ecc5ae4171f450c43c02d1ba532b4474c6

                              SHA256

                              a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                              SHA512

                              c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133415047499124911.txt

                              Filesize

                              75KB

                              MD5

                              62d81c2e1e8b21733f95af2a596e4b18

                              SHA1

                              91c005ecc5ae4171f450c43c02d1ba532b4474c6

                              SHA256

                              a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                              SHA512

                              c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                              Filesize

                              96B

                              MD5

                              4114b63fafc98d9307dc8bfae1c379cd

                              SHA1

                              8959adf99facaf14c6be813470286c448b0e0b44

                              SHA256

                              f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                              SHA512

                              51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                              Filesize

                              96B

                              MD5

                              4114b63fafc98d9307dc8bfae1c379cd

                              SHA1

                              8959adf99facaf14c6be813470286c448b0e0b44

                              SHA256

                              f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                              SHA512

                              51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                            • memory/1084-50-0x00000227A8CA0000-0x00000227A8CC0000-memory.dmp

                              Filesize

                              128KB

                            • memory/1084-53-0x00000227A92C0000-0x00000227A92E0000-memory.dmp

                              Filesize

                              128KB

                            • memory/1084-48-0x00000227A8CE0000-0x00000227A8D00000-memory.dmp

                              Filesize

                              128KB

                            • memory/1084-87-0x0000000004E70000-0x0000000004E71000-memory.dmp

                              Filesize

                              4KB

                            • memory/1256-64-0x0000000004840000-0x0000000004841000-memory.dmp

                              Filesize

                              4KB

                            • memory/4440-98-0x00000236517D0000-0x00000236517F0000-memory.dmp

                              Filesize

                              128KB

                            • memory/4440-95-0x0000023651A20000-0x0000023651A40000-memory.dmp

                              Filesize

                              128KB

                            • memory/4440-102-0x0000023651DE0000-0x0000023651E00000-memory.dmp

                              Filesize

                              128KB

                            • memory/4528-77-0x00000265872C0000-0x00000265872E0000-memory.dmp

                              Filesize

                              128KB

                            • memory/4528-75-0x0000026586CA0000-0x0000026586CC0000-memory.dmp

                              Filesize

                              128KB

                            • memory/4528-72-0x0000026586CE0000-0x0000026586D00000-memory.dmp

                              Filesize

                              128KB

                            • memory/4872-41-0x00000000040A0000-0x00000000040A1000-memory.dmp

                              Filesize

                              4KB