Analysis

  • max time kernel
    122s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 18:04

General

  • Target

    6af64ff7415b4e3c22f384596a43b1c73e16d4416bbcb0ae3759f634da9b7b28.exe

  • Size

    2.7MB

  • MD5

    934eae31a727ec72c1d89b35c1dbf728

  • SHA1

    e28216880e9ccff789c0597975c8262ccdd01cce

  • SHA256

    6af64ff7415b4e3c22f384596a43b1c73e16d4416bbcb0ae3759f634da9b7b28

  • SHA512

    2d76942606a26d9b2eb986878c27ca575c88df7468c46271ee1519c2e798eee9ae8b0ad6af3be171d8f655d54e54cb4ec2eae3104fccb11c2b81c24eb1f2bc8e

  • SSDEEP

    49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTle0kDlQbWbpC4/oMk:Q+8X9G3vP3AMzCxltk

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 10 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6af64ff7415b4e3c22f384596a43b1c73e16d4416bbcb0ae3759f634da9b7b28.exe
    "C:\Users\Admin\AppData\Local\Temp\6af64ff7415b4e3c22f384596a43b1c73e16d4416bbcb0ae3759f634da9b7b28.exe"
    1⤵
      PID:3516
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4932
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:832
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3716
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:508
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2820
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:444
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SendNotifyMessage
      PID:400
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4636
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:5108
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3844
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3420
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:1980
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:2436
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
          PID:4332
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3532
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:1372
            • C:\Windows\system32\werfault.exe
              werfault.exe /hc /shared Global\68a9096913cd449cb6f1cc4ae36f834f /t 2768 /p 3720
              1⤵
                PID:3872

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                Filesize

                471B

                MD5

                976ce2c91cbe61b98378e8e5c5ba4d53

                SHA1

                45b3e1eabb4e759bf46ffeb8f9722077a0d62c72

                SHA256

                255f312d16d7d080cf1a97d4eb255c236c7eee6c059d732d970e3c05c07c158e

                SHA512

                0065b7984960354aea85cd0c6792e019f40a2b359fabf7dcee438193c1bab47d74d59602627c8399df741864dffb0469d9cf8bc48907c1c67015c51d01a7b28a

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                Filesize

                412B

                MD5

                7c0252afff2c59dd4a558107d27b3f15

                SHA1

                04aceb3fcfa7fa8b1f10252b985bb45de1c94881

                SHA256

                e198cc4889c6be2f21f4a741384d195a2f655e07a33996224d01d1f1931da7b4

                SHA512

                e577c27b013ea927c8573946c002cb062157ebe12de19bd32dd28c191225475372c0147799b0988add2edbff5f82b6cc839f2e19264ba0ebee02a7a5b9ff034a

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                Filesize

                96B

                MD5

                4114b63fafc98d9307dc8bfae1c379cd

                SHA1

                8959adf99facaf14c6be813470286c448b0e0b44

                SHA256

                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                SHA512

                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133415791635171201.txt

                Filesize

                75KB

                MD5

                62d81c2e1e8b21733f95af2a596e4b18

                SHA1

                91c005ecc5ae4171f450c43c02d1ba532b4474c6

                SHA256

                a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                SHA512

                c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133415791635171201.txt

                Filesize

                75KB

                MD5

                62d81c2e1e8b21733f95af2a596e4b18

                SHA1

                91c005ecc5ae4171f450c43c02d1ba532b4474c6

                SHA256

                a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                SHA512

                c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                Filesize

                96B

                MD5

                4114b63fafc98d9307dc8bfae1c379cd

                SHA1

                8959adf99facaf14c6be813470286c448b0e0b44

                SHA256

                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                SHA512

                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                Filesize

                96B

                MD5

                4114b63fafc98d9307dc8bfae1c379cd

                SHA1

                8959adf99facaf14c6be813470286c448b0e0b44

                SHA256

                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                SHA512

                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                Filesize

                96B

                MD5

                4114b63fafc98d9307dc8bfae1c379cd

                SHA1

                8959adf99facaf14c6be813470286c448b0e0b44

                SHA256

                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                SHA512

                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

              • memory/400-34-0x00000000028F0000-0x00000000028F1000-memory.dmp

                Filesize

                4KB

              • memory/444-43-0x000001B61A6C0000-0x000001B61A6E0000-memory.dmp

                Filesize

                128KB

              • memory/444-54-0x000001B61A680000-0x000001B61A6A0000-memory.dmp

                Filesize

                128KB

              • memory/444-56-0x000001B61AB20000-0x000001B61AB40000-memory.dmp

                Filesize

                128KB

              • memory/3420-76-0x000001C5F6960000-0x000001C5F6980000-memory.dmp

                Filesize

                128KB

              • memory/3420-79-0x000001C5F6920000-0x000001C5F6940000-memory.dmp

                Filesize

                128KB

              • memory/3420-81-0x000001C5F6D30000-0x000001C5F6D50000-memory.dmp

                Filesize

                128KB

              • memory/3532-102-0x00000268EC3E0000-0x00000268EC400000-memory.dmp

                Filesize

                128KB

              • memory/3532-105-0x00000268ECAF0000-0x00000268ECB10000-memory.dmp

                Filesize

                128KB

              • memory/3532-100-0x00000268EC720000-0x00000268EC740000-memory.dmp

                Filesize

                128KB

              • memory/3716-11-0x000002059E520000-0x000002059E540000-memory.dmp

                Filesize

                128KB

              • memory/3716-13-0x000002059E1E0000-0x000002059E200000-memory.dmp

                Filesize

                128KB

              • memory/3716-15-0x000002059E8F0000-0x000002059E910000-memory.dmp

                Filesize

                128KB

              • memory/4332-93-0x0000000002940000-0x0000000002941000-memory.dmp

                Filesize

                4KB

              • memory/4932-4-0x00000000028B0000-0x00000000028B1000-memory.dmp

                Filesize

                4KB

              • memory/5108-68-0x0000000004350000-0x0000000004351000-memory.dmp

                Filesize

                4KB