Analysis

  • max time kernel
    151s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2023 18:51

General

  • Target

    acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe

  • Size

    853KB

  • MD5

    dbf67f7f28604cab1644c0f6b7964a96

  • SHA1

    5e787962936e37a00826a4edae473e1cc8e7ace7

  • SHA256

    acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d

  • SHA512

    5675c7a947fce4cfb0d2601274a1691daa892996d5f5c52e15f6042d8aeda40f35d275a85c4d39bed1a29c20d45da36777064d3304eb294e8109c217681dce89

  • SSDEEP

    24576:/ifxgP1zXgMG1kT0Gqgr1iuXXABG8L4Yfs:6fxgP18rOvqgrZHj8LJs

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Program crash 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
    "C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
      C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • System policy modification
      PID:4876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 324
        3⤵
        • Program crash
        PID:5040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 668
        3⤵
        • Program crash
        PID:4316
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 792
        3⤵
        • Program crash
        PID:4120
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 800
        3⤵
        • Program crash
        PID:3884
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 928
        3⤵
        • Program crash
        PID:3268
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 968
        3⤵
        • Program crash
        PID:700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 964
        3⤵
        • Program crash
        PID:2268
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 1284
        3⤵
        • Program crash
        PID:3692
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4836 -ip 4836
    1⤵
      PID:3268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4876 -ip 4876
      1⤵
        PID:3472
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4876 -ip 4876
        1⤵
          PID:2716
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4876 -ip 4876
          1⤵
            PID:2520
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4876 -ip 4876
            1⤵
              PID:1248
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4876 -ip 4876
              1⤵
                PID:5008
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4876 -ip 4876
                1⤵
                  PID:1528
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4876 -ip 4876
                  1⤵
                    PID:1608
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4876 -ip 4876
                    1⤵
                      PID:4532
                    • C:\Windows\system32\sihost.exe
                      sihost.exe
                      1⤵
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:2112
                      • C:\Windows\explorer.exe
                        explorer.exe /LOADSAVEDWINDOWS
                        2⤵
                        • Modifies registry class
                        PID:3720
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                      • Modifies Installed Components in the registry
                      • Enumerates connected drives
                      • Checks SCSI registry key(s)
                      • Modifies Internet Explorer settings
                      • Modifies registry class
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of SetWindowsHookEx
                      PID:5000
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                      1⤵
                      • Suspicious behavior: AddClipboardFormatListener
                      PID:4428
                    • C:\Windows\System32\rundll32.exe
                      C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                      1⤵
                        PID:2180
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                        1⤵
                          PID:1156
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          PID:4336
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                          • Modifies Internet Explorer settings
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          PID:760
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                          • Modifies Internet Explorer settings
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          PID:2992
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                          • Modifies Internet Explorer settings
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          PID:2340
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:4128

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                            Filesize

                            96B

                            MD5

                            da2f6534a0b18d822eafa495c037a7f4

                            SHA1

                            9a5ee14946c817ab6739bed1e22b2b5cfe742802

                            SHA256

                            e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                            SHA512

                            d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133444617521897456.txt

                            Filesize

                            74KB

                            MD5

                            0770cd8fe6784708d08860d93a5cb762

                            SHA1

                            ec3a74a70a55ac4e73f6ccaf01a7f4b86ca45cf8

                            SHA256

                            77c4ad43697c8de81a391a842311a1331fb37da159dcfe94eaa23e193479b1c2

                            SHA512

                            40c0c9f1e3a29320f68248439afe28ab00eef45b3dfbb9a3cc743a2f83374e6c2e8f36c57131a2c1b840c9f99b6c58b29f40ed453b03cd16607745fedae8e511

                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                            Filesize

                            96B

                            MD5

                            da2f6534a0b18d822eafa495c037a7f4

                            SHA1

                            9a5ee14946c817ab6739bed1e22b2b5cfe742802

                            SHA256

                            e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                            SHA512

                            d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                            Filesize

                            96B

                            MD5

                            da2f6534a0b18d822eafa495c037a7f4

                            SHA1

                            9a5ee14946c817ab6739bed1e22b2b5cfe742802

                            SHA256

                            e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                            SHA512

                            d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                            Filesize

                            96B

                            MD5

                            da2f6534a0b18d822eafa495c037a7f4

                            SHA1

                            9a5ee14946c817ab6739bed1e22b2b5cfe742802

                            SHA256

                            e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                            SHA512

                            d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                          • C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe

                            Filesize

                            853KB

                            MD5

                            c7b2678e05a84770b337fda1746200a1

                            SHA1

                            69373178d3e1b2ede4c42389c6713b2162eef1c2

                            SHA256

                            0d7eaa1cd5c40254d65df21d5f34fa91bc56e98fdd3f13d34104928be26b8375

                            SHA512

                            8129b20e698d8084f61e6193e3df5f19361d5055e26bf5b316eb53af4328a9a382c13abf1dd3fcb9e716480911d84945083d126c9307e3e7ce676f3fda3d2689

                          • memory/760-40-0x0000023D407E0000-0x0000023D40800000-memory.dmp

                            Filesize

                            128KB

                          • memory/760-44-0x0000023D40C30000-0x0000023D40C50000-memory.dmp

                            Filesize

                            128KB

                          • memory/760-38-0x0000023D40820000-0x0000023D40840000-memory.dmp

                            Filesize

                            128KB

                          • memory/2340-90-0x00000125B5A00000-0x00000125B5A20000-memory.dmp

                            Filesize

                            128KB

                          • memory/2340-88-0x00000125B5A40000-0x00000125B5A60000-memory.dmp

                            Filesize

                            128KB

                          • memory/2340-92-0x00000125B6080000-0x00000125B60A0000-memory.dmp

                            Filesize

                            128KB

                          • memory/2992-70-0x000002173A340000-0x000002173A360000-memory.dmp

                            Filesize

                            128KB

                          • memory/2992-73-0x000002173A300000-0x000002173A320000-memory.dmp

                            Filesize

                            128KB

                          • memory/2992-77-0x000002173A700000-0x000002173A720000-memory.dmp

                            Filesize

                            128KB

                          • memory/4128-113-0x000002CF64EB0000-0x000002CF64ED0000-memory.dmp

                            Filesize

                            128KB

                          • memory/4128-111-0x000002CF647A0000-0x000002CF647C0000-memory.dmp

                            Filesize

                            128KB

                          • memory/4128-108-0x000002CF647E0000-0x000002CF64800000-memory.dmp

                            Filesize

                            128KB

                          • memory/4836-0-0x0000000000400000-0x0000000000472000-memory.dmp

                            Filesize

                            456KB

                          • memory/4836-6-0x0000000000400000-0x0000000000472000-memory.dmp

                            Filesize

                            456KB

                          • memory/4876-23-0x0000000000400000-0x000000000045A000-memory.dmp

                            Filesize

                            360KB

                          • memory/4876-9-0x0000000000400000-0x000000000045A000-memory.dmp

                            Filesize

                            360KB

                          • memory/4876-7-0x0000000000400000-0x0000000000472000-memory.dmp

                            Filesize

                            456KB

                          • memory/4876-16-0x0000000000400000-0x000000000045A000-memory.dmp

                            Filesize

                            360KB

                          • memory/4876-8-0x0000000004F30000-0x0000000004FA2000-memory.dmp

                            Filesize

                            456KB

                          • memory/5000-52-0x0000000002200000-0x0000000002201000-memory.dmp

                            Filesize

                            4KB