Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
0a4d41d12926391b785b0086ee03440d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a4d41d12926391b785b0086ee03440d.exe
Resource
win10v2004-20231215-en
General
-
Target
0a4d41d12926391b785b0086ee03440d.exe
-
Size
432KB
-
MD5
0a4d41d12926391b785b0086ee03440d
-
SHA1
c99a8c4c3f54458ec180d00130851cd69078ce96
-
SHA256
ba77471fabb7172e44ed7f9fff65f75419cac8034b264e3e8c0a3ef759d06245
-
SHA512
966551f3ce21290b6e15beb85914b9ede9858c4eff9fce794cbb0eee489534e3932d6000847882790ff265caa0164d16517ab44b4756e267a0b55719470507e7
-
SSDEEP
6144:XXW2L8fcIRN5HcA4gy+DSrIpq3dJ+MYfn+aC1meyUGimMzAfABoU97:nL8kIRfyL2MYfW1meyUGpcAoBv7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" REG.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegSrvc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0a4d41d12926391b785b0086ee03440d.exe" 0a4d41d12926391b785b0086ee03440d.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\R: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\I: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\L: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\N: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\Q: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\S: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\T: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\E: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\G: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\W: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\O: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\P: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\V: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\X: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\H: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\M: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\U: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\Y: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\Z: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\J: 0a4d41d12926391b785b0086ee03440d.exe File opened (read-only) \??\K: 0a4d41d12926391b785b0086ee03440d.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 0a4d41d12926391b785b0086ee03440d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 0a4d41d12926391b785b0086ee03440d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 0a4d41d12926391b785b0086ee03440d.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2244 REG.exe 4316 REG.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4044 wrote to memory of 4316 4044 0a4d41d12926391b785b0086ee03440d.exe 87 PID 4044 wrote to memory of 4316 4044 0a4d41d12926391b785b0086ee03440d.exe 87 PID 4044 wrote to memory of 4316 4044 0a4d41d12926391b785b0086ee03440d.exe 87 PID 4044 wrote to memory of 2244 4044 0a4d41d12926391b785b0086ee03440d.exe 90 PID 4044 wrote to memory of 2244 4044 0a4d41d12926391b785b0086ee03440d.exe 90 PID 4044 wrote to memory of 2244 4044 0a4d41d12926391b785b0086ee03440d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a4d41d12926391b785b0086ee03440d.exe"C:\Users\Admin\AppData\Local\Temp\0a4d41d12926391b785b0086ee03440d.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\REG.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v SuperHidden /t REG_DWORD /d 0 /f2⤵
- Modifies registry key
PID:4316
-
-
C:\Windows\SysWOW64\REG.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v ShowSuperHidden /t REG_DWORD /d 0 /f2⤵
- Modifies visiblity of hidden/system files in Explorer
- Modifies registry key
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3