Analysis
-
max time kernel
56s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
24a319fcbf79f0d9139360f9cb7597c0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24a319fcbf79f0d9139360f9cb7597c0.exe
Resource
win10v2004-20231215-en
General
-
Target
24a319fcbf79f0d9139360f9cb7597c0.exe
-
Size
264KB
-
MD5
24a319fcbf79f0d9139360f9cb7597c0
-
SHA1
d7c4f9653a43ebac593f83a3ae81c4bd0f10f20c
-
SHA256
5a12f278ee6012e3cbea77b08b5f1464cb6efa3b62973ef6bd8c5e99855fa5f1
-
SHA512
ffa6fbedf62178ca2e65d1ee740c524154bf71860ea7ff1c539d50935410d2c67c40e7565cf114a2c6428c78deb53c6e824931d8b109885e5555498e467c3b5e
-
SSDEEP
6144:qyYQ+Xjo57gHJ88xmeMZuQZFSP2Oix7+0iob5rEUo5XBzwNhrr2amwrexYm7xiBa:qXQM0clEFZuCFSvix7+0ffyRUNhrgwqr
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\KH47B897HL.exe = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\24a319fcbf79f0d9139360f9cb7597c0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\24a319fcbf79f0d9139360f9cb7597c0.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 24a319fcbf79f0d9139360f9cb7597c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe" 24a319fcbf79f0d9139360f9cb7597c0.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC94B5FB-CAFE-EFFC-4A2C-CDDAECD2BA2E}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe" 24a319fcbf79f0d9139360f9cb7597c0.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{BC94B5FB-CAFE-EFFC-4A2C-CDDAECD2BA2E} 24a319fcbf79f0d9139360f9cb7597c0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{BC94B5FB-CAFE-EFFC-4A2C-CDDAECD2BA2E}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe" 24a319fcbf79f0d9139360f9cb7597c0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC94B5FB-CAFE-EFFC-4A2C-CDDAECD2BA2E} 24a319fcbf79f0d9139360f9cb7597c0.exe -
resource yara_rule behavioral2/memory/4388-6-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-9-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-4-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-13-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-14-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-16-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-17-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-18-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-22-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-24-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-25-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-29-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4388-30-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe" 24a319fcbf79f0d9139360f9cb7597c0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe" 24a319fcbf79f0d9139360f9cb7597c0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1484 set thread context of 4388 1484 24a319fcbf79f0d9139360f9cb7597c0.exe 43 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3312 reg.exe 4796 reg.exe 4008 reg.exe 4452 reg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4388 24a319fcbf79f0d9139360f9cb7597c0.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeCreateTokenPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeAssignPrimaryTokenPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeLockMemoryPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeIncreaseQuotaPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeMachineAccountPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeTcbPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeSecurityPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeTakeOwnershipPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeLoadDriverPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeSystemProfilePrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeSystemtimePrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeProfSingleProcessPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeIncBasePriorityPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeCreatePagefilePrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeCreatePermanentPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeBackupPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeRestorePrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeShutdownPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeDebugPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeAuditPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeSystemEnvironmentPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeChangeNotifyPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeRemoteShutdownPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeUndockPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeSyncAgentPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeEnableDelegationPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeManageVolumePrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeImpersonatePrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: SeCreateGlobalPrivilege 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: 31 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: 32 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: 33 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: 34 4388 24a319fcbf79f0d9139360f9cb7597c0.exe Token: 35 4388 24a319fcbf79f0d9139360f9cb7597c0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1484 24a319fcbf79f0d9139360f9cb7597c0.exe 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 4388 24a319fcbf79f0d9139360f9cb7597c0.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1484 wrote to memory of 4388 1484 24a319fcbf79f0d9139360f9cb7597c0.exe 43 PID 1484 wrote to memory of 4388 1484 24a319fcbf79f0d9139360f9cb7597c0.exe 43 PID 1484 wrote to memory of 4388 1484 24a319fcbf79f0d9139360f9cb7597c0.exe 43 PID 1484 wrote to memory of 4388 1484 24a319fcbf79f0d9139360f9cb7597c0.exe 43 PID 1484 wrote to memory of 4388 1484 24a319fcbf79f0d9139360f9cb7597c0.exe 43 PID 1484 wrote to memory of 4388 1484 24a319fcbf79f0d9139360f9cb7597c0.exe 43 PID 1484 wrote to memory of 4388 1484 24a319fcbf79f0d9139360f9cb7597c0.exe 43 PID 1484 wrote to memory of 4388 1484 24a319fcbf79f0d9139360f9cb7597c0.exe 43 PID 4388 wrote to memory of 2460 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 55 PID 4388 wrote to memory of 2460 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 55 PID 4388 wrote to memory of 2460 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 55 PID 4388 wrote to memory of 2412 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 54 PID 4388 wrote to memory of 2412 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 54 PID 4388 wrote to memory of 2412 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 54 PID 4388 wrote to memory of 4380 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 53 PID 4388 wrote to memory of 4380 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 53 PID 4388 wrote to memory of 4380 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 53 PID 4388 wrote to memory of 4892 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 52 PID 4388 wrote to memory of 4892 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 52 PID 4388 wrote to memory of 4892 4388 24a319fcbf79f0d9139360f9cb7597c0.exe 52 PID 2412 wrote to memory of 4796 2412 cmd.exe 49 PID 2412 wrote to memory of 4796 2412 cmd.exe 49 PID 2412 wrote to memory of 4796 2412 cmd.exe 49 PID 4380 wrote to memory of 4452 4380 cmd.exe 47 PID 4380 wrote to memory of 4452 4380 cmd.exe 47 PID 4380 wrote to memory of 4452 4380 cmd.exe 47 PID 2460 wrote to memory of 3312 2460 cmd.exe 48 PID 2460 wrote to memory of 3312 2460 cmd.exe 48 PID 2460 wrote to memory of 3312 2460 cmd.exe 48 PID 4892 wrote to memory of 4008 4892 cmd.exe 46 PID 4892 wrote to memory of 4008 4892 cmd.exe 46 PID 4892 wrote to memory of 4008 4892 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\24a319fcbf79f0d9139360f9cb7597c0.exe"C:\Users\Admin\AppData\Local\Temp\24a319fcbf79f0d9139360f9cb7597c0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\24a319fcbf79f0d9139360f9cb7597c0.exe"C:\Users\Admin\AppData\Local\Temp\24a319fcbf79f0d9139360f9cb7597c0.exe"2⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\KH47B897HL.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\KH47B897HL.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4892
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4380
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\24a319fcbf79f0d9139360f9cb7597c0.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\24a319fcbf79f0d9139360f9cb7597c0.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2412
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2460
-
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\KH47B897HL.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\KH47B897HL.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:4008
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:4452
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:3312
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\24a319fcbf79f0d9139360f9cb7597c0.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\24a319fcbf79f0d9139360f9cb7597c0.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:4796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1