Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
29f18d1d43889dc0b8b3fcfee682430d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29f18d1d43889dc0b8b3fcfee682430d.exe
Resource
win10v2004-20231215-en
General
-
Target
29f18d1d43889dc0b8b3fcfee682430d.exe
-
Size
132KB
-
MD5
29f18d1d43889dc0b8b3fcfee682430d
-
SHA1
61fe80e1d5a4225d7a83acd391f0a16cfe5a6dab
-
SHA256
19f043aa966f13a29f9a860057fb2a290939f75115e9784989fcbe96ad9242cb
-
SHA512
dc6fd15227089b167e4cce123e5f582c4985ae32688d5483845b45cc3cd8a08b78f8b9375ec64d443a88411f903792a232ebae544381986138b7d2d9c87305a1
-
SSDEEP
3072:ZVVOY64v7jkfam1CXDDjtFCZaOKYZfG3QZuGc6O:ZVQY5vEb2DDjtlOzfYMh
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4464 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 ntfyapp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntfyapp = "C:\\Windows\\ntfyapp.exe" 29f18d1d43889dc0b8b3fcfee682430d.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\ntfyapp.exe 29f18d1d43889dc0b8b3fcfee682430d.exe File opened for modification C:\Windows\ntfyapp.exe 29f18d1d43889dc0b8b3fcfee682430d.exe File created C:\Windows\ntfyapp.config ntfyapp.exe File opened for modification C:\Windows\ntfyapp.config ntfyapp.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4328 wrote to memory of 2196 4328 29f18d1d43889dc0b8b3fcfee682430d.exe 89 PID 4328 wrote to memory of 2196 4328 29f18d1d43889dc0b8b3fcfee682430d.exe 89 PID 4328 wrote to memory of 2196 4328 29f18d1d43889dc0b8b3fcfee682430d.exe 89 PID 4328 wrote to memory of 4000 4328 29f18d1d43889dc0b8b3fcfee682430d.exe 90 PID 4328 wrote to memory of 4000 4328 29f18d1d43889dc0b8b3fcfee682430d.exe 90 PID 4328 wrote to memory of 4000 4328 29f18d1d43889dc0b8b3fcfee682430d.exe 90 PID 4328 wrote to memory of 2140 4328 29f18d1d43889dc0b8b3fcfee682430d.exe 92 PID 4328 wrote to memory of 2140 4328 29f18d1d43889dc0b8b3fcfee682430d.exe 92 PID 4328 wrote to memory of 2140 4328 29f18d1d43889dc0b8b3fcfee682430d.exe 92 PID 2140 wrote to memory of 4464 2140 ntfyapp.exe 94 PID 2140 wrote to memory of 4464 2140 ntfyapp.exe 94 PID 2140 wrote to memory of 4464 2140 ntfyapp.exe 94 PID 2196 wrote to memory of 3172 2196 w32tm.exe 96 PID 2196 wrote to memory of 3172 2196 w32tm.exe 96 PID 4000 wrote to memory of 2028 4000 w32tm.exe 97 PID 4000 wrote to memory of 2028 4000 w32tm.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\29f18d1d43889dc0b8b3fcfee682430d.exe"C:\Users\Admin\AppData\Local\Temp\29f18d1d43889dc0b8b3fcfee682430d.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\w32tm.exew32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov2⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\w32tm.exew32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov3⤵PID:3172
-
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /config /update2⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\system32\w32tm.exew32tm /config /update3⤵PID:2028
-
-
-
C:\Windows\ntfyapp.exe"C:\Windows\ntfyapp.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram "C:\Windows\ntfyapp.exe" enable3⤵
- Modifies Windows Firewall
PID:4464
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD55a44a93899fe75334f9c8c4a6e678a8e
SHA103ae59f6ecb527410035196623c62c77914dbf00
SHA2568e004b549fcb90d17e9364ae951fd345cd6e8c14081275cb6161836e298c72c1
SHA5125635b5c6ef7352c6767b19035c8c732652ec4cf2c1f5a1ccf0c3bea7da669ff9799e5550a496cd60923f9617a1b5040fa4e0db99e5eed90808754fd07529f365
-
Filesize
132KB
MD529f18d1d43889dc0b8b3fcfee682430d
SHA161fe80e1d5a4225d7a83acd391f0a16cfe5a6dab
SHA25619f043aa966f13a29f9a860057fb2a290939f75115e9784989fcbe96ad9242cb
SHA512dc6fd15227089b167e4cce123e5f582c4985ae32688d5483845b45cc3cd8a08b78f8b9375ec64d443a88411f903792a232ebae544381986138b7d2d9c87305a1