Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 09:09
Behavioral task
behavioral1
Sample
62765977c698cc28d25cce7a59c4f612.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
62765977c698cc28d25cce7a59c4f612.exe
Resource
win10v2004-20231222-en
General
-
Target
62765977c698cc28d25cce7a59c4f612.exe
-
Size
700KB
-
MD5
62765977c698cc28d25cce7a59c4f612
-
SHA1
124f59d1ba517200aef6fea8df8bc2d7aec1fd02
-
SHA256
23b2253631080c89ec207e5c58f807b9b5304edb21cad27a1e01cb69a43e6a14
-
SHA512
702e63d50990130852971349016bb112753eaedae47ab7503fa28b79b38b06009f317ee77c4d1d8ea250c561e5d6ac70ceb76201c8b393b6e428bce2eaa35dcb
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLPJv4RgeOFj+kkDzTI7UP+AoIio9xMpj6qd3RD0:tthEVaPqLPJvleOUbzT4U2HIiV6AO
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 464 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation hah.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2ca5ed51564c3c4743760e9065b29230.exe FlashPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2ca5ed51564c3c4743760e9065b29230.exe FlashPlayer.exe -
Executes dropped EXE 4 IoCs
pid Process 436 hh.exe 3896 hah.exe 1068 FlashPlayer.exe 4732 hh.exe -
resource yara_rule behavioral2/memory/4444-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4444-20-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2ca5ed51564c3c4743760e9065b29230 = "\"C:\\Users\\Admin\\AppData\\Roaming\\FlashPlayer.exe\" .." FlashPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2ca5ed51564c3c4743760e9065b29230 = "\"C:\\Users\\Admin\\AppData\\Roaming\\FlashPlayer.exe\" .." FlashPlayer.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4444-20-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 436 set thread context of 4732 436 hh.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 4732 hh.exe 4732 hh.exe 4732 hh.exe 4732 hh.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe 1068 FlashPlayer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 436 hh.exe Token: SeDebugPrivilege 1068 FlashPlayer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4444 62765977c698cc28d25cce7a59c4f612.exe 4444 62765977c698cc28d25cce7a59c4f612.exe 4444 62765977c698cc28d25cce7a59c4f612.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4444 62765977c698cc28d25cce7a59c4f612.exe 4444 62765977c698cc28d25cce7a59c4f612.exe 4444 62765977c698cc28d25cce7a59c4f612.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4444 wrote to memory of 436 4444 62765977c698cc28d25cce7a59c4f612.exe 89 PID 4444 wrote to memory of 436 4444 62765977c698cc28d25cce7a59c4f612.exe 89 PID 4444 wrote to memory of 436 4444 62765977c698cc28d25cce7a59c4f612.exe 89 PID 4444 wrote to memory of 3896 4444 62765977c698cc28d25cce7a59c4f612.exe 90 PID 4444 wrote to memory of 3896 4444 62765977c698cc28d25cce7a59c4f612.exe 90 PID 4444 wrote to memory of 3896 4444 62765977c698cc28d25cce7a59c4f612.exe 90 PID 3896 wrote to memory of 1068 3896 hah.exe 96 PID 3896 wrote to memory of 1068 3896 hah.exe 96 PID 3896 wrote to memory of 1068 3896 hah.exe 96 PID 1068 wrote to memory of 464 1068 FlashPlayer.exe 95 PID 1068 wrote to memory of 464 1068 FlashPlayer.exe 95 PID 1068 wrote to memory of 464 1068 FlashPlayer.exe 95 PID 436 wrote to memory of 4732 436 hh.exe 93 PID 436 wrote to memory of 4732 436 hh.exe 93 PID 436 wrote to memory of 4732 436 hh.exe 93 PID 436 wrote to memory of 4732 436 hh.exe 93 PID 436 wrote to memory of 4732 436 hh.exe 93 PID 436 wrote to memory of 4732 436 hh.exe 93 PID 4732 wrote to memory of 3492 4732 hh.exe 46 PID 4732 wrote to memory of 3492 4732 hh.exe 46 PID 4732 wrote to memory of 3492 4732 hh.exe 46 PID 4732 wrote to memory of 3492 4732 hh.exe 46
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\62765977c698cc28d25cce7a59c4f612.exe"C:\Users\Admin\AppData\Local\Temp\62765977c698cc28d25cce7a59c4f612.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp/hh.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732
-
-
-
C:\Users\Admin\AppData\Local\Temp\hah.exeC:\Users\Admin\AppData\Local\Temp/hah.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Roaming\FlashPlayer.exe"C:\Users\Admin\AppData\Roaming\FlashPlayer.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068
-
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\FlashPlayer.exe" "FlashPlayer.exe" ENABLE1⤵
- Modifies Windows Firewall
PID:464
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD50ce9160647d6f0a19f39100677ba4e6f
SHA17d07ad52a4d9699aa4792864b88bc5725385ea10
SHA25646bb4c85226783ebc68fca0186fe51b543a58a6a3f74af4baf8d81bec186ae5c
SHA5125f9bb6735c7b8e01202ca3e56c6c9b3b1e8cc8aa26352863b0595fb392cd1afc3487c577a99477bf911d1ad17443f76b1ab8223ce127972a2d0760f57069aa77
-
Filesize
24KB
MD5b3ea345b0f8d29a7ff069cbe9a5643f2
SHA16ff7707343bfc5d5b49e022470e458c18c8aa946
SHA256211e75c00eb5f7815c9c0af5ed67b46c549d9310bf6e8f345ba47fca3cf0bd6f
SHA512b2f3338e99525cf49b4da2bf3183c1cd9ba3bf019edfbe25648ed1aa6d7c42179e3d45cff8af3c18834c0d3f2e47505ea136ab2655bd7f32aa791f53a89980be
-
Filesize
275KB
MD518cdca566f260b8de7c6b1e547bc8f6d
SHA100e354ecd83351d37af45af2d51639d37f2c3a83
SHA256d6391cf80c3c5e78a15ae7a8a9de20b264a60a47ee2e0c1da62091be511dab30
SHA51222bea645daf9f7d3b038ccc834f8d4ef530e7f4923afb43801c23f21c672d22ea3ccea7c674d19ad9891446f2f16b84ece0dc7fa4160c2a3ca3b0df564349696
-
Filesize
225KB
MD546f895a980afa4872b6815d053265561
SHA1c360f25b2ceb7a7b64334b9e5436ffb0b0c87d76
SHA256e33bf14ff1a3a411ebe3de7875e269c435a98f553b1db265ce0f3ae1fad5f566
SHA512d108fc206dcd15ab138cee30786bcb980a871325fd888dc7ab29ee694dffba50808c86f0b2f9c52a5be1bb0496b3f39c553bdd94b6732d2cd839d3d6d70e2dcc