Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
fb3d344be065453c0cbe0d477b1c8fa8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fb3d344be065453c0cbe0d477b1c8fa8.exe
Resource
win10v2004-20231222-en
General
-
Target
fb3d344be065453c0cbe0d477b1c8fa8.exe
-
Size
195KB
-
MD5
fb3d344be065453c0cbe0d477b1c8fa8
-
SHA1
39f5f09feba7b5badec1063ae459fe0e0522b1e0
-
SHA256
44f105d64c55a8773bb2a9ede81646f8b79503ec15eea7560990fa132d79ef76
-
SHA512
011406d4ef23135300ec3f718a5b43300fdcc6bad0ec19c99623cd8a0bcee562efd0efcbf4881237652df31f88d9191bddd068ff2dbb4088d290e3464413926c
-
SSDEEP
3072:qJg93A/BYtsYUG214enxLQVYFKEtgU//r23uV13MBhIog+rMbZBOGSqszwQu5CiQ:b9Qp0lz2yceq//pM/I0rXN1wQu5Cp
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3404 Explorer.EXE -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32 fb3d344be065453c0cbe0d477b1c8fa8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ThreadingModel = "Both" fb3d344be065453c0cbe0d477b1c8fa8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-21-3803511929-1339359695-2191195476-1000\\$4732b980f267194ec6fce0414fbbade7\\n." fb3d344be065453c0cbe0d477b1c8fa8.exe -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\clsid fb3d344be065453c0cbe0d477b1c8fa8.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} fb3d344be065453c0cbe0d477b1c8fa8.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32 fb3d344be065453c0cbe0d477b1c8fa8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ThreadingModel = "Both" fb3d344be065453c0cbe0d477b1c8fa8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-21-3803511929-1339359695-2191195476-1000\\$4732b980f267194ec6fce0414fbbade7\\n." fb3d344be065453c0cbe0d477b1c8fa8.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe 3404 Explorer.EXE 3404 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe Token: SeDebugPrivilege 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe Token: SeDebugPrivilege 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe Token: SeDebugPrivilege 3404 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3404 Explorer.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3404 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe 48 PID 2240 wrote to memory of 3404 2240 fb3d344be065453c0cbe0d477b1c8fa8.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb3d344be065453c0cbe0d477b1c8fa8.exe"C:\Users\Admin\AppData\Local\Temp\fb3d344be065453c0cbe0d477b1c8fa8.exe"1⤵
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3404