Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
00124cbff180e0640081873205a66a24.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
00124cbff180e0640081873205a66a24.exe
Resource
win10v2004-20231215-en
General
-
Target
00124cbff180e0640081873205a66a24.exe
-
Size
11KB
-
MD5
00124cbff180e0640081873205a66a24
-
SHA1
3d8eb8e4c0a2ced0455896a26f4c900d8d240e5b
-
SHA256
02cb9884a407d379900639c4ab4354d91236ffcfcbc880674c04e722ea9c8156
-
SHA512
2f4d34bcbdf85973ae6d55a7e98cefb60be7f027d46b9710407273a0a411003826367e488d3b582afc0973fb86ab96d1fa9a925a14fc265d4d5276d704480a19
-
SSDEEP
192:GqkEe+6fMrf+X8OKfBzmDNevAihpAwIBsE2L4f3KoTdy68+QWqT:GzEQMrlQDNNi2+fL6Ko46KT
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2112 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\kernelwind32.exe" 00124cbff180e0640081873205a66a24.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vx.tll 00124cbff180e0640081873205a66a24.exe File opened for modification C:\Windows\SysWOW64\kernelwind32.exe 00124cbff180e0640081873205a66a24.exe File created C:\Windows\SysWOW64\dllh8jkd1q2.exe 00124cbff180e0640081873205a66a24.exe File created C:\Windows\SysWOW64\dllh8jkd1q6.exe 00124cbff180e0640081873205a66a24.exe File created C:\Windows\SysWOW64\dllh8jkd1q7.exe 00124cbff180e0640081873205a66a24.exe File created C:\Windows\SysWOW64\kernelwind32.exe 00124cbff180e0640081873205a66a24.exe File opened for modification C:\Windows\SysWOW64\dllh8jkd1q8.exe 00124cbff180e0640081873205a66a24.exe File created C:\Windows\SysWOW64\dllh8jkd1q1.exe 00124cbff180e0640081873205a66a24.exe File created C:\Windows\SysWOW64\dllh8jkd1q5.exe 00124cbff180e0640081873205a66a24.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4392 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5116 wrote to memory of 2112 5116 00124cbff180e0640081873205a66a24.exe 17 PID 5116 wrote to memory of 2112 5116 00124cbff180e0640081873205a66a24.exe 17 PID 5116 wrote to memory of 2112 5116 00124cbff180e0640081873205a66a24.exe 17
Processes
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram 'C:\Users\Admin\AppData\Local\Temp\00124cbff180e0640081873205a66a24.exe' enable1⤵
- Modifies Windows Firewall
PID:2112
-
C:\Users\Admin\AppData\Local\Temp\00124cbff180e0640081873205a66a24.exe"C:\Users\Admin\AppData\Local\Temp\00124cbff180e0640081873205a66a24.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5116
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4916
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4392
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD510c4bb42104da999d868b8d23af217ea
SHA1ce824d69ddfbe4b6cd67523762e66bd349d58563
SHA256a1f5688cc8172568b735b76f43da12fb4648b532d15aef476d4c904f17540a74
SHA512a9809609a99a7feeb19766f5d7713105273aafd0b265b512947ab9390c82868948d4d8858e4053a015549f47d9179dfbd23e03d27e0ec1ff1d17597e6f16890a
-
Filesize
47KB
MD5693273f876d2ac5db86316988d7fa4c5
SHA1803f62dd9420893e23779175b48f0f2fedc866e7
SHA256cb637754679bcb40f6044fc2b355b6e66d2d420b6e668f5bdf20a4e66b16ab1a
SHA5127edd7d2186d8777623602c889f376343c5b5d5b887654db7f615e353e28aa0a5dbff3d3bf5e845afd4cc6138ea9ba57a9e9657832d5166dad2417c4544afb77f
-
Filesize
47KB
MD5f80f172247fb8b0d1363c70dcc25319c
SHA10812092fd435554d7c78579bf3f71524076998c2
SHA256f2edc3e053f1218b6e20cfd113436c0aa1366d5e9091f17f9beb58c7b85de91f
SHA5125387d44c640c5ac3e4cf9c2670f6e8e404ce22e178a88436358c1b8551133e78b5456c719da21aad3e242b7da3e904ba1e683e48566d7238aab4a761fc366521