Analysis
-
max time kernel
163s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 18:53
Static task
static1
Behavioral task
behavioral1
Sample
d3caf175fabc265c3cf49125144a4ac1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d3caf175fabc265c3cf49125144a4ac1.exe
Resource
win10v2004-20231215-en
General
-
Target
d3caf175fabc265c3cf49125144a4ac1.exe
-
Size
64KB
-
MD5
d3caf175fabc265c3cf49125144a4ac1
-
SHA1
b1fcea8e32c79c49d3812014a3599fb599d009d2
-
SHA256
e8fcbb9a903ab5bbabf27c37d6333232bb832126f10551bf8a2420dfac616b56
-
SHA512
35cdaa46f7235c6b87588117ec1a0b10f446dd7f2c858d82d396870e949c67f09d9a55f3dd38ecf94e9594fc1855efb7cc40a9523e8564e2874e63a90d189f60
-
SSDEEP
768:XANOxr7P+txLHrLIuWqYiCKCGMq0H4c9xaMGFo4K2p/1H5XPXdnh0Usb0DWBi:XAcl7kr4uR+G8H4OaMd2LbrDWBi
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" d3caf175fabc265c3cf49125144a4ac1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d3caf175fabc265c3cf49125144a4ac1.exe -
Executes dropped EXE 1 IoCs
pid Process 3356 Amhdmi32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Amhdmi32.exe d3caf175fabc265c3cf49125144a4ac1.exe File created C:\Windows\SysWOW64\Ejcdfahd.dll d3caf175fabc265c3cf49125144a4ac1.exe File created C:\Windows\SysWOW64\Amhdmi32.exe d3caf175fabc265c3cf49125144a4ac1.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejcdfahd.dll" d3caf175fabc265c3cf49125144a4ac1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" d3caf175fabc265c3cf49125144a4ac1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 d3caf175fabc265c3cf49125144a4ac1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node d3caf175fabc265c3cf49125144a4ac1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID d3caf175fabc265c3cf49125144a4ac1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} d3caf175fabc265c3cf49125144a4ac1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3708 wrote to memory of 3356 3708 d3caf175fabc265c3cf49125144a4ac1.exe 93 PID 3708 wrote to memory of 3356 3708 d3caf175fabc265c3cf49125144a4ac1.exe 93 PID 3708 wrote to memory of 3356 3708 d3caf175fabc265c3cf49125144a4ac1.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3caf175fabc265c3cf49125144a4ac1.exe"C:\Users\Admin\AppData\Local\Temp\d3caf175fabc265c3cf49125144a4ac1.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\Amhdmi32.exeC:\Windows\system32\Amhdmi32.exe2⤵
- Executes dropped EXE
PID:3356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD57f724d6308b21c8826eeb6b17cd0aeae
SHA1166105e5dd3065281844c10e64a48dcc4b399f61
SHA256ae35107f8464f25132c269ed4c5e3cbd0559a31c3b28de61d50ed2ccc5a4ba8a
SHA5122af103cd10d95f56c1a4a29db5d86b715da7d932525a0507d41610e5868793b5f5f5b45ac785c4a943ae80dd548665750e12fd648172cad067b6bdf0d6c00855