Analysis
-
max time kernel
182s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
3a594d066395d5d8efe21b31786a1e84.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a594d066395d5d8efe21b31786a1e84.exe
Resource
win10v2004-20231215-en
General
-
Target
3a594d066395d5d8efe21b31786a1e84.exe
-
Size
25KB
-
MD5
3a594d066395d5d8efe21b31786a1e84
-
SHA1
268804bf4654b2daa918a2d056083d2345dd8718
-
SHA256
69b6c615a994333da2cd78792c4e9f8d0fe3b15290611a76cf750798d8406185
-
SHA512
501bcce95b74e7e22deb81579be934f2f44f9ba448dec3cd708786392906051e7b05ff155ec70905629a1087f5c3deee8bfb24a3b070ed1537d8719c770a3e4f
-
SSDEEP
768:XLAXSjvpQpSLv8q2wMJ10gNoKJ7LLCvms7nDHIU:MXSjv8SAqB2102oKNLeucLz
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3a594d066395d5d8efe21b31786a1e84.exe" 3a594d066395d5d8efe21b31786a1e84.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\uefi.inf_amd64_c1628ffa62c8e54c\UEFI.sys 3a594d066395d5d8efe21b31786a1e84.exe File created C:\Windows\System32\DriverStore\FileRepository\ufxchipidea.inf_amd64_1c78775fffab6a0a\UfxChipidea.sys 3a594d066395d5d8efe21b31786a1e84.exe File created C:\Windows\System32\DriverStore\FileRepository\urschipidea.inf_amd64_78ad1c14e33df968\urschipidea.sys 3a594d066395d5d8efe21b31786a1e84.exe File created C:\Windows\System32\DriverStore\FileRepository\vrd.inf_amd64_81fbd405ff2470fc\vrd.sys 3a594d066395d5d8efe21b31786a1e84.exe File created C:\Windows\System32\DriverStore\FileRepository\swenum.inf_amd64_16a14542b63c02af\swenum.sys 3a594d066395d5d8efe21b31786a1e84.exe File created C:\Windows\System32\DriverStore\FileRepository\genericusbfn.inf_amd64_53931f0ae21d6d2c\genericusbfn.sys 3a594d066395d5d8efe21b31786a1e84.exe File created C:\Windows\System32\DriverStore\FileRepository\umbus.inf_amd64_b78a9c5b6fd62c27\umbus.sys 3a594d066395d5d8efe21b31786a1e84.exe File created C:\Windows\System32\DriverStore\FileRepository\urssynopsys.inf_amd64_057fa37902020500\urssynopsys.sys 3a594d066395d5d8efe21b31786a1e84.exe File created C:\Windows\System32\DriverStore\FileRepository\compositebus.inf_amd64_7500cffa210c6946\CompositeBus.sys 3a594d066395d5d8efe21b31786a1e84.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4604 3a594d066395d5d8efe21b31786a1e84.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4604 3a594d066395d5d8efe21b31786a1e84.exe 4604 3a594d066395d5d8efe21b31786a1e84.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4604 3a594d066395d5d8efe21b31786a1e84.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4604 wrote to memory of 776 4604 3a594d066395d5d8efe21b31786a1e84.exe 8 PID 4604 wrote to memory of 3648 4604 3a594d066395d5d8efe21b31786a1e84.exe 92 PID 4604 wrote to memory of 3648 4604 3a594d066395d5d8efe21b31786a1e84.exe 92 PID 4604 wrote to memory of 3648 4604 3a594d066395d5d8efe21b31786a1e84.exe 92
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\3a594d066395d5d8efe21b31786a1e84.exe"C:\Users\Admin\AppData\Local\Temp\3a594d066395d5d8efe21b31786a1e84.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" %12⤵PID:3648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a240958fe9d5acbe71a2b3c3a11e1102
SHA1b9413646979bb90da854a8509aa3594fb5e2a79b
SHA2566118af8a4e3c776f412e026bbaac204714d787036eeafb0406685d1f65ce7be3
SHA51209667b4fda6b8276b428fcbe57f66acb317b7e21b1e22d55ecb354e54b1352e697dcb5e2d9d9be890f694d6e1deaadda86ebca008c25eca084c2ea89678c1944