Analysis
-
max time kernel
1s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 15:08
Static task
static1
Behavioral task
behavioral1
Sample
69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe
Resource
win10v2004-20231215-en
General
-
Target
69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe
-
Size
1.6MB
-
MD5
ea4d996b472fabecc83c821342a6f2da
-
SHA1
3d6f8b3ea30f2da6392843b09c6a4039bda72040
-
SHA256
69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704
-
SHA512
fd44c2ad95e661fb4de273cc21a3102a8f1361f7377bd1bf6228476f3e41a3c52159d991cdedd517b139c35c102d2f8539db51b30b45c37230876824d854f40e
-
SSDEEP
12288:PZak9NyN+gGo3gnqYI2xsuz+dIoMfySCbne++ZgmCWJ3Mi1EesvxuAySjZF:99NyN+F0YfxzccaSL++aGJFayKZ
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 3376 alg.exe 4224 DiagnosticsHub.StandardCollector.Service.exe 332 fxssvc.exe 2320 elevation_service.exe 5032 elevation_service.exe 524 maintenanceservice.exe 4908 msdtc.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe File opened for modification C:\Windows\system32\fxssvc.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe File opened for modification C:\Windows\System32\msdtc.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe File opened for modification C:\Windows\system32\msiexec.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe File opened for modification C:\Windows\System32\alg.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe File opened for modification C:\Windows\system32\AppVClient.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\c5cf46a37c1fafa7.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3924 69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe Token: SeAuditPrivilege 332 fxssvc.exe
Processes
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:4224
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
PID:4908
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵PID:384
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵PID:4368
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵PID:3564
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3256
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:2276
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:5160
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:5728
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵PID:5768
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3632
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:4200
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵PID:4852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:2560
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵PID:4432
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵PID:1004
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵PID:4768
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵PID:3580
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵PID:1700
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵PID:1696
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:524
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:5032
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2320
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:332
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4072
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3376
-
C:\Users\Admin\AppData\Local\Temp\69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe"C:\Users\Admin\AppData\Local\Temp\69cf1f011c501ebd306ff4803641dfeb7504139081d8c6d3532749ad8590e704.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3924