Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 21:35
Behavioral task
behavioral1
Sample
3df24492f8cae6cc0273e84be76f0bf3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3df24492f8cae6cc0273e84be76f0bf3.exe
Resource
win10v2004-20231222-en
General
-
Target
3df24492f8cae6cc0273e84be76f0bf3.exe
-
Size
202KB
-
MD5
3df24492f8cae6cc0273e84be76f0bf3
-
SHA1
bf823f1f976b0d85a80131f0b3e5d95e7af8faa2
-
SHA256
f81be373525b0fac9f00bd0fef534193c46a2834cf0ea6179f2792edfc2a6b2d
-
SHA512
b4f40579c4047c5c7d3a6c42dcda899ea265c40ea3708c92ff26a229d4ffa93503c3920d38ecea12c3e8b604ad3fccd7f2a3bd0d541869878e1c385085753688
-
SSDEEP
6144:/PoSstLvdU79TYIOy7jxSbdPvBAYOnVXFugjOBoS:XoSsxV28y7j2V+gBoS
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Active Setup\Installed Components Explorer.exe -
resource yara_rule behavioral2/memory/1372-0-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral2/memory/1372-67-0x0000000000400000-0x0000000000487000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1372 3df24492f8cae6cc0273e84be76f0bf3.exe Token: SeShutdownPrivilege 512 Explorer.exe Token: SeCreatePagefilePrivilege 512 Explorer.exe Token: SeShutdownPrivilege 512 Explorer.exe Token: SeCreatePagefilePrivilege 512 Explorer.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1372 wrote to memory of 512 1372 3df24492f8cae6cc0273e84be76f0bf3.exe 18 PID 1372 wrote to memory of 512 1372 3df24492f8cae6cc0273e84be76f0bf3.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\3df24492f8cae6cc0273e84be76f0bf3.exe"C:\Users\Admin\AppData\Local\Temp\3df24492f8cae6cc0273e84be76f0bf3.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\Explorer.exe"C:\Windows\Explorer.exe"2⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2044
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4116
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3528
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4468
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4056
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4684
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\BHN90SAO\microsoft.windows[1].xml
Filesize97B
MD5a49784c6007e88174d13fd2a1d1603c8
SHA196351722a846ad8a396b7cd3285ac30a8edf3768
SHA256bf97a280596c60fa7130725b7426e7cd5ccfb759c909b5ef0b1575df2654ca91
SHA512b0c5f6550c560e3bee33be9261bee95a006cd63a57d56b3a4b6c3c8f9ca2c6f222bfd2e8933e663f4b644457b48eb638160c8b9a6814b47a3fd4760f74f825ec
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133486185883226437.txt
Filesize74KB
MD53f40d58aecd65a337082df85fadace28
SHA1ebea42cb95680b5222615005a0df07b47acc764a
SHA256e7d744912df0891c86693a9e5f0767a71f12616bd35c5e1a857bbabcd694e432
SHA512b885265e7d98fe1dc92fe32e1e681f39a6f6ba8119a651b3307875095e89b17bc89912b6197ebc1f93dbd9c5dcbea2769d0b39855ba799d5bbf9e0ef24a8638a