Analysis
-
max time kernel
164s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
429a32b65a48f1132718ea2943add203.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
429a32b65a48f1132718ea2943add203.exe
Resource
win10v2004-20231215-en
General
-
Target
429a32b65a48f1132718ea2943add203.exe
-
Size
3.4MB
-
MD5
429a32b65a48f1132718ea2943add203
-
SHA1
3d541e156db029c49d2aefa911955341c1adafef
-
SHA256
e9193377809cf1ce0c84a0c416630b1da29f389e0390146cf8dec6ab60277d15
-
SHA512
87ad18b1e7c67015470def576d8a472300d4f709a4c5038d71b387db4fb78c7fafa88f27dcb19dc434c754a671bfdacec07db7522dcab3b0ee6830ddd10b43f4
-
SSDEEP
49152:3Vsc1vS99LfULqnstLet3LyGhKPgssSt2gzcY/+:3VsivdqnstLEfhv7Sti7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 429a32b65a48f1132718ea2943add203.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 429a32b65a48f1132718ea2943add203.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jdk-1.8\bin\orbd.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE$ 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe$ 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe$ 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE$ 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe$ 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jdk-1.8\bin\jps.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jdk-1.8\bin\keytool.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe$ 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jre-1.8\bin\orbd.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe$ 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\7-Zip\7z.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe$ 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jre-1.8\bin\javaws.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe$ 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\createdump.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe$ 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe$ 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe$ 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe$ 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Microsoft Office\root\Office16\misc.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe$ 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE$ 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Microsoft Office\root\Office16\msoasb.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\7-Zip\7zG.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jre-1.8\bin\ssvagent.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jdk-1.8\bin\wsgen.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Java\jre-1.8\bin\java-rmi.exe 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe 429a32b65a48f1132718ea2943add203.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 429a32b65a48f1132718ea2943add203.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe 429a32b65a48f1132718ea2943add203.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\autorun.inf 429a32b65a48f1132718ea2943add203.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1212 429a32b65a48f1132718ea2943add203.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5429a32b65a48f1132718ea2943add203
SHA13d541e156db029c49d2aefa911955341c1adafef
SHA256e9193377809cf1ce0c84a0c416630b1da29f389e0390146cf8dec6ab60277d15
SHA51287ad18b1e7c67015470def576d8a472300d4f709a4c5038d71b387db4fb78c7fafa88f27dcb19dc434c754a671bfdacec07db7522dcab3b0ee6830ddd10b43f4