Analysis
-
max time kernel
12s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
63c8627a6c976f688318f0525793cf5e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63c8627a6c976f688318f0525793cf5e.exe
Resource
win10v2004-20231222-en
General
-
Target
63c8627a6c976f688318f0525793cf5e.exe
-
Size
272KB
-
MD5
63c8627a6c976f688318f0525793cf5e
-
SHA1
1043bb40a39e946f82bc8f5d0c572048bef8f716
-
SHA256
e4c9e2f70abb3e8f02e91f3ed7846ab5283da5d19ca481e43e03ae1f4fdc3cae
-
SHA512
c1573736307f1669a0e9730b6e8df2b537763f0208608cda64fce7e5b516663042490450213c0327b6245147e937101fc8d20d63f5b2c08f6cc62c579f11d58b
-
SSDEEP
6144:iOBrgUg0ehFSoLMXUFZTT2PwXIZFge7whRySVVFh:i8c0eTMXUFZTewX4K8S9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2544-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3736-200-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\F52.exe = "C:\\Program Files (x86)\\LP\\C3F9\\F52.exe" 63c8627a6c976f688318f0525793cf5e.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\LP\C3F9\F52.exe 63c8627a6c976f688318f0525793cf5e.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe 2544 63c8627a6c976f688318f0525793cf5e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 4568 msiexec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2544 wrote to memory of 468 2544 63c8627a6c976f688318f0525793cf5e.exe 97 PID 2544 wrote to memory of 468 2544 63c8627a6c976f688318f0525793cf5e.exe 97 PID 2544 wrote to memory of 468 2544 63c8627a6c976f688318f0525793cf5e.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exe"C:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exeC:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exe startC:\Users\Admin\AppData\Roaming\9519E\840C3.exe%C:\Users\Admin\AppData\Roaming\9519E2⤵PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exeC:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exe startC:\Program Files (x86)\9EDD8\lvvm.exe%C:\Program Files (x86)\9EDD82⤵PID:3736
-
-
C:\Program Files (x86)\LP\C3F9\CC87.tmp"C:\Program Files (x86)\LP\C3F9\CC87.tmp"2⤵PID:440
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4484
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3176
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5028
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:860
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4348
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1288
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2872
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2488
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2072
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3688
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3292
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3728
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4184
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2064
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4228
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1896
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4448
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3732
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5052
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2936
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4476
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4228
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:936
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4292
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3672
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5092
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:628
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4320
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1596
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4872
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:760
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1172
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4904
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3848
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3928
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4284
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2736
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1592
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4116
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2212
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2628
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4468
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4476
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2332
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3096
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4324
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4680
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5741a474e68d21807209d21bb48e3b548
SHA17a1532e0612197de8eac689710ba62fe3f880f34
SHA256db72043327449f366ed96882ea4dfbfa5d9fc16b2d804a0746753f71b38e1f52
SHA512800c06cc898d8be33729573f6671b8887afc3dd26d9f1c89a9cf66cb7030d4950de885e632472c315ea8c9a712bb8cc4067dbf8501a993d961cd7990996948cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize471B
MD51d176c7fae90b26bc9918c4b89daf042
SHA19e860eaf7c0c6536268eb89081c75321c2536bee
SHA25604f8b2a47cfa5d1c009320508e0567f700fcf00c3a7e6d1f3dba6a7e226fd0d7
SHA51240dd7bea62d8057739390c0d05328f691e5d33c2c58f3ca8ffeb20b10d1368766e60110bc34f485ae967ef5a493c72813740836dc6a5c58d3c06f0e39b831bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize412B
MD58097c1f6180d4b91a2c3617cc7fc0316
SHA1c03c4e85029a40998ba1a422d1145ff3affad098
SHA256d08bb21f8bc611a6b41f68145eb50c3ca032f391df2cd88e41d0b0adeb4beaa6
SHA512833ce7c99b8a0befce779f93df9555ffeea3c2b1841647f2c5dd6bda482cc466e209e9450c4d12df5dca0b1ad8beea2b89d1a1b53507aa8867844a3251f1746a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\BHN90SAO\microsoft.windows[1].xml
Filesize97B
MD5a49784c6007e88174d13fd2a1d1603c8
SHA196351722a846ad8a396b7cd3285ac30a8edf3768
SHA256bf97a280596c60fa7130725b7426e7cd5ccfb759c909b5ef0b1575df2654ca91
SHA512b0c5f6550c560e3bee33be9261bee95a006cd63a57d56b3a4b6c3c8f9ca2c6f222bfd2e8933e663f4b644457b48eb638160c8b9a6814b47a3fd4760f74f825ec
-
Filesize
600B
MD5b5abd6469b195c7fa078fc26c09d476e
SHA16f87b454f427c34472e36f113332b0ab5aa1f134
SHA256166e60a787d901e01107dc2874ef7c724698a371b8030dd079e77bc2d47cb216
SHA512fb69d6b93b792236578a1b8a9f63a8b3ebee6411fea796a6807a4afbe402358473510e47edf66c8710ae8335107d9640eba1b9bdbba3fd24757557a0665128d6
-
Filesize
996B
MD526d392eb1b8ddaeb2552da57a63eb809
SHA1ac9a6b892bdc746f089fb56abb4ee21abeadbdd6
SHA256e1f8d65e649bbeb3fcdb5e7051ef0439ac66cf82d09455b4a253344dbdd110e5
SHA5121c4c4001e8ae94d732b639b6f3d26ce185b08bd743a863c0dc1baab2e43c43e65b24da4f0fea20b93c8ef0383c706efe31d44cebf9348e74df9c885eb38064cc
-
Filesize
1KB
MD561cecd77476c940e99fe776241e6df0a
SHA1a1c5c46bcc901f870b122e700fe840fda6352a02
SHA256ccef422e886feb3773ec870e27247bb5d0aaa2b1696b19c90125eafd447056f5
SHA512032fbed325c31e7428ec052e2fcb490c6b320a3b84fd22ece636a2d6c91f1767ce120c144a505ef5341bd9eafe85f0056d08518120e1189defe2492dba96c4a2