Analysis
-
max time kernel
4s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
4c47c0a448de02d094517440df4d9ebb.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c47c0a448de02d094517440df4d9ebb.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
wgsdgsdgdsgsd.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
wgsdgsdgdsgsd.exe
Resource
win10v2004-20231222-en
General
-
Target
wgsdgsdgdsgsd.exe
-
Size
231KB
-
MD5
83958cceb1f999ba2c7a74a41b65e528
-
SHA1
0931d6872fc0f161b6b526605c233196b11f27f5
-
SHA256
f15cadad17e1c67c984115d113ac2806c32131bb5170f524e4031e01c9808d9b
-
SHA512
8df77821817858cd07b43eb9f802c8dc5c3964157d3792d13e535ea0bfd7a4ced119ff14f832157564b3bab8f0cfdd58d64339d5e52d10440a33798263ab1021
-
SSDEEP
6144:5SAP3uarIOe3GQYjUUSDZvSt0rcNNn+VrNmtgFOQOxmZCfjTYSaTpd:5SS3XrIOebtdvLrGN8maFbdZ0jTYfTP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2104 erebm.exe 1624 erebm.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5092 set thread context of 3884 5092 wgsdgsdgdsgsd.exe 51 PID 2104 set thread context of 1624 2104 erebm.exe 88 PID 3884 set thread context of 3208 3884 wgsdgsdgdsgsd.exe 86 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Privacy wgsdgsdgdsgsd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" wgsdgsdgdsgsd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1624 erebm.exe 1624 erebm.exe 1624 erebm.exe 1624 erebm.exe 1624 erebm.exe 1624 erebm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 3884 wgsdgsdgdsgsd.exe Token: SeSecurityPrivilege 3884 wgsdgsdgdsgsd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 3884 5092 wgsdgsdgdsgsd.exe 51 PID 5092 wrote to memory of 3884 5092 wgsdgsdgdsgsd.exe 51 PID 5092 wrote to memory of 3884 5092 wgsdgsdgdsgsd.exe 51 PID 5092 wrote to memory of 3884 5092 wgsdgsdgdsgsd.exe 51 PID 5092 wrote to memory of 3884 5092 wgsdgsdgdsgsd.exe 51 PID 5092 wrote to memory of 3884 5092 wgsdgsdgdsgsd.exe 51 PID 5092 wrote to memory of 3884 5092 wgsdgsdgdsgsd.exe 51 PID 5092 wrote to memory of 3884 5092 wgsdgsdgdsgsd.exe 51 PID 3884 wrote to memory of 2104 3884 wgsdgsdgdsgsd.exe 58 PID 3884 wrote to memory of 2104 3884 wgsdgsdgdsgsd.exe 58 PID 3884 wrote to memory of 2104 3884 wgsdgsdgdsgsd.exe 58 PID 2104 wrote to memory of 1624 2104 erebm.exe 88 PID 2104 wrote to memory of 1624 2104 erebm.exe 88 PID 2104 wrote to memory of 1624 2104 erebm.exe 88 PID 2104 wrote to memory of 1624 2104 erebm.exe 88 PID 2104 wrote to memory of 1624 2104 erebm.exe 88 PID 2104 wrote to memory of 1624 2104 erebm.exe 88 PID 2104 wrote to memory of 1624 2104 erebm.exe 88 PID 2104 wrote to memory of 1624 2104 erebm.exe 88 PID 1624 wrote to memory of 2392 1624 erebm.exe 49 PID 1624 wrote to memory of 2392 1624 erebm.exe 49 PID 1624 wrote to memory of 2392 1624 erebm.exe 49 PID 1624 wrote to memory of 2392 1624 erebm.exe 49 PID 1624 wrote to memory of 2392 1624 erebm.exe 49 PID 1624 wrote to memory of 2448 1624 erebm.exe 48 PID 1624 wrote to memory of 2448 1624 erebm.exe 48 PID 1624 wrote to memory of 2448 1624 erebm.exe 48 PID 1624 wrote to memory of 2448 1624 erebm.exe 48 PID 1624 wrote to memory of 2448 1624 erebm.exe 48 PID 1624 wrote to memory of 2580 1624 erebm.exe 45 PID 1624 wrote to memory of 2580 1624 erebm.exe 45 PID 1624 wrote to memory of 2580 1624 erebm.exe 45 PID 1624 wrote to memory of 2580 1624 erebm.exe 45 PID 1624 wrote to memory of 2580 1624 erebm.exe 45 PID 1624 wrote to memory of 3412 1624 erebm.exe 36 PID 1624 wrote to memory of 3412 1624 erebm.exe 36 PID 1624 wrote to memory of 3412 1624 erebm.exe 36 PID 1624 wrote to memory of 3412 1624 erebm.exe 36 PID 1624 wrote to memory of 3412 1624 erebm.exe 36 PID 1624 wrote to memory of 3548 1624 erebm.exe 35 PID 1624 wrote to memory of 3548 1624 erebm.exe 35 PID 1624 wrote to memory of 3548 1624 erebm.exe 35 PID 1624 wrote to memory of 3548 1624 erebm.exe 35 PID 1624 wrote to memory of 3548 1624 erebm.exe 35 PID 1624 wrote to memory of 3772 1624 erebm.exe 34 PID 1624 wrote to memory of 3772 1624 erebm.exe 34 PID 1624 wrote to memory of 3772 1624 erebm.exe 34 PID 1624 wrote to memory of 3772 1624 erebm.exe 34 PID 1624 wrote to memory of 3772 1624 erebm.exe 34 PID 1624 wrote to memory of 3876 1624 erebm.exe 4 PID 1624 wrote to memory of 3876 1624 erebm.exe 4 PID 1624 wrote to memory of 3876 1624 erebm.exe 4 PID 1624 wrote to memory of 3876 1624 erebm.exe 4 PID 1624 wrote to memory of 3876 1624 erebm.exe 4 PID 1624 wrote to memory of 3940 1624 erebm.exe 3 PID 1624 wrote to memory of 3940 1624 erebm.exe 3 PID 1624 wrote to memory of 3940 1624 erebm.exe 3 PID 1624 wrote to memory of 3940 1624 erebm.exe 3 PID 1624 wrote to memory of 3940 1624 erebm.exe 3 PID 1624 wrote to memory of 4020 1624 erebm.exe 33 PID 1624 wrote to memory of 4020 1624 erebm.exe 33 PID 1624 wrote to memory of 4020 1624 erebm.exe 33 PID 1624 wrote to memory of 4020 1624 erebm.exe 33 PID 1624 wrote to memory of 4020 1624 erebm.exe 33
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3940
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3876
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2188
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4540
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:1516
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:752
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\wgsdgsdgdsgsd.exe"C:\Users\Admin\AppData\Local\Temp\wgsdgsdgdsgsd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\wgsdgsdgdsgsd.exe"C:\Users\Admin\AppData\Local\Temp\wgsdgsdgdsgsd.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Roaming\Obzory\erebm.exe"C:\Users\Admin\AppData\Roaming\Obzory\erebm.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Roaming\Obzory\erebm.exe"C:\Users\Admin\AppData\Roaming\Obzory\erebm.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp460aa298.bat"3⤵PID:3208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3564
-
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1220
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3356
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3584
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4020
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3548
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3412
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2448
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5eb7a8a9444bc11375b36c55d78dc2d73
SHA17d8c47ceb119b31c2b0d4a3caf3ff5290d325d99
SHA2564adfb5da1fda3e378c81c58e424eeb02fb2a793282fe33f83a8336314b1f2f9d
SHA5123420f39fb45f441ac7a0672334c8b32297b11402b3befea6a77f009fc27835e71bdb11ab6b1181f1c9fe690d67d27708f9523ea63e33a80d9fe174223f3155cf
-
Filesize
4KB
MD5209f0d4b4726cde3add94ffa7065be8c
SHA12bb4b16ebebd9ff9c5b598296e18fc8f8cebe87d
SHA2564cbdb56bbd8810ddff664a22ce0951f6dcb7ac83a2a57ca370175c98b9fa6a7f
SHA512fb7479a81107bcd8d96fbdb124040a532572bd884163d2f7e725befc64f486ab99b783ef4a6e254f6dd224049ada488904e866dcdffd38f53604ddc58923ad6e