Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
e75d27a4dec7334e548a776a58137877.exe
Resource
win7-20231215-en
General
-
Target
e75d27a4dec7334e548a776a58137877.exe
-
Size
318KB
-
MD5
e75d27a4dec7334e548a776a58137877
-
SHA1
85e46d71cd015e4714459d2fe73f6c9a066199f5
-
SHA256
5e9b31834d9951e950f884bea2a45bafb99c1761fbb8b7be4301467f55795d1a
-
SHA512
28669e18a2ea427fa90f11ec4ed5f024bd3a28a4602bfe091fc6155e3b2f170f9f7f245a0912aa6cca627c6bc9802d4b39a75043c57d6d5e4c4ac3896710755f
-
SSDEEP
6144:TKjZaimwIqlazWEIBk4ZAs3CaYo/TRg4w6kT1kYftg5d672:dZqIzW35RFn9g311kYfi6K
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation e75d27a4dec7334e548a776a58137877.exe Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation nvxdsinc.exe -
Executes dropped EXE 3 IoCs
pid Process 1116 explorer.exe 2480 nvxdsinc.exe 3988 nwtray.exe -
resource yara_rule behavioral2/memory/1580-22-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1580-23-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1580-24-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1580-25-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1580-26-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1580-28-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1580-29-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/1580-30-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\nvxdsinc.exe" nvxdsinc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1116 set thread context of 1580 1116 explorer.exe 94 PID 3988 set thread context of 3304 3988 nwtray.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1116 explorer.exe 2480 nvxdsinc.exe 1116 explorer.exe 2480 nvxdsinc.exe 1116 explorer.exe 2480 nvxdsinc.exe 1116 explorer.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 2480 nvxdsinc.exe 1116 explorer.exe 3988 nwtray.exe 3988 nwtray.exe 2480 nvxdsinc.exe 2480 nvxdsinc.exe 1116 explorer.exe 1116 explorer.exe 3988 nwtray.exe 3988 nwtray.exe 2480 nvxdsinc.exe 2480 nvxdsinc.exe 1116 explorer.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 4360 e75d27a4dec7334e548a776a58137877.exe Token: SeDebugPrivilege 1116 explorer.exe Token: SeIncreaseQuotaPrivilege 1580 AppLaunch.exe Token: SeSecurityPrivilege 1580 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1580 AppLaunch.exe Token: SeLoadDriverPrivilege 1580 AppLaunch.exe Token: SeSystemProfilePrivilege 1580 AppLaunch.exe Token: SeSystemtimePrivilege 1580 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1580 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1580 AppLaunch.exe Token: SeCreatePagefilePrivilege 1580 AppLaunch.exe Token: SeBackupPrivilege 1580 AppLaunch.exe Token: SeRestorePrivilege 1580 AppLaunch.exe Token: SeShutdownPrivilege 1580 AppLaunch.exe Token: SeDebugPrivilege 1580 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1580 AppLaunch.exe Token: SeChangeNotifyPrivilege 1580 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1580 AppLaunch.exe Token: SeUndockPrivilege 1580 AppLaunch.exe Token: SeManageVolumePrivilege 1580 AppLaunch.exe Token: SeImpersonatePrivilege 1580 AppLaunch.exe Token: SeCreateGlobalPrivilege 1580 AppLaunch.exe Token: 33 1580 AppLaunch.exe Token: 34 1580 AppLaunch.exe Token: 35 1580 AppLaunch.exe Token: 36 1580 AppLaunch.exe Token: SeDebugPrivilege 2480 nvxdsinc.exe Token: SeDebugPrivilege 3988 nwtray.exe Token: SeIncreaseQuotaPrivilege 3304 AppLaunch.exe Token: SeSecurityPrivilege 3304 AppLaunch.exe Token: SeTakeOwnershipPrivilege 3304 AppLaunch.exe Token: SeLoadDriverPrivilege 3304 AppLaunch.exe Token: SeSystemProfilePrivilege 3304 AppLaunch.exe Token: SeSystemtimePrivilege 3304 AppLaunch.exe Token: SeProfSingleProcessPrivilege 3304 AppLaunch.exe Token: SeIncBasePriorityPrivilege 3304 AppLaunch.exe Token: SeCreatePagefilePrivilege 3304 AppLaunch.exe Token: SeBackupPrivilege 3304 AppLaunch.exe Token: SeRestorePrivilege 3304 AppLaunch.exe Token: SeShutdownPrivilege 3304 AppLaunch.exe Token: SeDebugPrivilege 3304 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 3304 AppLaunch.exe Token: SeChangeNotifyPrivilege 3304 AppLaunch.exe Token: SeRemoteShutdownPrivilege 3304 AppLaunch.exe Token: SeUndockPrivilege 3304 AppLaunch.exe Token: SeManageVolumePrivilege 3304 AppLaunch.exe Token: SeImpersonatePrivilege 3304 AppLaunch.exe Token: SeCreateGlobalPrivilege 3304 AppLaunch.exe Token: 33 3304 AppLaunch.exe Token: 34 3304 AppLaunch.exe Token: 35 3304 AppLaunch.exe Token: 36 3304 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1580 AppLaunch.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4360 wrote to memory of 1116 4360 e75d27a4dec7334e548a776a58137877.exe 93 PID 4360 wrote to memory of 1116 4360 e75d27a4dec7334e548a776a58137877.exe 93 PID 4360 wrote to memory of 1116 4360 e75d27a4dec7334e548a776a58137877.exe 93 PID 1116 wrote to memory of 1580 1116 explorer.exe 94 PID 1116 wrote to memory of 1580 1116 explorer.exe 94 PID 1116 wrote to memory of 1580 1116 explorer.exe 94 PID 1116 wrote to memory of 1580 1116 explorer.exe 94 PID 1116 wrote to memory of 1580 1116 explorer.exe 94 PID 1116 wrote to memory of 1580 1116 explorer.exe 94 PID 1116 wrote to memory of 1580 1116 explorer.exe 94 PID 1116 wrote to memory of 1580 1116 explorer.exe 94 PID 1116 wrote to memory of 2480 1116 explorer.exe 95 PID 1116 wrote to memory of 2480 1116 explorer.exe 95 PID 1116 wrote to memory of 2480 1116 explorer.exe 95 PID 2480 wrote to memory of 3988 2480 nvxdsinc.exe 99 PID 2480 wrote to memory of 3988 2480 nvxdsinc.exe 99 PID 2480 wrote to memory of 3988 2480 nvxdsinc.exe 99 PID 3988 wrote to memory of 3304 3988 nwtray.exe 100 PID 3988 wrote to memory of 3304 3988 nwtray.exe 100 PID 3988 wrote to memory of 3304 3988 nwtray.exe 100 PID 3988 wrote to memory of 3304 3988 nwtray.exe 100 PID 3988 wrote to memory of 3304 3988 nwtray.exe 100 PID 3988 wrote to memory of 3304 3988 nwtray.exe 100 PID 3988 wrote to memory of 3304 3988 nwtray.exe 100 PID 3988 wrote to memory of 3304 3988 nwtray.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e75d27a4dec7334e548a776a58137877.exe"C:\Users\Admin\AppData\Local\Temp\e75d27a4dec7334e548a776a58137877.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70B
MD510f8e5ef710815f8042993d8a493148c
SHA1ca1311ec6a490dd0cae48a970d9bd52347c26a66
SHA2568b388565259a47221d1ea8753f40c174862c43b0e097026e8e99c7d785aaaea8
SHA512d81dbf5ede3ae69894fecd63201b1b8b7b5529396643dda74ec96b415d7e50fb53dedf2b784f28e014d61892bd90b41d50f94aa1cad2a6b874c610c79826a157
-
Filesize
39KB
MD538abcaec6ee62213f90b1717d830a1bb
SHA1d8f5849d0d3f4ccc0dfb66a9a4a0442ac66a31b9
SHA2566fee9a2c70b2cc48b0812f7cb2e09497c9c90941976f430a8f8279ad3c787768
SHA51277eaabcbc6f7a3835b6220d72c4b1cae82d2125ea971907e33b15ceeede7e4da0741c6e63e988bd782ed6eb72ad3cbcba10ea83919eafd9b95d612c43a735274
-
Filesize
97KB
MD5b85598f7dd3b5dee2e5565fdb2d8679b
SHA1e7c1e7e12a0f14af07769981d355ea85da8a9d7d
SHA256b41a5244ff5c9f53a5db109d9e8ebc30c0bd60561910bdaa9f37b95ea0ad02b7
SHA512affd146b775d42517e356e694f7dcdbedced2193135eb4bd43e8708c2a84aeb2e211a4f13e279deff88fc09b36d82306347049b3b329d9cd57b8b05f4b0ccdd5
-
Filesize
75KB
MD533301800a2a42747a24f64b2a29ac2fb
SHA15687c7ae5e5d8b0b6fdc183067ec2664b552196c
SHA25628275a3b25fb58c1ab162b49a62e7cb671a789cad3ddccbc726495e1c6026781
SHA51205e2da9465a9ca28aa0494396ef4b0afc642a7fc0c6870a36d9a7ce2a3936f033719f529ab7521d88c63077b14a866f97ece900c11226bc7412c1640813182f1
-
Filesize
318KB
MD5e75d27a4dec7334e548a776a58137877
SHA185e46d71cd015e4714459d2fe73f6c9a066199f5
SHA2565e9b31834d9951e950f884bea2a45bafb99c1761fbb8b7be4301467f55795d1a
SHA51228669e18a2ea427fa90f11ec4ed5f024bd3a28a4602bfe091fc6155e3b2f170f9f7f245a0912aa6cca627c6bc9802d4b39a75043c57d6d5e4c4ac3896710755f