Overview
overview
10Static
static
102LRS3ODTLG...JL.exe
windows10-1703-x64
102LRS3ODTLG...JL.exe
windows11-21h2-x64
106G2SZLVHVH...3B.exe
windows10-1703-x64
106G2SZLVHVH...3B.exe
windows11-21h2-x64
106TS3GUANXW9E1KF8.exe
windows10-1703-x64
106TS3GUANXW9E1KF8.exe
windows11-21h2-x64
10G9NB5XSAH0XAAPCN.exe
windows10-1703-x64
6G9NB5XSAH0XAAPCN.exe
windows11-21h2-x64
6PV0HLG9QQ3...NU.exe
windows10-1703-x64
10PV0HLG9QQ3...NU.exe
windows11-21h2-x64
10Protect544cd51a.dll
windows10-1703-x64
1Protect544cd51a.dll
windows11-21h2-x64
1PsExec.exe
windows10-1703-x64
1PsExec.exe
windows11-21h2-x64
1W7W5WFGX1D...7O.exe
windows10-1703-x64
3W7W5WFGX1D...7O.exe
windows11-21h2-x64
6skz3rpen.kc1.exe
windows10-1703-x64
1skz3rpen.kc1.exe
windows11-21h2-x64
1Analysis
-
max time kernel
452s -
max time network
1173s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-01-2024 19:03
Behavioral task
behavioral1
Sample
2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe
Resource
win11-20231222-en
Behavioral task
behavioral3
Sample
6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe
Resource
win11-20231215-en
Behavioral task
behavioral5
Sample
6TS3GUANXW9E1KF8.exe
Resource
win10-20231220-en
Behavioral task
behavioral6
Sample
6TS3GUANXW9E1KF8.exe
Resource
win11-20231215-en
Behavioral task
behavioral7
Sample
G9NB5XSAH0XAAPCN.exe
Resource
win10-20231215-en
Behavioral task
behavioral8
Sample
G9NB5XSAH0XAAPCN.exe
Resource
win11-20231222-en
Behavioral task
behavioral9
Sample
PV0HLG9QQ3YXXG1AJAMYRYE08NU.exe
Resource
win10-20231220-en
Behavioral task
behavioral10
Sample
PV0HLG9QQ3YXXG1AJAMYRYE08NU.exe
Resource
win11-20231215-en
Behavioral task
behavioral11
Sample
Protect544cd51a.dll
Resource
win10-20231215-en
Behavioral task
behavioral12
Sample
Protect544cd51a.dll
Resource
win11-20231215-en
Behavioral task
behavioral13
Sample
PsExec.exe
Resource
win10-20231215-en
Behavioral task
behavioral14
Sample
PsExec.exe
Resource
win11-20231215-en
Behavioral task
behavioral15
Sample
W7W5WFGX1D82S3EIURREUP57O.exe
Resource
win10-20231215-en
Behavioral task
behavioral16
Sample
W7W5WFGX1D82S3EIURREUP57O.exe
Resource
win11-20231222-en
Behavioral task
behavioral17
Sample
skz3rpen.kc1.exe
Resource
win10-20231215-en
Behavioral task
behavioral18
Sample
skz3rpen.kc1.exe
Resource
win11-20231215-en
General
-
Target
W7W5WFGX1D82S3EIURREUP57O.exe
-
Size
4.1MB
-
MD5
5432cd10140f359f17394c8e2340299c
-
SHA1
16ad79a097ff19b5089aff81b6bfa1a664affb18
-
SHA256
4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398
-
SHA512
05925ee28feb718c1d05216be2f4553b0db27f49aab42ae64559daa22c16b24b7c40de4ae83bd38e81f65173bf9584fbcbe3ad481366688a244e2e7774151f96
-
SSDEEP
98304:7ScbaLQaS+m0bcbE+1AZ1bpVDHBz/waoVNVncpH/s6i47:mn50N1AZ1dVLZwaoHxcpfm4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1184116928-951304463-2249875399-1000\Software\Microsoft\Windows\CurrentVersion\Run\Changing_the_voice_in_different_timbres = "C:\\Users\\Admin\\AppData\\Local\\Changing_the_voice_in_different_timbres\\Changing_the_voice_in_different_timbres.exe" powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
W7W5WFGX1D82S3EIURREUP57O.exedescription pid Process procid_target PID 4560 set thread context of 240 4560 W7W5WFGX1D82S3EIURREUP57O.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid Process 4524 powershell.exe 4524 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeRegAsm.exedescription pid Process Token: SeDebugPrivilege 4524 powershell.exe Token: SeDebugPrivilege 240 RegAsm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
W7W5WFGX1D82S3EIURREUP57O.exedescription pid Process procid_target PID 4560 wrote to memory of 240 4560 W7W5WFGX1D82S3EIURREUP57O.exe 80 PID 4560 wrote to memory of 240 4560 W7W5WFGX1D82S3EIURREUP57O.exe 80 PID 4560 wrote to memory of 240 4560 W7W5WFGX1D82S3EIURREUP57O.exe 80 PID 4560 wrote to memory of 240 4560 W7W5WFGX1D82S3EIURREUP57O.exe 80 PID 4560 wrote to memory of 240 4560 W7W5WFGX1D82S3EIURREUP57O.exe 80 PID 4560 wrote to memory of 240 4560 W7W5WFGX1D82S3EIURREUP57O.exe 80 PID 4560 wrote to memory of 240 4560 W7W5WFGX1D82S3EIURREUP57O.exe 80 PID 4560 wrote to memory of 240 4560 W7W5WFGX1D82S3EIURREUP57O.exe 80 PID 4560 wrote to memory of 4524 4560 W7W5WFGX1D82S3EIURREUP57O.exe 81 PID 4560 wrote to memory of 4524 4560 W7W5WFGX1D82S3EIURREUP57O.exe 81 PID 4560 wrote to memory of 4524 4560 W7W5WFGX1D82S3EIURREUP57O.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\W7W5WFGX1D82S3EIURREUP57O.exe"C:\Users\Admin\AppData\Local\Temp\W7W5WFGX1D82S3EIURREUP57O.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Changing_the_voice_in_different_timbres';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Changing_the_voice_in_different_timbres' -Value '"C:\Users\Admin\AppData\Local\Changing_the_voice_in_different_timbres\Changing_the_voice_in_different_timbres.exe"' -PropertyType 'String'2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82