Overview
overview
10Static
static
102LRS3ODTLG...JL.exe
windows10-1703-x64
102LRS3ODTLG...JL.exe
windows11-21h2-x64
106G2SZLVHVH...3B.exe
windows10-1703-x64
106G2SZLVHVH...3B.exe
windows11-21h2-x64
106TS3GUANXW9E1KF8.exe
windows10-1703-x64
106TS3GUANXW9E1KF8.exe
windows11-21h2-x64
10G9NB5XSAH0XAAPCN.exe
windows10-1703-x64
6G9NB5XSAH0XAAPCN.exe
windows11-21h2-x64
6PV0HLG9QQ3...NU.exe
windows10-1703-x64
10PV0HLG9QQ3...NU.exe
windows11-21h2-x64
10Protect544cd51a.dll
windows10-1703-x64
1Protect544cd51a.dll
windows11-21h2-x64
1PsExec.exe
windows10-1703-x64
1PsExec.exe
windows11-21h2-x64
1W7W5WFGX1D...7O.exe
windows10-1703-x64
3W7W5WFGX1D...7O.exe
windows11-21h2-x64
6skz3rpen.kc1.exe
windows10-1703-x64
1skz3rpen.kc1.exe
windows11-21h2-x64
1Analysis
-
max time kernel
1190s -
max time network
1205s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
26-01-2024 19:03
Behavioral task
behavioral1
Sample
2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
2LRS3ODTLG3KRVJA1CCVAQPPFCFWXJL.exe
Resource
win11-20231222-en
Behavioral task
behavioral3
Sample
6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
6G2SZLVHVHUJV21JB2FOVQKM701Z63B.exe
Resource
win11-20231215-en
Behavioral task
behavioral5
Sample
6TS3GUANXW9E1KF8.exe
Resource
win10-20231220-en
Behavioral task
behavioral6
Sample
6TS3GUANXW9E1KF8.exe
Resource
win11-20231215-en
Behavioral task
behavioral7
Sample
G9NB5XSAH0XAAPCN.exe
Resource
win10-20231215-en
Behavioral task
behavioral8
Sample
G9NB5XSAH0XAAPCN.exe
Resource
win11-20231222-en
Behavioral task
behavioral9
Sample
PV0HLG9QQ3YXXG1AJAMYRYE08NU.exe
Resource
win10-20231220-en
Behavioral task
behavioral10
Sample
PV0HLG9QQ3YXXG1AJAMYRYE08NU.exe
Resource
win11-20231215-en
Behavioral task
behavioral11
Sample
Protect544cd51a.dll
Resource
win10-20231215-en
Behavioral task
behavioral12
Sample
Protect544cd51a.dll
Resource
win11-20231215-en
Behavioral task
behavioral13
Sample
PsExec.exe
Resource
win10-20231215-en
Behavioral task
behavioral14
Sample
PsExec.exe
Resource
win11-20231215-en
Behavioral task
behavioral15
Sample
W7W5WFGX1D82S3EIURREUP57O.exe
Resource
win10-20231215-en
Behavioral task
behavioral16
Sample
W7W5WFGX1D82S3EIURREUP57O.exe
Resource
win11-20231222-en
Behavioral task
behavioral17
Sample
skz3rpen.kc1.exe
Resource
win10-20231215-en
Behavioral task
behavioral18
Sample
skz3rpen.kc1.exe
Resource
win11-20231215-en
General
-
Target
G9NB5XSAH0XAAPCN.exe
-
Size
4.1MB
-
MD5
5432cd10140f359f17394c8e2340299c
-
SHA1
16ad79a097ff19b5089aff81b6bfa1a664affb18
-
SHA256
4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398
-
SHA512
05925ee28feb718c1d05216be2f4553b0db27f49aab42ae64559daa22c16b24b7c40de4ae83bd38e81f65173bf9584fbcbe3ad481366688a244e2e7774151f96
-
SSDEEP
98304:7ScbaLQaS+m0bcbE+1AZ1bpVDHBz/waoVNVncpH/s6i47:mn50N1AZ1dVLZwaoHxcpfm4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
powershell.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Windows\CurrentVersion\Run\Changing_the_voice_in_different_timbres = "C:\\Users\\Admin\\AppData\\Local\\Changing_the_voice_in_different_timbres\\Changing_the_voice_in_different_timbres.exe" powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
G9NB5XSAH0XAAPCN.exedescription pid Process procid_target PID 4452 set thread context of 4632 4452 G9NB5XSAH0XAAPCN.exe 73 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid Process 4628 powershell.exe 4628 powershell.exe 4628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeRegAsm.exedescription pid Process Token: SeDebugPrivilege 4628 powershell.exe Token: SeDebugPrivilege 4632 RegAsm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
G9NB5XSAH0XAAPCN.exedescription pid Process procid_target PID 4452 wrote to memory of 4632 4452 G9NB5XSAH0XAAPCN.exe 73 PID 4452 wrote to memory of 4632 4452 G9NB5XSAH0XAAPCN.exe 73 PID 4452 wrote to memory of 4632 4452 G9NB5XSAH0XAAPCN.exe 73 PID 4452 wrote to memory of 4632 4452 G9NB5XSAH0XAAPCN.exe 73 PID 4452 wrote to memory of 4632 4452 G9NB5XSAH0XAAPCN.exe 73 PID 4452 wrote to memory of 4632 4452 G9NB5XSAH0XAAPCN.exe 73 PID 4452 wrote to memory of 4632 4452 G9NB5XSAH0XAAPCN.exe 73 PID 4452 wrote to memory of 4632 4452 G9NB5XSAH0XAAPCN.exe 73 PID 4452 wrote to memory of 4628 4452 G9NB5XSAH0XAAPCN.exe 74 PID 4452 wrote to memory of 4628 4452 G9NB5XSAH0XAAPCN.exe 74 PID 4452 wrote to memory of 4628 4452 G9NB5XSAH0XAAPCN.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\G9NB5XSAH0XAAPCN.exe"C:\Users\Admin\AppData\Local\Temp\G9NB5XSAH0XAAPCN.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Changing_the_voice_in_different_timbres';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Changing_the_voice_in_different_timbres' -Value '"C:\Users\Admin\AppData\Local\Changing_the_voice_in_different_timbres\Changing_the_voice_in_different_timbres.exe"' -PropertyType 'String'2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a