Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
86d4af84c2164b384bf8bb2da7280cb3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
86d4af84c2164b384bf8bb2da7280cb3.exe
Resource
win10v2004-20231215-en
General
-
Target
86d4af84c2164b384bf8bb2da7280cb3.exe
-
Size
25KB
-
MD5
86d4af84c2164b384bf8bb2da7280cb3
-
SHA1
76faab4d3df83a48691f88a26b4e35e529b0548b
-
SHA256
d475e3d2566c3673c4f54df1bf3729da360323ac0d496bf6b220a5a659a068cb
-
SHA512
1a14b9e572346bf7e4a37967fd448a5f7526e956d78c79fd8fa301af2a2f0e3d268ece85050ac47419661920ccf2c5b7153973993fe63a4c229a8f419bb95b81
-
SSDEEP
384:iO6oOJ9evo97boLTAb05tvZkoYT2AlkpJc40f7+e:deGTqadZkf2UUufH
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\86d4af84c2164b384bf8bb2da7280cb3.exe" 86d4af84c2164b384bf8bb2da7280cb3.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\umbus.inf_amd64_b78a9c5b6fd62c27\umbus.sys 86d4af84c2164b384bf8bb2da7280cb3.exe File created C:\Windows\System32\DriverStore\FileRepository\urschipidea.inf_amd64_78ad1c14e33df968\urschipidea.sys 86d4af84c2164b384bf8bb2da7280cb3.exe File created C:\Windows\System32\DriverStore\FileRepository\urssynopsys.inf_amd64_057fa37902020500\urssynopsys.sys 86d4af84c2164b384bf8bb2da7280cb3.exe File created C:\Windows\System32\DriverStore\FileRepository\compositebus.inf_amd64_7500cffa210c6946\CompositeBus.sys 86d4af84c2164b384bf8bb2da7280cb3.exe File created C:\Windows\System32\DriverStore\FileRepository\genericusbfn.inf_amd64_53931f0ae21d6d2c\genericusbfn.sys 86d4af84c2164b384bf8bb2da7280cb3.exe File created C:\Windows\System32\DriverStore\FileRepository\ufxchipidea.inf_amd64_1c78775fffab6a0a\UfxChipidea.sys 86d4af84c2164b384bf8bb2da7280cb3.exe File created C:\Windows\System32\DriverStore\FileRepository\vrd.inf_amd64_81fbd405ff2470fc\vrd.sys 86d4af84c2164b384bf8bb2da7280cb3.exe File created C:\Windows\System32\DriverStore\FileRepository\swenum.inf_amd64_16a14542b63c02af\swenum.sys 86d4af84c2164b384bf8bb2da7280cb3.exe File created C:\Windows\System32\DriverStore\FileRepository\uefi.inf_amd64_c1628ffa62c8e54c\UEFI.sys 86d4af84c2164b384bf8bb2da7280cb3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3744 86d4af84c2164b384bf8bb2da7280cb3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3744 86d4af84c2164b384bf8bb2da7280cb3.exe 3744 86d4af84c2164b384bf8bb2da7280cb3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3744 86d4af84c2164b384bf8bb2da7280cb3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3744 wrote to memory of 792 3744 86d4af84c2164b384bf8bb2da7280cb3.exe 14 PID 3744 wrote to memory of 2000 3744 86d4af84c2164b384bf8bb2da7280cb3.exe 84 PID 3744 wrote to memory of 2000 3744 86d4af84c2164b384bf8bb2da7280cb3.exe 84 PID 3744 wrote to memory of 2000 3744 86d4af84c2164b384bf8bb2da7280cb3.exe 84
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\86d4af84c2164b384bf8bb2da7280cb3.exe"C:\Users\Admin\AppData\Local\Temp\86d4af84c2164b384bf8bb2da7280cb3.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" %12⤵PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a240958fe9d5acbe71a2b3c3a11e1102
SHA1b9413646979bb90da854a8509aa3594fb5e2a79b
SHA2566118af8a4e3c776f412e026bbaac204714d787036eeafb0406685d1f65ce7be3
SHA51209667b4fda6b8276b428fcbe57f66acb317b7e21b1e22d55ecb354e54b1352e697dcb5e2d9d9be890f694d6e1deaadda86ebca008c25eca084c2ea89678c1944