Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 23:21
Behavioral task
behavioral1
Sample
8aca73a0d688b7c3b555dbb5799dba92.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8aca73a0d688b7c3b555dbb5799dba92.exe
Resource
win10v2004-20231215-en
General
-
Target
8aca73a0d688b7c3b555dbb5799dba92.exe
-
Size
16KB
-
MD5
8aca73a0d688b7c3b555dbb5799dba92
-
SHA1
565bafc4bf770d10c3bcfd1f5ed2b24194b35253
-
SHA256
5d93b84bf2d6519a5b7ba45e27d9d014106f19102df7281fa58a0ee081f68724
-
SHA512
06387990bc2583b9715a0e71d08feffe4db4f81cb984c7262005bce67ea4c0f91c556b533e875906550c6938b07d68c004b543063fe750da4c0b5951fef7fb57
-
SSDEEP
384:gqmhgzhZvetCeBcfWiIrcDxn2RV+kBo6p:gqEeZvetNBcxDI3o6p
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\exqobujj.dll = "{71A78CD4-E470-4a18-8457-E0E0283DD507}" 8aca73a0d688b7c3b555dbb5799dba92.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 8aca73a0d688b7c3b555dbb5799dba92.exe -
resource yara_rule behavioral2/memory/2080-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/2080-14-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\exqobujj.tmp 8aca73a0d688b7c3b555dbb5799dba92.exe File opened for modification C:\Windows\SysWOW64\exqobujj.tmp 8aca73a0d688b7c3b555dbb5799dba92.exe File opened for modification C:\Windows\SysWOW64\exqobujj.nls 8aca73a0d688b7c3b555dbb5799dba92.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32\ThreadingModel = "Apartment" 8aca73a0d688b7c3b555dbb5799dba92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507} 8aca73a0d688b7c3b555dbb5799dba92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32 8aca73a0d688b7c3b555dbb5799dba92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32\ = "C:\\Windows\\SysWow64\\exqobujj.dll" 8aca73a0d688b7c3b555dbb5799dba92.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2080 8aca73a0d688b7c3b555dbb5799dba92.exe 2080 8aca73a0d688b7c3b555dbb5799dba92.exe 2080 8aca73a0d688b7c3b555dbb5799dba92.exe 2080 8aca73a0d688b7c3b555dbb5799dba92.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2080 8aca73a0d688b7c3b555dbb5799dba92.exe 2080 8aca73a0d688b7c3b555dbb5799dba92.exe 2080 8aca73a0d688b7c3b555dbb5799dba92.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2080 wrote to memory of 4536 2080 8aca73a0d688b7c3b555dbb5799dba92.exe 91 PID 2080 wrote to memory of 4536 2080 8aca73a0d688b7c3b555dbb5799dba92.exe 91 PID 2080 wrote to memory of 4536 2080 8aca73a0d688b7c3b555dbb5799dba92.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8aca73a0d688b7c3b555dbb5799dba92.exe"C:\Users\Admin\AppData\Local\Temp\8aca73a0d688b7c3b555dbb5799dba92.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\4DFC.tmp.bat2⤵PID:4536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD56bba2557b229eee6673612d2f56a66c9
SHA12b89d7fefaf165462ebacb3c19bf4815c6d6fe7f
SHA256a687d652b31bda58e11a652f61e09c8c6fc00295e1947fb1e10ad5011dddcf3c
SHA51293436c3568a14f76775626986a154b14da7eef9ef9384a122977e20b16033ddcfd175d0a93fc005435ef8d1b410973697ca5e557f77b000d8137624eef8bcfd2
-
Filesize
2.2MB
MD52c316efe352f01c28502fcc07b975875
SHA1da41bbab579319843bc75b7c9ba2d437ae3f56e6
SHA2566d96cca9107ffe4302b3985b7d3ce8cf18394172c257b330d677aca17be5ef3b
SHA512d1da0ade39e33d24e57de601ac8741f34560ea4676943c5837b927cf430157d9419a6066b11fdb058a2c6f72ee2721a8756aecf4d44694167ffa7b6ca6f6c8dd