Analysis

  • max time kernel
    24s
  • max time network
    28s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 04:40

Errors

Reason
Machine shutdown

General

  • Target

    8e3ca639fe264dfc08d39c51856eda0a.exe

  • Size

    244KB

  • MD5

    8e3ca639fe264dfc08d39c51856eda0a

  • SHA1

    6ef6bd78c55640b030f1cceaa3434516798a5b64

  • SHA256

    bd22b2bc3837cd9fb42d4e6ac88637ccc477a8b36ede5e35724ac2ccb3741e44

  • SHA512

    6b1a1e4a67011bb91d28124f935fae29a85b2facca3590d24987a0b885b11d53909637ce55904a75b8d5d289b8bfa18b7d942df7803d7e3eea71c3a1cec7338d

  • SSDEEP

    3072:1wJIPTeH3y+QxMgPTX2QN1+FrCLoiX6MNbOuQokGpmTUWs228l2ME0:1LPCy3OgLX2QN1+FcowzppmTHvub0

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e3ca639fe264dfc08d39c51856eda0a.exe
    "C:\Users\Admin\AppData\Local\Temp\8e3ca639fe264dfc08d39c51856eda0a.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Local\Temp\bip.exe
      "C:\Users\Admin\AppData\Local\Temp\bip.exe"
      2⤵
      • Sets DLL path for service in the registry
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4448
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Iprip
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3248
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3996055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bip.exe

    Filesize

    20KB

    MD5

    cc1d214fbd39b7be64dc289275715283

    SHA1

    2e2f17779a4eb6deeed4c0de68ec8f2d5d979558

    SHA256

    bf85eea020f6b89680a68be9f0bc648b3b1e5bd938e8534a24f94aac667a0ceb

    SHA512

    2a1f0daf1e13fdcd84aedbd92209c4bbc66d17ede1aae37eeff07ce1101d30e62977396cda4b4c5287e5a067a57e102a169da9e841971c7243695010d8ffefc2

  • C:\Windows\SysWOW64\fsutk.dll

    Filesize

    116KB

    MD5

    e32097b37d709a6d7431635bd39806fc

    SHA1

    90776953c879bccc69a2cb2dc00a146ba56c1d16

    SHA256

    2994c374584915f0ed9a0cd4ccaa74422af6eb8eac7f52404b34b7d69db0081d

    SHA512

    23dcce6793f68d6768d866b3ab049c7248c3f63fa3798008f9e2510639da59ba233a8e259a4b4752f6b7cc6164bd469064463798640f55388b6390418c3653c3

  • C:\Windows\SysWOW64\liprip.dll

    Filesize

    84KB

    MD5

    e8d8c956e4152d84e5144a19684f8d93

    SHA1

    7fcc5e56a02e0e2e74ffce3e9489e0f97beea239

    SHA256

    b6acfdf5f3e4938d617320f78a853de2a40f222846cf7f5361e067ff44aa6377

    SHA512

    b54800e939f178e2be808d888361db587d551ad0b8cc19f8d522c4a05683e3961e3d720872cc2d754787333857899d61611661b7e5aa75b05686698a9005c747

  • \??\c:\$Recycle.bin\int.dat

    Filesize

    220KB

    MD5

    0aae88e0734fc76fd7d644f4cc5aaf8e

    SHA1

    fb83ec411ba34741221134ba9e19290e492f53c3

    SHA256

    35a2dfd0187c3d0801b0306dd884323956ae3d9c2d8928487956c6691b92c19c

    SHA512

    288e20433361d1ec5c8c18a37393364407d9d53974b4cae4c0ad8ece29990c79de7006d2ac9c7245e0c540dbde85d53881228b485e3f5a3a707342a375ca29c0

  • memory/3248-17-0x0000000001790000-0x00000000017B0000-memory.dmp

    Filesize

    128KB