Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 07:24
Behavioral task
behavioral1
Sample
a33422028510cbe1381f556208fb46b2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a33422028510cbe1381f556208fb46b2.exe
Resource
win10v2004-20240221-en
General
-
Target
a33422028510cbe1381f556208fb46b2.exe
-
Size
44KB
-
MD5
a33422028510cbe1381f556208fb46b2
-
SHA1
a6f7075faa0e6c318ab0930fa0b02e485e2c1506
-
SHA256
ba4568175950b5113ba77dd77ed6d056b177d71d379e322773bd6af89ab2e4dd
-
SHA512
d0e068d18c23198620460ebcbba03ccb6a1f958336ae02469c5e0ca4f19cf3c760e1af9000b87e8dcbd61f7bab28164a8876121467ba6b372303e08619620b8c
-
SSDEEP
768:phQz3L3E539AyQSxqdUqWRVQWzu2z8jixU9hFbMjBnND5jlWdp1X6OE7:pQ3L3E5tAhSxQ8RVQWDz8j2kh+BLjodF
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
msnliveq.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List msnliveq.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msnliveq.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications msnliveq.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Microsoft Messenger Update = "C:\\Users\\Admin\\AppData\\Roaming\\msnliveq.exe" msnliveq.exe -
Executes dropped EXE 2 IoCs
Processes:
msnliveq.exemsnliveq.exepid process 4152 msnliveq.exe 3900 msnliveq.exe -
Processes:
resource yara_rule behavioral2/memory/1116-0-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/1116-6-0x0000000000400000-0x0000000000426000-memory.dmp upx C:\Users\Admin\AppData\Roaming\msnliveq.exe upx behavioral2/memory/4152-13-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/4152-22-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msnliveq.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3316742141-2240921845-2885234760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Messenger Update = "C:\\Users\\Admin\\AppData\\Roaming\\msnliveq.exe" msnliveq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Messenger Update = "C:\\Users\\Admin\\AppData\\Roaming\\msnliveq.exe" msnliveq.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a33422028510cbe1381f556208fb46b2.exemsnliveq.exedescription pid process target process PID 1116 set thread context of 2640 1116 a33422028510cbe1381f556208fb46b2.exe a33422028510cbe1381f556208fb46b2.exe PID 4152 set thread context of 3900 4152 msnliveq.exe msnliveq.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
a33422028510cbe1381f556208fb46b2.exemsnliveq.exepid process 2640 a33422028510cbe1381f556208fb46b2.exe 2640 a33422028510cbe1381f556208fb46b2.exe 3900 msnliveq.exe 3900 msnliveq.exe 3900 msnliveq.exe 3900 msnliveq.exe 3900 msnliveq.exe 3900 msnliveq.exe 3900 msnliveq.exe 3900 msnliveq.exe 3900 msnliveq.exe 3900 msnliveq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a33422028510cbe1381f556208fb46b2.exemsnliveq.exepid process 1116 a33422028510cbe1381f556208fb46b2.exe 4152 msnliveq.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
a33422028510cbe1381f556208fb46b2.exea33422028510cbe1381f556208fb46b2.exemsnliveq.exedescription pid process target process PID 1116 wrote to memory of 2640 1116 a33422028510cbe1381f556208fb46b2.exe a33422028510cbe1381f556208fb46b2.exe PID 1116 wrote to memory of 2640 1116 a33422028510cbe1381f556208fb46b2.exe a33422028510cbe1381f556208fb46b2.exe PID 1116 wrote to memory of 2640 1116 a33422028510cbe1381f556208fb46b2.exe a33422028510cbe1381f556208fb46b2.exe PID 1116 wrote to memory of 2640 1116 a33422028510cbe1381f556208fb46b2.exe a33422028510cbe1381f556208fb46b2.exe PID 1116 wrote to memory of 2640 1116 a33422028510cbe1381f556208fb46b2.exe a33422028510cbe1381f556208fb46b2.exe PID 1116 wrote to memory of 2640 1116 a33422028510cbe1381f556208fb46b2.exe a33422028510cbe1381f556208fb46b2.exe PID 1116 wrote to memory of 2640 1116 a33422028510cbe1381f556208fb46b2.exe a33422028510cbe1381f556208fb46b2.exe PID 1116 wrote to memory of 2640 1116 a33422028510cbe1381f556208fb46b2.exe a33422028510cbe1381f556208fb46b2.exe PID 1116 wrote to memory of 2640 1116 a33422028510cbe1381f556208fb46b2.exe a33422028510cbe1381f556208fb46b2.exe PID 2640 wrote to memory of 4152 2640 a33422028510cbe1381f556208fb46b2.exe msnliveq.exe PID 2640 wrote to memory of 4152 2640 a33422028510cbe1381f556208fb46b2.exe msnliveq.exe PID 2640 wrote to memory of 4152 2640 a33422028510cbe1381f556208fb46b2.exe msnliveq.exe PID 4152 wrote to memory of 3900 4152 msnliveq.exe msnliveq.exe PID 4152 wrote to memory of 3900 4152 msnliveq.exe msnliveq.exe PID 4152 wrote to memory of 3900 4152 msnliveq.exe msnliveq.exe PID 4152 wrote to memory of 3900 4152 msnliveq.exe msnliveq.exe PID 4152 wrote to memory of 3900 4152 msnliveq.exe msnliveq.exe PID 4152 wrote to memory of 3900 4152 msnliveq.exe msnliveq.exe PID 4152 wrote to memory of 3900 4152 msnliveq.exe msnliveq.exe PID 4152 wrote to memory of 3900 4152 msnliveq.exe msnliveq.exe PID 4152 wrote to memory of 3900 4152 msnliveq.exe msnliveq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a33422028510cbe1381f556208fb46b2.exe"C:\Users\Admin\AppData\Local\Temp\a33422028510cbe1381f556208fb46b2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a33422028510cbe1381f556208fb46b2.exe"C:\Users\Admin\AppData\Local\Temp\a33422028510cbe1381f556208fb46b2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\msnliveq.exe"C:\Users\Admin\AppData\Roaming\msnliveq.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\msnliveq.exe"C:\Users\Admin\AppData\Roaming\msnliveq.exe"4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\msnliveq.exeFilesize
44KB
MD5a33422028510cbe1381f556208fb46b2
SHA1a6f7075faa0e6c318ab0930fa0b02e485e2c1506
SHA256ba4568175950b5113ba77dd77ed6d056b177d71d379e322773bd6af89ab2e4dd
SHA512d0e068d18c23198620460ebcbba03ccb6a1f958336ae02469c5e0ca4f19cf3c760e1af9000b87e8dcbd61f7bab28164a8876121467ba6b372303e08619620b8c
-
memory/1116-6-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1116-0-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2640-16-0x0000000000410000-0x00000000004D9000-memory.dmpFilesize
804KB
-
memory/2640-3-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2640-5-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/2640-7-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-34-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-32-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-41-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-23-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-24-0x00000000004B0000-0x00000000004B8000-memory.dmpFilesize
32KB
-
memory/3900-28-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-29-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-30-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-31-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-21-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-33-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-40-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-35-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-36-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-37-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-38-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3900-39-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4152-13-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/4152-22-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB