Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 17:49
Behavioral task
behavioral1
Sample
9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe
Resource
win10v2004-20240226-en
General
-
Target
9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe
-
Size
277KB
-
MD5
d037f5c167b01849d267696695a919ef
-
SHA1
457ae227d1b63f295afbe18b539ff3b258f44a32
-
SHA256
9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7
-
SHA512
dcfb23c34be7688c292376c605b38eab3087fccd42b3dcd1708062dfee63e972c01107db505c90dc4db2f982bb5ea54fe2f9df9227e87b996a0346d0ea4c9a21
-
SSDEEP
6144:6Z1gm4z+Rp4PCL8YM6c2G/FtmUPvo39UPdwNN4:6l4qnM6c26s39jNN4
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exedescription pid process target process PID 392 created 3340 392 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe Explorer.EXE -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exedescription ioc process File opened (read-only) \??\W: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\Y: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\Z: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\B: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\H: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\Q: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\S: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\T: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\U: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\V: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\I: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\M: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\L: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\R: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\A: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\K: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\J: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\N: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\O: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\P: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\X: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\E: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe File opened (read-only) \??\G: 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exedescription pid process target process PID 392 wrote to memory of 4748 392 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe PID 392 wrote to memory of 4748 392 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe PID 392 wrote to memory of 4748 392 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe PID 4748 wrote to memory of 2224 4748 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe cmd.exe PID 4748 wrote to memory of 2224 4748 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe cmd.exe PID 4748 wrote to memory of 2224 4748 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe cmd.exe PID 392 wrote to memory of 4960 392 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe cmd.exe PID 392 wrote to memory of 4960 392 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe cmd.exe PID 392 wrote to memory of 4960 392 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe cmd.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe"C:\Users\Admin\AppData\Local\Temp\9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
- System policy modification
PID:392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:4960
-
-
-
C:\Users\Admin\AppData\Local\Temp\9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe\\?\C:\Users\Admin\AppData\Local\Temp\9c5c1dc70479d5839604a61f5849dee0fc09075d220c07e28343fa6d49cdb7d7.exe -network2⤵
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:2224
-
-