Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 00:21

General

  • Target

    aa868b27fdc3c9e2dce5868e4f75c6a3.exe

  • Size

    765KB

  • MD5

    aa868b27fdc3c9e2dce5868e4f75c6a3

  • SHA1

    1ca98056657bb4a871f9468722df94b88c14e3e2

  • SHA256

    505ae0a4f52a7917e6fda8902bbc47ff913c5c74abe3be30f87db9d075a6614a

  • SHA512

    ec7faa23ba717f212d2dddc32bb033a44891d06c56df59476e1ea9bb440b0f08d201a9756b07e52b04cfdbbba4b58ed7717069c8246f55238f8efd7ff4eb135e

  • SSDEEP

    12288:i3eo2TaTVCKnhk1W5A4N/Q8u7MHIVvMxA11lUByFen4veANO2v2LX5MnuWH1TmdJ:k52XKy1W5AcXETdQ4ve0O2vWDRv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa868b27fdc3c9e2dce5868e4f75c6a3.exe
    "C:\Users\Admin\AppData\Local\Temp\aa868b27fdc3c9e2dce5868e4f75c6a3.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3788
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\DELME.BAT
      2⤵
        PID:3908
    • C:\Windows\IEXPLORE.exe
      C:\Windows\IEXPLORE.exe
      1⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3204
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2220

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\DELME.BAT

              Filesize

              190B

              MD5

              de7030975edf137ceeeca8a4bc440d86

              SHA1

              e55e10f9fe6e4a8210c5881d6dc7b10977ea4bcd

              SHA256

              94bfc4d673aff92d97b592a51d2995301641469fbf3bf22d9caa94af3e58b106

              SHA512

              ed0bbfbdc120db401bc9ab868da5dc73d8873192b27a3ba646ef4521aee0555cc5a1fd9238f66bef890a96e0f584cd3d7e570d2d26f5b182af585eca34c1e468

            • C:\Windows\IEXPLORE.exe

              Filesize

              765KB

              MD5

              aa868b27fdc3c9e2dce5868e4f75c6a3

              SHA1

              1ca98056657bb4a871f9468722df94b88c14e3e2

              SHA256

              505ae0a4f52a7917e6fda8902bbc47ff913c5c74abe3be30f87db9d075a6614a

              SHA512

              ec7faa23ba717f212d2dddc32bb033a44891d06c56df59476e1ea9bb440b0f08d201a9756b07e52b04cfdbbba4b58ed7717069c8246f55238f8efd7ff4eb135e

            • C:\Windows\IEXPLORE.exe

              Filesize

              143KB

              MD5

              8de4c20260c3b46bf22202fe60e5b5ce

              SHA1

              75ef01ee0ebfc5638fcbad42717413e1a21bd257

              SHA256

              514941ae6e717a5bc0a06a2265f56547edbf11d076f0a72d95e6f86e0c681319

              SHA512

              38dcb7bcb28fdcec14bfaa8dc26e98cafbccc5adb0e5210c32a2c9070fd2d1003f04573b349a234f90e9d7aa0a775b090433216f57972f794bc5af6875bfcb2f

            • memory/3204-4-0x0000000000010000-0x00000000000D8000-memory.dmp

              Filesize

              800KB

            • memory/3204-6-0x0000000000590000-0x0000000000591000-memory.dmp

              Filesize

              4KB

            • memory/3204-8-0x0000000000010000-0x00000000000D8000-memory.dmp

              Filesize

              800KB

            • memory/3204-12-0x0000000000590000-0x0000000000591000-memory.dmp

              Filesize

              4KB

            • memory/3788-0-0x0000000002290000-0x0000000002291000-memory.dmp

              Filesize

              4KB

            • memory/3788-7-0x0000000000400000-0x00000000004C8000-memory.dmp

              Filesize

              800KB

            • memory/3788-11-0x0000000002290000-0x0000000002291000-memory.dmp

              Filesize

              4KB