Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
abdd85862e392489bd66f02c1263b82c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abdd85862e392489bd66f02c1263b82c.exe
Resource
win10v2004-20240226-en
General
-
Target
abdd85862e392489bd66f02c1263b82c.exe
-
Size
148KB
-
MD5
abdd85862e392489bd66f02c1263b82c
-
SHA1
141dd84deb50b28bc8c0dd967f90fe9c72bfc62f
-
SHA256
0d1c4bc769fd7bafcb45af3d0c378d88b7344e068a0f99e7d840db375076efc0
-
SHA512
35af1d6506243d8e51daa9e1682dd1b80eea15910807a66fab5b5cdcf068a0590ff48228ba0e04bd7c1de78a7ffcc053d399fe9a1604723867c32d62e65ec1c2
-
SSDEEP
3072:zKh3u4iYTo52VcAcI2hw7+GVq8ZRpHtjoeA0ZKrri:zo3uZ2GC+Kq8ZRR+eFKa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1980 msdtc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ieuu = "\"C:\\Users\\Admin\\AppData\\Roaming\\CROSOF~1.NET\\msdtc.exe\" -vt yax" msdtc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 1980 4572 abdd85862e392489bd66f02c1263b82c.exe 97 PID 4572 wrote to memory of 1980 4572 abdd85862e392489bd66f02c1263b82c.exe 97 PID 4572 wrote to memory of 1980 4572 abdd85862e392489bd66f02c1263b82c.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\abdd85862e392489bd66f02c1263b82c.exe"C:\Users\Admin\AppData\Local\Temp\abdd85862e392489bd66f02c1263b82c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Roaming\CROSOF~1.NET\msdtc.exeC:\Users\Admin\AppData\Roaming\CROSOF~1.NET\msdtc.exe -vt yax2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5abdd85862e392489bd66f02c1263b82c
SHA1141dd84deb50b28bc8c0dd967f90fe9c72bfc62f
SHA2560d1c4bc769fd7bafcb45af3d0c378d88b7344e068a0f99e7d840db375076efc0
SHA51235af1d6506243d8e51daa9e1682dd1b80eea15910807a66fab5b5cdcf068a0590ff48228ba0e04bd7c1de78a7ffcc053d399fe9a1604723867c32d62e65ec1c2