Analysis
-
max time kernel
154s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
General
-
Target
8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe
-
Size
814KB
-
MD5
daeeb64bc3b2ca69d5062b932d9f5486
-
SHA1
d958e304dbd45b11f414034799e005510ff2d94d
-
SHA256
8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679
-
SHA512
6db8fc36dfd4b0ce9c4e15f27c25760cd361f78bffbc8e39796f846f324b58fb90800fe9ca6c1f2e35f415ae7ba880730aeaa4a90621bb1634b7c12e04742d0a
-
SSDEEP
12288:6JTQdb6aT/+OkC2WOPASrfuhheB0IyXUJW+QiAukU30+9Ir/CSQC:mTQdb6aTfkC2WOIOI4qIwUk+T/G/CA
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 54 drive.google.com 55 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2416 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe 2416 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2248 set thread context of 2416 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe 101 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\hotdoggen.ini 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4744 2416 WerFault.exe 101 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2416 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe 2416 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2416 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe 101 PID 2248 wrote to memory of 2416 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe 101 PID 2248 wrote to memory of 2416 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe 101 PID 2248 wrote to memory of 2416 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe 101 PID 2248 wrote to memory of 2416 2248 8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe"C:\Users\Admin\AppData\Local\Temp\8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe"C:\Users\Admin\AppData\Local\Temp\8634a3db542e996337729ffab3913e48633f6422d1cde9a6f743a42a3bf75679.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 10603⤵
- Program crash
PID:4744
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4432 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:2372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2416 -ip 24161⤵PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
50B
MD570345464ba62a9453db2f24c1bc10881
SHA162fe4814d1b6082b46c196734b9eaf33b9b691bb
SHA256cc7e912d757a17a09ced10401c69d122b7972d4f9f6e26705e18a8cfe3ebef40
SHA512b0ed1640898ebf66797489862be3acdff589b161106c688e0536cabd91f673a75126a70b9363b078d8c88144d547ded4e8980e457c8e75e1477aadbb5414ae3a