Analysis

  • max time kernel
    13s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/02/2024, 05:00

Errors

Reason
Machine shutdown

General

  • Target

    adc0af614ff9c4ffff8bde04e4eac8c3.exe

  • Size

    244KB

  • MD5

    adc0af614ff9c4ffff8bde04e4eac8c3

  • SHA1

    2443a4c8406a6055704ff2a5b98cfce441a01112

  • SHA256

    1eab8aa08a7dfda0e0a984440a9f607868999c4cf57416b04fbcb1e995c2d40e

  • SHA512

    2b910080fbb86bf3682d801e5e287a5d5faf973ad682c4e655c0269e8a4884f08fba9b24a454828d2b44f1f376aab717287ae4ef9a61f6c57b91ed1ee12050e3

  • SSDEEP

    3072:CwJIRWLyDoA8qVfJuzyzSzRqOjuKN6oI11GWpY8xnIkSWCuWSSNrOsRzo:CLsBqVxWR3juKN6txY8xIkkuWSSNC

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adc0af614ff9c4ffff8bde04e4eac8c3.exe
    "C:\Users\Admin\AppData\Local\Temp\adc0af614ff9c4ffff8bde04e4eac8c3.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\bip.exe
      "C:\Users\Admin\AppData\Local\Temp\bip.exe"
      2⤵
      • Sets DLL path for service in the registry
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3452
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Iprip
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3964
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39be055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bip.exe

    Filesize

    20KB

    MD5

    6ebd8fb2fe0af8f7f11ef364936f9f05

    SHA1

    4183e059677608968f450d94a744b2e86956d364

    SHA256

    fc6bde1da77de53f6013f56efaea4d6f1e40ac26eecd320644d197853334c72e

    SHA512

    465525ce0baaab5c8585cf392ef1da9d47d7017759eb8c45ed288d857d4bd32eac1592041999dcb6e6239439f6cc1df236154194e987dda04873c071c5d37856

  • C:\Windows\SysWOW64\fsutk.dll

    Filesize

    116KB

    MD5

    315af741724e59bfae8fe19b5c91ae79

    SHA1

    a3e1e26de091a5be4428196d67b0b804290c8c66

    SHA256

    dad1a3eab66cd0642d2fa55f7c9bd756da2ff91de2ae59ff7c32572cb702c7f4

    SHA512

    c729a636434176ff3f527b6b7b90670fae798b8adb681bfa9808149ffea7856226b36bf988b13fa75a6600d39067a5b96bdf174381e82d0a2520a0f710973c67

  • \??\c:\$Recycle.bin\int.dat

    Filesize

    220KB

    MD5

    51484d1850f98199d07537227959f83e

    SHA1

    7b7f00a00b55f355dbb089f00a0adaface7a0160

    SHA256

    7cd2a15998f52c9e67fa1027f51f0b3dd927564eed2da070577144ec2f722442

    SHA512

    7a728a24b23797def6ee084b08872e540f9a225a1779022a508cef58aed9f4b37158a19de4fd814ec9b95cbaed330572ecb04789fd41daeb56c8eda1d2138b44

  • \??\c:\windows\SysWOW64\liprip.dll

    Filesize

    84KB

    MD5

    3a551ec3ea261492604f53d671f6ae82

    SHA1

    179fff05ebda2156887673e0200f0088851072a4

    SHA256

    4ed57248e3d3d54e28d8528d0d8d3fe689659e8bc6152caca1eb202921384548

    SHA512

    944c33e5c56a437986f4f0512911018e7c06fcdf06b965e0d56a304314183c59dfb12e4ccc07e0b16b4c3a2fd6b6091c4e02d224ea6615b8bb6b3f7653a8a733

  • memory/3964-17-0x0000000001770000-0x0000000001790000-memory.dmp

    Filesize

    128KB