Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
b469f567818d7294d1191a102316892b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b469f567818d7294d1191a102316892b.exe
Resource
win10v2004-20240226-en
General
-
Target
b469f567818d7294d1191a102316892b.exe
-
Size
102KB
-
MD5
b469f567818d7294d1191a102316892b
-
SHA1
e78c11722f819ee8090c6a0974a46f631cbf1d78
-
SHA256
827544cad56df6277693509adbbcb6eb2339b3f76b4688fc62531c07a8405bd9
-
SHA512
4417399a329711d57d24b6bca89a4e55ec883ca6ed7f820bae8851277ee3bd15f4b6bb2d98841ecd821d93b67cd006dfb78683e9b28acf73047750b564032178
-
SSDEEP
1536:I2j6CR+D5e/otjAYOhHNN0W5qtKP6RykZ7XrvePQfDOyPhvhEL5:IQ+DM/otjArhHNN75dO97XrvnfDh85
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation b469f567818d7294d1191a102316892b.exe -
Executes dropped EXE 1 IoCs
pid Process 4476 b469f567818d7294d1191a102316892b .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mc42.exe = "C:\\WINDOWS\\mc42.exe" b469f567818d7294d1191a102316892b.exe -
Drops file in Program Files directory 29 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\grv_icons .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\7-Zip\Uninstall .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare .exe b469f567818d7294d1191a102316892b.exe File created C:\Program Files\Mozilla Firefox\maintenanceservice_installer .exe b469f567818d7294d1191a102316892b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\dbcicons .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32 .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\lyncicon .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\accicons .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc.exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32 .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\joticon .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\misc .exe b469f567818d7294d1191a102316892b.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\msouc .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer .exe b469f567818d7294d1191a102316892b.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe b469f567818d7294d1191a102316892b.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\mc42.exe b469f567818d7294d1191a102316892b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 18 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\uk-UA\ieinstal.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\uk-UA\iexplore.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\en-US\ieinstal.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\ja-JP\ieinstal.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\fr-FR\ieinstal.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\fr-FR\iexplore.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Windows NT\Accessories\en-US\wordpad.exe.mui b469f567818d7294d1191a102316892b.exe File created C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Windows NT\Accessories\en-US\wordpad.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\de-DE\iexplore.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\es-ES\ieinstal.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\ja-JP\iexplore.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Windows Security\BrowserCore\en-US\BrowserCore.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\de-DE\ieinstal.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\it-IT\ieinstal.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\it-IT\iexplore.exe.mui b469f567818d7294d1191a102316892b.exe File created C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Windows Security\BrowserCore\en-US\BrowserCore.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui b469f567818d7294d1191a102316892b.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ C:\Program Files\Internet Explorer\es-ES\iexplore.exe.mui b469f567818d7294d1191a102316892b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 896 wrote to memory of 4476 896 b469f567818d7294d1191a102316892b.exe 89 PID 896 wrote to memory of 4476 896 b469f567818d7294d1191a102316892b.exe 89 PID 896 wrote to memory of 4476 896 b469f567818d7294d1191a102316892b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b469f567818d7294d1191a102316892b.exe"C:\Users\Admin\AppData\Local\Temp\b469f567818d7294d1191a102316892b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\b469f567818d7294d1191a102316892b .exe"C:\Users\Admin\AppData\Local\Temp\b469f567818d7294d1191a102316892b .exe"2⤵
- Executes dropped EXE
PID:4476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD59185a78d36428d20a08bafb2a01b1dd5
SHA17db0a8726fc21356cfd4ff72d216a49d7b606a6c
SHA256ceea1eb0d013b66f1dd79871e784f55f9c674a77832104706ef621ccf80f04e8
SHA512b2cb46860daa0ff9977cf020022e29690e50a821381d233c6eece297eef4803b4f9214fc4a2de253f37787c49516f292222f71959d0fb1df5645b081803638a4
-
Filesize
66KB
MD56e88dff915075e8ee3cbf0a68c35181b
SHA138e4a397812831e46d574924c24a1a45971e5b78
SHA2562638130d3bf08fa6722d21f495296ef5eeeb01d45b360958f5efce8effa153be
SHA5122b9c5b806c40a2e3435a33574e0d6fda37a0316f1000c9a155609db114938ffaae5ca0366c0e92946d3c95b0e448b73241c07271ab49b49107b364b94a481737