Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe
Resource
win10v2004-20240226-en
General
-
Target
4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe
-
Size
213KB
-
MD5
f8ff38f33ff5305c3516e12f3bceb368
-
SHA1
a70237cfd46f6256c9ff8dfcd64c6da6edc999ec
-
SHA256
4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382
-
SHA512
9b8ea5995f965561a4cf792d91ebad11c6fe543ac3c9d1e6fdf0b2d9af65f57e078b1c1387684180149d2e86e9209edc215092e421fea4f62ed8a5ec03d405e8
-
SSDEEP
6144:ztvBPnU1b7e9SQii1EkoNlhlrQ2ZrM2xF:Zv1nWdQP1EDhZPxF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2536 Isass.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" 4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" 4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe 4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2020 4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe 2020 4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe 2536 Isass.exe 2536 Isass.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2536 2020 4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe 97 PID 2020 wrote to memory of 2536 2020 4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe 97 PID 2020 wrote to memory of 2536 2020 4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe"C:\Users\Admin\AppData\Local\Temp\4ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5f8ff38f33ff5305c3516e12f3bceb368
SHA1a70237cfd46f6256c9ff8dfcd64c6da6edc999ec
SHA2564ec22c5c9d888551a31f7be78deacfeb5ff20abef7d3a7c811ab21f1eac59382
SHA5129b8ea5995f965561a4cf792d91ebad11c6fe543ac3c9d1e6fdf0b2d9af65f57e078b1c1387684180149d2e86e9209edc215092e421fea4f62ed8a5ec03d405e8
-
Filesize
640KB
MD58f8b55be221b59e7e4cadf180ad939d7
SHA12c193cb2adae5ed3a5c0d70848bf30fb072bdf5b
SHA25662a141e70fc12873b628ffb275bcd652ae13d2e6ff2d14b52520a732b7c2ab67
SHA5120132aa4b1a9277837941d00aeae21052277dd52a694a1730d460b0cc033eee6ce46a4282513dc88b89290d219efb3d03cc48ae51a79747cad6ff39cda54c1755