Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
b68a70c7f715162ba2ab0231463bc25a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b68a70c7f715162ba2ab0231463bc25a.exe
Resource
win10v2004-20240226-en
General
-
Target
b68a70c7f715162ba2ab0231463bc25a.exe
-
Size
652KB
-
MD5
b68a70c7f715162ba2ab0231463bc25a
-
SHA1
2bc2b141a5e0ee575e7f5f76debdeebfb9b3b38e
-
SHA256
def4fa1479486667788cb7a0c1a193fb57a87a535f745cc55af41ad473ac38fd
-
SHA512
e920648be3f28742f51b5b1f8758e791511c3387761aedb7e2f180f7285588c2b452a96198f6c93de826486adf254cb861cd5ef84346f50d8e26b79fd8cf8b86
-
SSDEEP
12288:J/IXt3Ax4NnTm5RtDOcX1n+eE0TBnazyIxHV1t868+hi8ZTCGfyi:hI93cqna5Rt6cX1n+ezTBnaht/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4784 taskgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\taskgr.exe = "C:\\Windows\\system32\\taskgr.exe" b68a70c7f715162ba2ab0231463bc25a.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskgr.exe b68a70c7f715162ba2ab0231463bc25a.exe File opened for modification C:\Windows\SysWOW64\taskgr.exe b68a70c7f715162ba2ab0231463bc25a.exe File created C:\Windows\SysWOW64\taskgr.exe taskgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 416 b68a70c7f715162ba2ab0231463bc25a.exe Token: SeIncBasePriorityPrivilege 416 b68a70c7f715162ba2ab0231463bc25a.exe Token: SeIncBasePriorityPrivilege 4784 taskgr.exe Token: SeIncBasePriorityPrivilege 4784 taskgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 416 wrote to memory of 4784 416 b68a70c7f715162ba2ab0231463bc25a.exe 96 PID 416 wrote to memory of 4784 416 b68a70c7f715162ba2ab0231463bc25a.exe 96 PID 416 wrote to memory of 4784 416 b68a70c7f715162ba2ab0231463bc25a.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b68a70c7f715162ba2ab0231463bc25a.exe"C:\Users\Admin\AppData\Local\Temp\b68a70c7f715162ba2ab0231463bc25a.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\taskgr.exeC:\Windows\system32\taskgr.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:3080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652KB
MD5b68a70c7f715162ba2ab0231463bc25a
SHA12bc2b141a5e0ee575e7f5f76debdeebfb9b3b38e
SHA256def4fa1479486667788cb7a0c1a193fb57a87a535f745cc55af41ad473ac38fd
SHA512e920648be3f28742f51b5b1f8758e791511c3387761aedb7e2f180f7285588c2b452a96198f6c93de826486adf254cb861cd5ef84346f50d8e26b79fd8cf8b86