Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 11:17
Static task
static1
Behavioral task
behavioral1
Sample
b7433dc4de9676276bba102f171358aa.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b7433dc4de9676276bba102f171358aa.exe
Resource
win10v2004-20240226-en
General
-
Target
b7433dc4de9676276bba102f171358aa.exe
-
Size
403KB
-
MD5
b7433dc4de9676276bba102f171358aa
-
SHA1
9c9f39850fe3a414651bab6c81b04b4d6d1523f0
-
SHA256
2a0295f5bab05005fd6e3bf733fcb5e5f153674ad01b8aaf2179e05d8580f3c7
-
SHA512
64a8e82899891fc809bf68c0c0a6f6d45e8b0dcba2445b77da2b2bc40895b48431aa8572096589450d48a2272200c4b17c0bc9539f5feaa46503cbfd3482b218
-
SSDEEP
6144:tBZn9oaRZ0RDG1NQv0Q/ldddHBDcuydIe/vgPux34toGwKMTMjexpnr90T:RlRZrNQv13ddH1crdrRxt4MgqrnyT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
b7433dc4de9676276bba102f171358aa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \\bG02401AnHmA02401\\bG02401AnHmA02401.exe" b7433dc4de9676276bba102f171358aa.exe -
Deletes itself 1 IoCs
Processes:
bG02401AnHmA02401.exepid process 5008 bG02401AnHmA02401.exe -
Executes dropped EXE 1 IoCs
Processes:
bG02401AnHmA02401.exepid process 5008 bG02401AnHmA02401.exe -
Processes:
resource yara_rule behavioral2/memory/1304-1-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/1304-81-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/1304-94-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/5008-95-0x0000000000400000-0x00000000004CC000-memory.dmp upx behavioral2/memory/5008-178-0x0000000000400000-0x00000000004CC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
bG02401AnHmA02401.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bG02401AnHmA02401 = "C:\\bG02401AnHmA02401\\bG02401AnHmA02401.exe" bG02401AnHmA02401.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2644 1304 WerFault.exe b7433dc4de9676276bba102f171358aa.exe 4040 5008 WerFault.exe bG02401AnHmA02401.exe -
Modifies data under HKEY_USERS 52 IoCs
Processes:
OfficeClickToRun.exeOfficeClickToRun.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,940 10,941 10,942 10,940 15,943 10,944 50,940 6,1329 15,944 10,941 15,942 15,940 50,943 15,944 6,944 15,943 6,1329 50,1329 100,1329 6,941 6,942 6,944 100,940 100" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,940 10,941 10,942 10,943 10,940 15,1329 15,940 6,944 50,944 10,941 15,942 15,940 50,943 15,944 6,944 15,943 6,1329 50,1329 100,1329 6,941 6,942 6,944 100,940 100" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "7202265,41816131,39965824,7153487,17110988,5804129,7202269,17110992,41484365,24262478,9179409,17962391,508368333,17962392,25036127,24262477,3462423,3702920,3700754,3965062,24262474,4297094,7153421,3462365,18716193,7153435,24262473,9179410,20502174,6308191,18407617,39125643,539756558,6104718,9179411,51475283,41185282,39389248,539756557,528570079" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "17110988,7153487,39965824,41816131,7202265,5804129,17110992,7202269,41484365,24262478,9179409,17962391,508368333,17962392,25036127,24262477,3462423,3702920,3700754,3965062,24262474,4297094,7153421,3462365,18716193,7153435,24262473,9179410,20502174,6308191,18407617,39125643,539756558,6104718,9179411,51475283,41185282,39389248,539756557,528570079" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b7433dc4de9676276bba102f171358aa.exepid process 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe 1304 b7433dc4de9676276bba102f171358aa.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b7433dc4de9676276bba102f171358aa.exebG02401AnHmA02401.exedescription pid process Token: SeDebugPrivilege 1304 b7433dc4de9676276bba102f171358aa.exe Token: SeDebugPrivilege 5008 bG02401AnHmA02401.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
sihost.exesihost.exesihost.exesihost.exebG02401AnHmA02401.exepid process 5044 sihost.exe 2892 sihost.exe 2604 sihost.exe 1116 sihost.exe 5008 bG02401AnHmA02401.exe 5008 bG02401AnHmA02401.exe 5008 bG02401AnHmA02401.exe 5008 bG02401AnHmA02401.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
OfficeClickToRun.exeOfficeClickToRun.exepid process 3576 OfficeClickToRun.exe 1748 OfficeClickToRun.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b7433dc4de9676276bba102f171358aa.exedescription pid process target process PID 1304 wrote to memory of 5008 1304 b7433dc4de9676276bba102f171358aa.exe bG02401AnHmA02401.exe PID 1304 wrote to memory of 5008 1304 b7433dc4de9676276bba102f171358aa.exe bG02401AnHmA02401.exe PID 1304 wrote to memory of 5008 1304 b7433dc4de9676276bba102f171358aa.exe bG02401AnHmA02401.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7433dc4de9676276bba102f171358aa.exe"C:\Users\Admin\AppData\Local\Temp\b7433dc4de9676276bba102f171358aa.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 8402⤵
- Program crash
-
C:\bG02401AnHmA02401\bG02401AnHmA02401.exe"\bG02401AnHmA02401\bG02401AnHmA02401.exe" "C:\Users\Admin\AppData\Local\Temp\b7433dc4de9676276bba102f171358aa.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 8403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1304 -ip 13041⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4064 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5008 -ip 50081⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\sihost.exesihost.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\bG02401AnHmA02401\bG02401AnHmA02401.exeFilesize
403KB
MD5ef4253e4e5f02525c366ed9ffdcd8ad2
SHA1e7a3115d7e8b53c066627b0e8a94a4852b41a55f
SHA25613d78282302efbd787ebe0b508915862a9e0e51f2e6fa93acf6bc70da365f2c9
SHA51278414311fa645f823e20281ebe879aca7a612157b330c7fe003599fed2a778f07dcb10b2906ffea95ddc3739db36ed0ba912746f83d92e712cc2187a68b40157
-
memory/1304-0-0x00000000006A0000-0x00000000006A3000-memory.dmpFilesize
12KB
-
memory/1304-1-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/1304-2-0x00000000006C0000-0x00000000006C1000-memory.dmpFilesize
4KB
-
memory/1304-81-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/1304-94-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/5008-95-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/5008-96-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/5008-178-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB