Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 02:38
Behavioral task
behavioral1
Sample
dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe
Resource
win7-20240221-en
General
-
Target
dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe
-
Size
22.7MB
-
MD5
bfc65ce21e22544286826e26a5ec45ef
-
SHA1
e27dc55c11a9b10ca3966f1f7fec14e064c7d717
-
SHA256
dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb
-
SHA512
9866b4573795264972abf7c31f7056cdc17edc4c249fba487a0c583866991cc168ecb2e8e95c6ed2bb3f9e31bd4f485ae7264e7d555dcccf573417b1b50fc7b3
-
SSDEEP
393216:4CniWcrE+N29tz2cDhctoqfv42GhoxAq8kZ/Pnin2um6h/rhg03X1nqW4A0ySQyG:fniWc4+N8tkv42GhoxAcs/rhtXdN4wp
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WanWD-xfq-3dmgame\MiniClient.exe cryptone C:\Users\Admin\AppData\Roaming\WanWD-xfq-3dmgame\MiniClient.exe cryptone C:\Users\Admin\AppData\Roaming\WanWD-xfq-3dmgame\Flash32_29_0_0_171.ocx cryptone -
Executes dropped EXE 1 IoCs
Processes:
MiniClient.exepid process 1680 MiniClient.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
MiniClient.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MiniClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3912 1680 WerFault.exe MiniClient.exe -
Processes:
MiniClient.exedbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\MiniClient.exe = "9999" MiniClient.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe = "9999" dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exepid process 1456 dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe 1456 dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MiniClient.exepid process 1680 MiniClient.exe 1680 MiniClient.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exedescription pid process target process PID 1456 wrote to memory of 1680 1456 dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe MiniClient.exe PID 1456 wrote to memory of 1680 1456 dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe MiniClient.exe PID 1456 wrote to memory of 1680 1456 dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe MiniClient.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe"C:\Users\Admin\AppData\Local\Temp\dbea63a5288ad81e108db81ab75b9b78f60469facb9fe7ef768c6a3f7710d5eb.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WanWD-xfq-3dmgame\MiniClient.exeC:\Users\Admin\AppData\Roaming\WanWD-xfq-3dmgame\MiniClient.exe2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 22243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1680 -ip 16801⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3808 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\GH_28FF.tmpFilesize
893B
MD5388aa031ce9226133d436591bf387a1c
SHA187de6709cafd46ca946a784dfe57811aa20ca02b
SHA256cf8be59a9eb914c8248ab07bafdd3ecc45cec0e2206dd093673029c324d4a505
SHA512945a256376dbc28f8b7dc37ec36b0279d45baee265497fc9eff9dcc558023880ee30e24c5433240d3926672114afd53e3cc44c324210249cfffd4d5aa329b8a3
-
C:\Users\Admin\AppData\Roaming\WanWD-xfq-3dmgame\Flash32_29_0_0_171.ocxFilesize
2.5MB
MD5b49a64e9aa251a9163042f6663e953d9
SHA1ace2d5eea00cd79acebe372ebe3967a800681795
SHA256043091e41185ead31210cdbebacb8c157684066d3dad029db1f43887382601ca
SHA51245f3363b1363507b471d0521fd822afe0326758a65233e36364412be6f521fe8cfa730c4e3cb5646c6fe191bf6d078c82ad5de269523b125b92813bdc6a68411
-
C:\Users\Admin\AppData\Roaming\WanWD-xfq-3dmgame\MiniClient.exeFilesize
3.4MB
MD5aae39698110de18685290209183c3f6b
SHA13730fb9b16cd2f4c9ca3c4861a878dfceefe56eb
SHA2567d5d1936fe81a64186de73fc1bdb9cd94a03fc01276999180a52d53dc872b268
SHA5128bbeb7a105bb3e1f111bec280b16603fcf565ae0804963657199f1c96496fe2894c0de122a987ec5fc7cada3850eb0c665cf83da9b05f6d6ec01fd36019add17
-
C:\Users\Admin\AppData\Roaming\WanWD-xfq-3dmgame\MiniClient.exeFilesize
3.3MB
MD58c3fdb46057b75e49c49af0e425bd227
SHA151e4c40df8c520ace32b50099de1f210599612a7
SHA256b1a3d95dabc64ed9cf5fee49b7b2fd0a106d197a6a5c10f573404028101c5837
SHA512f433cccc51b5399f889ad671e7f008bd02bca4fc084cfd376e711a47cdf0a6f7d04f40c507e2627c08fbdca235fa8185f4a64a983c8221511f72dc9af929d556
-
C:\Users\Admin\AppData\Roaming\WanWD-xfq-3dmgame\cfg.iniFilesize
167B
MD583ca3a223ff85522bb7089f88f7b10d0
SHA1ab86a3dda4471691c1e7292f0449aad321cd2dc9
SHA25600a4a5549ac1d4675e63394991d949d21bebebd0bd3dc56b822bf156a1d9bc88
SHA512291ae1f0a23f00aee2e333d531b6a8bb7d26c0306af551832aae7b90a04a43b54bd9f8edf6114a7666f09d8fc0395c30d8657150397bac35d4bad94b5efd91cd
-
memory/1456-4-0x0000000003BA0000-0x0000000003BA1000-memory.dmpFilesize
4KB
-
memory/1680-26-0x0000000003860000-0x0000000003861000-memory.dmpFilesize
4KB
-
memory/1680-39-0x0000000003860000-0x0000000003861000-memory.dmpFilesize
4KB