Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe
Resource
win7-20240221-en
General
-
Target
99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe
-
Size
869KB
-
MD5
a1e7945e74bf923ae4f1026788efea0a
-
SHA1
3163f414709ba341f28eeefe1f7dd5e0bb610c8a
-
SHA256
99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1
-
SHA512
683b3fd54564253b534be552cf8e03b1779aae084c7af992f601e20c3a252b7356e9fa7af74852b9063178fca6c82257b503166361b84610a0cb000a04d8d201
-
SSDEEP
12288:ExK4t1ZCpDXFBRE7loUE8ie4nleGW7OKywcuto0IjxkJy09MvTno1p93VCIsfGKi:Ert1YpDDa7GtreqfiTZIyR6no1P3V6m5
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 4916 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 4916 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 4916 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 4916 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 4916 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 4916 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4240 4392 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 96 PID 4392 wrote to memory of 4240 4392 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 96 PID 4392 wrote to memory of 4240 4392 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 96 PID 4240 wrote to memory of 4916 4240 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 98 PID 4240 wrote to memory of 4916 4240 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 98 PID 4240 wrote to memory of 4916 4240 99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe"C:\Users\Admin\AppData\Local\Temp\99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe"C:\Users\Admin\AppData\Local\Temp\99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe"C:\Users\Admin\AppData\Local\Temp\99a6de420fa86f0e0a84e67cf970dfd7bc5289cf9ede1e93b56dd548ed1c59d1.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4916
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD59042e311fd7a8eb08c1fdd60f97854e3
SHA1f0ca96ace58b2d38990eb341d0857799fce12bf7
SHA256aa91662713834c8eb0e2d85e50d560cf1219a345196e94d27cd76a732eea045b
SHA512a88baa9dab5a63e48de0e303c5317427a178e9f792993b0715d4366c4ef5255d8c293aa88278ad467e12a8f21657c2621d9880790ea575df08b84ebabb8088f8
-
Filesize
200KB
MD5c2ac0c02d7d036e226bee60bd58d6959
SHA1a271ae6fb59606395ee6fee3bdfd10e65b6d7759
SHA25656ec445510f70b40e0fc67b38fa94bb6f184519bdb555e8eadda82e05e3063a0
SHA51205888855c588611489b6b338dff8982ed6293d4f32d9a4970d950fffc3f7456e45bee19467388dda73fe29f832705ad76740ea864d71e9f39e59744c2e6b0196
-
Filesize
494KB
MD5a6b2b32da766e6e79c81073ad4c19716
SHA10c1502b829105bdc13c4f075842833e5113c92da
SHA256850c99ae0349faa19bd5218aec4790f34a2a541e8304e4ecc2393ac39a50d327
SHA5125e2e63bf0e5d801d194351a1028b296fde07a331ac0a9388e07bae3c990e1e9dc45fab0826e455803e113f2e48b61bbf40038fd1c2754e0ebc2a8befc445c6ab
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774