Analysis
-
max time kernel
158s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe
Resource
win7-20240221-en
General
-
Target
051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe
-
Size
667KB
-
MD5
911c8400a5291b4ba15f0b67bcde2263
-
SHA1
77a2104a5d611419f681233e0ff9be05ff19ec01
-
SHA256
051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0
-
SHA512
3b1a26abd50ce35a5cc989b2f3684560d077b88e6226bd6924300c61ad452e657327cf91968d3b2d00363e3af9f9489f6df0b246c1f052edd8c4ae1d76e12687
-
SSDEEP
12288:q/vpWeFENjQBlzV7IksYhLRwXI3Kc9ZdkfnPEvo4F75JSGCd:q/v4DNjcZ6GXKIdkfPXQJM
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 42 IoCs
resource yara_rule behavioral2/memory/4936-2-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-5-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-7-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-8-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-9-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-110-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-111-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-112-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-113-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-117-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-118-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-119-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-120-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-121-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-123-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-124-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-137-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-139-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-157-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-155-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-159-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-178-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-171-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-182-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-183-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-184-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-185-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-186-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-187-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-188-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-190-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-193-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-195-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-196-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-197-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-198-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-199-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-200-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-201-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-202-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-205-0x00000000022B0000-0x0000000002406000-memory.dmp UPX behavioral2/memory/4936-207-0x00000000022B0000-0x0000000002406000-memory.dmp UPX -
resource yara_rule behavioral2/memory/4936-2-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-5-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-7-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-8-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-9-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-110-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-111-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-112-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-113-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-117-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-118-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-119-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-120-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-121-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-123-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-124-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-137-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-139-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-157-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-155-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-159-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-178-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-171-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-182-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-183-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-184-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-185-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-186-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-187-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-188-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-190-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-193-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-195-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-196-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-197-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-198-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-199-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-200-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-201-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-202-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-205-0x00000000022B0000-0x0000000002406000-memory.dmp upx behavioral2/memory/4936-207-0x00000000022B0000-0x0000000002406000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe Token: SeCreatePagefilePrivilege 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4920 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe 98 PID 4936 wrote to memory of 4920 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe 98 PID 4936 wrote to memory of 4920 4936 051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe"C:\Users\Admin\AppData\Local\Temp\051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe"C:\Users\Admin\AppData\Local\Temp\051d60cf8422fe76eebaec7edf5caec699e21604a4a9008ee4c19120096f89c0.exe" /_ShowProgress2⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4760 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57a276b1b63e144b39a6f3eeb7f514672
SHA116d906483255b086eccfd74f77636d45be640351
SHA256c1ada63a257cc434b96624ff37283c87fe27f7da31df1ba78bd31dbf55032cdb
SHA5121118928de55e2e6cd5a3e9e11181abcd7cb281a2229dcefbc79aa3158a1dced587886fb32e55b87b32351b068dd9e1bc9a70a22226007b8e79844c209c8689f1
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
5KB
MD52bde1d7efe6a6573c8de1b74899c2339
SHA113e4e5425818bfe2d393a543529a4f296f2d5702
SHA25624f07d26a87cfb6d66c4844145b1a00dc8b8bcf2368f2503441a0cf6312edcd1
SHA512daaac3d2a15b95516fdc209e41f3b75c781f2860cd4005c82ada54e9fbdaf1944e2032d45a87a2e799a7e208840f3c47aa306d63c47dfaab1082b0b63d3e617e
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
4KB
MD5b24d84cf4249db2ada3d342c70d5163d
SHA1208034eafee6f328f169be2ce68e50c831bdc35f
SHA256044afcd020218a480abc496c7674c9d832887586e0a4bb97102745c8265a8358
SHA51270ad29c6f22300a46ab3b59711616a59eae95f9e5bde45c450319d6e84b71f1b8c89d60001a27a8f6be4557dc89d20bcd8b5c61bbe53e335dceea5b0a0b903e1
-
Filesize
674B
MD5ad176366ebe059e8abd488783a76bbf5
SHA11284ba936a3324fd831abdf6be2ada966d5d1ff7
SHA25659830ddcb786e0919c64992ff23a691ac2461027bfd76d3d5fdb0c00c5ed9aaf
SHA512455bfe612b882fc85f75b5ccd933fe67d12c529cd9f4bccb3195e793aa713502567ec5059c1adfb95cfc3c51445d40fb11e4c968102f9014e701dd9e173e2fb8
-
Filesize
1004B
MD525407354a0e3e5a141aa10a00801de76
SHA180c8d5848c442d4a5f829955cae79999ace65b3a
SHA256b9c3126c4883a9c9b3e84a3745e87ff39d299476dbd0077b9f628cb4a31b3076
SHA5127bbc40b9553d0924d89b0ff9a603c0371df7d7fff14ad782a58af16840246a765425ba49e9c7ab8dde61d2b896a5238ea8137f1d35108fa6ad5983f5c147759b
-
Filesize
254B
MD50d75708d98e011f6027ac903c7c36a3d
SHA101efee78ccb8dfb34aea9503a39d2db15192bcd7
SHA256ac178bfeaba3450abd96cc51718c6ac8a44fb061edb759a5a029f35d766b609f
SHA512be96106172398b5c0c4f52450b56b390e0003b5bc233f8f1cec7eeab8078b78f06e28a8e2dd7dfe8c30a160b84d77e7abc3f89b87eb8176357e352338e2acaf4
-
Filesize
253B
MD543fae9b8361c534953dcbc5deb6e71ea
SHA1c16f6d4141b699f12c3ed8f68036c8469eeb2a5d
SHA2564c2210f9defd73ed3bd817d55fb9e303d7bf470e90f3dd5bb9132697138a5984
SHA512d7cd648417e8736a98a3cb0ccd9083e00e914164aaf476f78712701495b5418e27a3bb1e9fff01abd3984a8eb754b567cde37fe228b8c5e3db10741e9910e0f9
-
Filesize
10KB
MD557ca1a2085d82f0574e3ef740b9a5ead
SHA12974f4bf37231205a256f2648189a461e74869c0
SHA256476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA5122d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c
-
Filesize
226B
MD56e001b86bca7b00cdfcc0a6d180bac8f
SHA1af69e7d0462aa3c5370ae30f67c1476931e89afc
SHA2561c36900402b79d75890e7aa44ef2788af16919d178db49928b4cc949b2b0661d
SHA512e5bb0e49e47cfce57b5f0e94bfb2e75af8b32c6bb0187105ddcb04847a22983917cc6058fe5da8f9f82ee9537d1dae32a82679f3d8ca863efa8c67e2fe216d6b
-
Filesize
493B
MD5818b8908ace0ccc5fecbca20f2919587
SHA1e599b4229d622c36bc6cd5b155c94c50d1a68b86
SHA256ad2ec992fc336af09f7be4a652d240936a08bf522d10ff7fbec5dbfe0c4d332d
SHA5127d63287a12f519524146f7ed620aee6724489fa351752e7eb64e99fae098e524e744e570d2b7abc21f89064cff2bdaa9864f7f0cda9fb9ca861d1df9a45bcd9f
-
Filesize
104B
MD535a600a752d3074501de31a516860499
SHA151eac62cf77a0b88a3e9cb9ee6f85def21fd4bcf
SHA25614e064857751b23da7bbe40861ef4caf99b2496227507b8e3108fbac6d901f75
SHA512046ec179571d239bfb2d51be9837f96d9afebf2e5db77bba0f4a25ce8716d37581a3f9753bd2dbb04c47711699a9d93987bceb71df0b8becf8c577d660320069
-
Filesize
812B
MD5eabb61abba55f80af418fa1128d1548d
SHA1a5ee1d55de2cc60966039120c830fc19cefb0351
SHA256717f3f02f5d5fd1478b6d2ec44acef6e70bb8f1adcf2dc030c08b92e851737e1
SHA512d232072c9540bf0e2fd56f353c2cc83518eabf8282cc02d9f8bec81c0341287ada29ba79f2a515d68722658686b6cce97be138a48f44409562d9a567af200bd6
-
Filesize
681B
MD55f8dcbf4ebc42ad95cfc4d9401283972
SHA1e4060ea37daa2953bfdf8a773e447143f6365e75
SHA256931193720d26f0007ad223fca1a440f4866047a0ca96f5d29de3e62e7ba6a731
SHA512f918c4b834dff01c82f4b0063708d9155aef87b40fa3ae101d5d0a761ed17a348ff6ba4fb5f1e6ba4921698dcbb3e8291a25e48d180092107cb05660d948a61d
-
Filesize
2KB
MD5702a944b858b3ba077977e2dc4e5c999
SHA10f81cb962e0868815407aa5bff738e0e644e8987
SHA256bbb5e870f69bb7f6c315f3d3fc25481db7153abebdefc176f68d333a2e000664
SHA5120f46f489a5a67b53c7c6be2f2fa212d6f167ff192abc79801066d59a11ee7e2fe3df9697c8f87777729c95bee703108e465e091bf49632b89491685ae9976c68