Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
Main.exe
Resource
win7-20240221-en
General
-
Target
Main.exe
-
Size
840KB
-
MD5
3ac1784016395353a60fd664f87f099e
-
SHA1
133a0d95d1180d5734f2b1c6d1f38413bf3d75eb
-
SHA256
3a01ebe022072ba36fa2c26dda4ee848b3a95e60549cebec50c6d6ba08a95796
-
SHA512
dd26969c1ff30b4e397c19a2b1e6fbe17d0431836f7b113a7291dcb51a68c9ab5cd6c037799027292d05941c0772d729facfc24681bfbe9833138d62c32039cc
-
SSDEEP
24576:tw2S04YNEMuExDiU6E5R9s8xY/2l/daN1Ibt+rJ:twS4auS+UjfU2TW1Ibt+r
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation Main.exe -
Executes dropped EXE 1 IoCs
pid Process 4808 AudioDriver.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4808 AudioDriver.exe 4808 AudioDriver.exe 4808 AudioDriver.exe 4808 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4808 AudioDriver.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1584 wrote to memory of 4808 1584 Main.exe 98 PID 1584 wrote to memory of 4808 1584 Main.exe 98 PID 1584 wrote to memory of 4808 1584 Main.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Main.exe"C:\Users\Admin\AppData\Local\Temp\Main.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3408 --field-trial-handle=3488,i,1267426273081718772,6254127258555406296,262144 --variations-seed-version /prefetch:81⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD53ac1784016395353a60fd664f87f099e
SHA1133a0d95d1180d5734f2b1c6d1f38413bf3d75eb
SHA2563a01ebe022072ba36fa2c26dda4ee848b3a95e60549cebec50c6d6ba08a95796
SHA512dd26969c1ff30b4e397c19a2b1e6fbe17d0431836f7b113a7291dcb51a68c9ab5cd6c037799027292d05941c0772d729facfc24681bfbe9833138d62c32039cc