Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 05:28
Behavioral task
behavioral1
Sample
bff5fecfbb814b0565a627c7c0a65f60.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bff5fecfbb814b0565a627c7c0a65f60.exe
Resource
win10v2004-20240226-en
General
-
Target
bff5fecfbb814b0565a627c7c0a65f60.exe
-
Size
36KB
-
MD5
bff5fecfbb814b0565a627c7c0a65f60
-
SHA1
2938804ffc44880f5c1ed126c4676655b234267f
-
SHA256
cfe0e620039776c31ca3b51330d30af8c961c1b68d2f7ec94da318eb4a73fda6
-
SHA512
03204475f3cd898f6dbe8431a4c9458f2dbdaa3983565baef7fd3c805c9044c61a7e16cc7a13463d1e157967802cabe7db4badf3a9c94cfa7cf827d0c3ac32ff
-
SSDEEP
768:hNH7nhU9mZzvky4wWPZrxSLXY+70YJN0wPTlga9NlLFlvHx:DH7WQWAyrALI+70YJ7PpFF5ZR
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run bff5fecfbb814b0565a627c7c0a65f60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\x9o22 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\h26lr2.exe" bff5fecfbb814b0565a627c7c0a65f60.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts h26lr2.exe -
Executes dropped EXE 2 IoCs
pid Process 1580 h26lr2.exe 3144 h26lr2.exe -
resource yara_rule behavioral2/memory/2788-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x000a000000023228-5.dat upx behavioral2/memory/1580-7-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2788-12-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1580-17-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3144-18-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3144-23-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1580-26-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\uaj4mpa.log h26lr2.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3368 sc.exe 4504 sc.exe 4684 sc.exe 1468 sc.exe 5040 sc.exe 3300 sc.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 1580 h26lr2.exe 1580 h26lr2.exe 1580 h26lr2.exe 3144 h26lr2.exe 3144 h26lr2.exe 3144 h26lr2.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3164 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 94 PID 2788 wrote to memory of 3164 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 94 PID 2788 wrote to memory of 3164 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 94 PID 2788 wrote to memory of 3300 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 95 PID 2788 wrote to memory of 3300 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 95 PID 2788 wrote to memory of 3300 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 95 PID 2788 wrote to memory of 4156 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 96 PID 2788 wrote to memory of 4156 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 96 PID 2788 wrote to memory of 4156 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 96 PID 2788 wrote to memory of 3368 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 97 PID 2788 wrote to memory of 3368 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 97 PID 2788 wrote to memory of 3368 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 97 PID 2788 wrote to memory of 1580 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 99 PID 2788 wrote to memory of 1580 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 99 PID 2788 wrote to memory of 1580 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 99 PID 3164 wrote to memory of 2224 3164 net.exe 103 PID 3164 wrote to memory of 2224 3164 net.exe 103 PID 3164 wrote to memory of 2224 3164 net.exe 103 PID 2788 wrote to memory of 748 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 104 PID 2788 wrote to memory of 748 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 104 PID 2788 wrote to memory of 748 2788 bff5fecfbb814b0565a627c7c0a65f60.exe 104 PID 4156 wrote to memory of 372 4156 net.exe 105 PID 4156 wrote to memory of 372 4156 net.exe 105 PID 4156 wrote to memory of 372 4156 net.exe 105 PID 1580 wrote to memory of 3216 1580 h26lr2.exe 107 PID 1580 wrote to memory of 3216 1580 h26lr2.exe 107 PID 1580 wrote to memory of 3216 1580 h26lr2.exe 107 PID 1580 wrote to memory of 4504 1580 h26lr2.exe 108 PID 1580 wrote to memory of 4504 1580 h26lr2.exe 108 PID 1580 wrote to memory of 4504 1580 h26lr2.exe 108 PID 1580 wrote to memory of 2860 1580 h26lr2.exe 109 PID 1580 wrote to memory of 2860 1580 h26lr2.exe 109 PID 1580 wrote to memory of 2860 1580 h26lr2.exe 109 PID 1580 wrote to memory of 4684 1580 h26lr2.exe 110 PID 1580 wrote to memory of 4684 1580 h26lr2.exe 110 PID 1580 wrote to memory of 4684 1580 h26lr2.exe 110 PID 1580 wrote to memory of 3144 1580 h26lr2.exe 111 PID 1580 wrote to memory of 3144 1580 h26lr2.exe 111 PID 1580 wrote to memory of 3144 1580 h26lr2.exe 111 PID 3216 wrote to memory of 2652 3216 net.exe 116 PID 3216 wrote to memory of 2652 3216 net.exe 116 PID 3216 wrote to memory of 2652 3216 net.exe 116 PID 2860 wrote to memory of 1552 2860 net.exe 117 PID 2860 wrote to memory of 1552 2860 net.exe 117 PID 2860 wrote to memory of 1552 2860 net.exe 117 PID 3144 wrote to memory of 1376 3144 h26lr2.exe 118 PID 3144 wrote to memory of 1376 3144 h26lr2.exe 118 PID 3144 wrote to memory of 1376 3144 h26lr2.exe 118 PID 3144 wrote to memory of 1468 3144 h26lr2.exe 119 PID 3144 wrote to memory of 1468 3144 h26lr2.exe 119 PID 3144 wrote to memory of 1468 3144 h26lr2.exe 119 PID 3144 wrote to memory of 4100 3144 h26lr2.exe 120 PID 3144 wrote to memory of 4100 3144 h26lr2.exe 120 PID 3144 wrote to memory of 4100 3144 h26lr2.exe 120 PID 3144 wrote to memory of 5040 3144 h26lr2.exe 121 PID 3144 wrote to memory of 5040 3144 h26lr2.exe 121 PID 3144 wrote to memory of 5040 3144 h26lr2.exe 121 PID 1376 wrote to memory of 1900 1376 net.exe 126 PID 1376 wrote to memory of 1900 1376 net.exe 126 PID 1376 wrote to memory of 1900 1376 net.exe 126 PID 4100 wrote to memory of 3132 4100 net.exe 127 PID 4100 wrote to memory of 3132 4100 net.exe 127 PID 4100 wrote to memory of 3132 4100 net.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\bff5fecfbb814b0565a627c7c0a65f60.exe"C:\Users\Admin\AppData\Local\Temp\bff5fecfbb814b0565a627c7c0a65f60.exe"1⤵
- Adds policy Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵PID:2224
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
PID:3300
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵PID:372
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\h26lr2.exeC:\Users\Admin\AppData\Local\Temp\h26lr2.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"3⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵PID:2652
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED3⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵PID:1552
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED3⤵
- Launches sc.exe
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\h26lr2.exeC:\Users\Admin\AppData\Local\Temp\h26lr2.exe -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⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"4⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵PID:1900
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED4⤵
- Launches sc.exe
PID:1468
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"5⤵PID:3132
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED4⤵
- Launches sc.exe
PID:5040
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\f7lf8ipd.bat2⤵PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5b11ddfed0d3763a1f1309f152c7827f7
SHA10a64f505c574510606e0654610af7771577cfe7e
SHA256047ee0c4032f6e5b751bc09ca01cb2c233208c905f59a9865952239b15af0baa
SHA51226190652d06c84214a443aabfb344db18ba16b3def6ab08256291c365cea2474616928711ad6da97ede86a12c746b5bbfdacaafa4235b0e4913da78e2fca7205
-
Filesize
36KB
MD5bff5fecfbb814b0565a627c7c0a65f60
SHA12938804ffc44880f5c1ed126c4676655b234267f
SHA256cfe0e620039776c31ca3b51330d30af8c961c1b68d2f7ec94da318eb4a73fda6
SHA51203204475f3cd898f6dbe8431a4c9458f2dbdaa3983565baef7fd3c805c9044c61a7e16cc7a13463d1e157967802cabe7db4badf3a9c94cfa7cf827d0c3ac32ff