Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
bff9876a9d0883d3928b028eb8b078c9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bff9876a9d0883d3928b028eb8b078c9.exe
Resource
win10v2004-20240226-en
General
-
Target
bff9876a9d0883d3928b028eb8b078c9.exe
-
Size
637KB
-
MD5
bff9876a9d0883d3928b028eb8b078c9
-
SHA1
326201de97e37b6cf07f3d13fc627b4ffd077092
-
SHA256
84a4e52dc5180ed1aa5994a79290b039cd4079bd0b719345d86e37d1e460ee25
-
SHA512
0770adc6af15cb8e9879ab63a4418f151cd447c7260689a8d96a87dc5195c91d1113d70d7b0616ea3428c534fb50a727f7ed79f9a2b82e81006258dd380e00ff
-
SSDEEP
12288:Pl/TGxM+onYhBfg+TCnMxPfW5QAx1c2obY7Kov5TrnKKyy:Pl/TxjwBfg8CnMFeoc+ovH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4736 4.exe 4988 Hacker.com.cn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bff9876a9d0883d3928b028eb8b078c9.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Hacker.com.cn.exe 4.exe File created C:\Windows\Hacker.com.cn.exe 4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4736 4.exe Token: SeDebugPrivilege 4988 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4988 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 348 wrote to memory of 4736 348 bff9876a9d0883d3928b028eb8b078c9.exe 97 PID 348 wrote to memory of 4736 348 bff9876a9d0883d3928b028eb8b078c9.exe 97 PID 348 wrote to memory of 4736 348 bff9876a9d0883d3928b028eb8b078c9.exe 97 PID 4988 wrote to memory of 2212 4988 Hacker.com.cn.exe 100 PID 4988 wrote to memory of 2212 4988 Hacker.com.cn.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\bff9876a9d0883d3928b028eb8b078c9.exe"C:\Users\Admin\AppData\Local\Temp\bff9876a9d0883d3928b028eb8b078c9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
788KB
MD58d7c3fd504dee89ea59f96370f7830bf
SHA1477f260497114d6d28bfb1ba1de04205ce9d3881
SHA256deb82a303446de0840f5fd6d74e7637d3dcfbd0b04d3a430578b699dceb8329c
SHA51246f4e0193f1764efbb8f93a755f6b43a265bf3950069368bdb83c00746feaa85b464230610403b6efca175e9071e84e281ff3bff5f90bf14133e583ff6e8def5