Analysis
-
max time kernel
162s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
c453bc28c9f211df2e1a87b0d26e1c3c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c453bc28c9f211df2e1a87b0d26e1c3c.exe
Resource
win10v2004-20240226-en
General
-
Target
c453bc28c9f211df2e1a87b0d26e1c3c.exe
-
Size
147KB
-
MD5
c453bc28c9f211df2e1a87b0d26e1c3c
-
SHA1
c4ad140e1abb5478aef5a1aeb7db8b177368429e
-
SHA256
a7b6b77de96352a518220615c1b32c2da43d0be60c983f90e31016c219a5681a
-
SHA512
406076d38d85bf5eb75cd540cb973655ec4dc7b7053b42db838d52cb6a3c039962fac397b250687358e9c4646172d29b356bbb7e3c6a6248c41a68ba4b0f6f65
-
SSDEEP
3072:XR1+aJe1mgawzxsBub861jIHxowx4rhYr73Or2PxOB3cuwBwqYHumi:XRUTV5nSMhssBciqYK
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4076 serv.exe -
Loads dropped DLL 3 IoCs
pid Process 4076 serv.exe 4076 serv.exe 4076 serv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\serv = "C:\\Windows\\serv.exe s" serv.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\h323atmf.exe serv.exe File created C:\Windows\SysWOW64\dbnetsby.dll serv.exe File created C:\Windows\SysWOW64\e1.dll serv.exe File created C:\Windows\SysWOW64\qedwdpnm.dll serv.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\serv.exe c453bc28c9f211df2e1a87b0d26e1c3c.exe File created C:\Windows\serv.dll serv.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3580 notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4076 serv.exe 4076 serv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4076 serv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4076 serv.exe 4076 serv.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2976 wrote to memory of 4076 2976 c453bc28c9f211df2e1a87b0d26e1c3c.exe 98 PID 2976 wrote to memory of 4076 2976 c453bc28c9f211df2e1a87b0d26e1c3c.exe 98 PID 2976 wrote to memory of 4076 2976 c453bc28c9f211df2e1a87b0d26e1c3c.exe 98 PID 2976 wrote to memory of 3580 2976 c453bc28c9f211df2e1a87b0d26e1c3c.exe 99 PID 2976 wrote to memory of 3580 2976 c453bc28c9f211df2e1a87b0d26e1c3c.exe 99 PID 2976 wrote to memory of 3580 2976 c453bc28c9f211df2e1a87b0d26e1c3c.exe 99 PID 4076 wrote to memory of 3384 4076 serv.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\c453bc28c9f211df2e1a87b0d26e1c3c.exe"C:\Users\Admin\AppData\Local\Temp\c453bc28c9f211df2e1a87b0d26e1c3c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\serv.exeC:\Windows\serv.exe s3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4076
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\System32\notepad.exe C:\Users\Admin\AppData\Local\Temp\55DB.tmp3⤵
- Opens file in notepad (likely ransom note)
PID:3580
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1428 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD56bf80b5e2beffc0c31ed88572fd255b3
SHA1d24c83074062185990c245975904986060c93ad8
SHA256b7caada2a6516018079a51eaf7d00d7e154accfce95cb40eaf9f736ac0a32c78
SHA512b8ab497b999ecc7dd712e2d0262c42f9be38ba810ab484bd794d77413d18d0bf860907ab8885a88152264ada5b001b708c80807b49f74e93b1cbb474502b3cb2
-
Filesize
20KB
MD5da2f63fc80d4714b0eca8c66c82837d9
SHA1b79dd173f6691ead3c5b4fd4f74a31fed5c28d7e
SHA256a883deb8d93e489dd62f871a2b2517c53004c4ed0880655e9b960b626d9edbb2
SHA51221d8873030a5bb118521952e0ee5634c729d49820948ebfd62593299f839f5f3489e717109e7eb9fe7625fe733971488791436f37db677ef43db280d4c847e40
-
Filesize
7KB
MD57caccaf5cb2e8483057a6c7389c51e1c
SHA1d50a265aca04fe4292be1ca623fa5668d725c608
SHA2560c663f01a250db8af6b5b60d2640491693a38530530b04cbb43ece27d97c0f8f
SHA51243de01f952070d01abc13f35786544b6e2e324fc65d86807e48624ee250051630b76b9059deda0515138bb6658aaf6dffe555a27de6dadc87ce5c8bec03f074c
-
Filesize
147KB
MD5c453bc28c9f211df2e1a87b0d26e1c3c
SHA1c4ad140e1abb5478aef5a1aeb7db8b177368429e
SHA256a7b6b77de96352a518220615c1b32c2da43d0be60c983f90e31016c219a5681a
SHA512406076d38d85bf5eb75cd540cb973655ec4dc7b7053b42db838d52cb6a3c039962fac397b250687358e9c4646172d29b356bbb7e3c6a6248c41a68ba4b0f6f65