Analysis

  • max time kernel
    151s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 20:58

General

  • Target

    c6d7b92886b5c6151b0328e2e7be0aca.exe

  • Size

    61KB

  • MD5

    c6d7b92886b5c6151b0328e2e7be0aca

  • SHA1

    f1d55d78b77ca248baedbc4367cc067d6899a096

  • SHA256

    f4438cf27a37b3bf6be7e04cce6bc45e63eed86c95871142d35e3d27c036feef

  • SHA512

    44b65cb6dcc699450432cb09f244b5989620e574933b9f3ee2e39505459f29cae15203cf5c63cf78f59c20c40eb5071027b8e1bafc31b8597713f37f3c267608

  • SSDEEP

    1536:erj+8ZkVYa0tMId2MzdOTunQF+wyoCYNUOIyAFXZ/E9dzB4:ef+wkVYa+5/AanQVtYyAZZ/8dF4

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 5 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6d7b92886b5c6151b0328e2e7be0aca.exe
    "C:\Users\Admin\AppData\Local\Temp\c6d7b92886b5c6151b0328e2e7be0aca.exe"
    1⤵
    • Looks for VMWare Tools registry key
    • Drops file in Windows directory
    PID:1052
  • C:\Windows\aolsoftware.exe
    "C:\Windows\aolsoftware.exe"
    1⤵
    • Modifies security service
    • Windows security bypass
    • Looks for VMWare Tools registry key
    • Deletes itself
    • Executes dropped EXE
    • Windows security modification
    PID:4908
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1380 --field-trial-handle=2496,i,15897292497548307209,13920214570023230813,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\aolsoftware.exe

      Filesize

      61KB

      MD5

      c6d7b92886b5c6151b0328e2e7be0aca

      SHA1

      f1d55d78b77ca248baedbc4367cc067d6899a096

      SHA256

      f4438cf27a37b3bf6be7e04cce6bc45e63eed86c95871142d35e3d27c036feef

      SHA512

      44b65cb6dcc699450432cb09f244b5989620e574933b9f3ee2e39505459f29cae15203cf5c63cf78f59c20c40eb5071027b8e1bafc31b8597713f37f3c267608

    • memory/1052-0-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/1052-1-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/1052-2-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/1052-9-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/4908-8-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/4908-10-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/4908-13-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/4908-15-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/4908-19-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/4908-22-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB