Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2024 21:58

General

  • Target

    c9b6b9bfa26a7e9b2950f3e30820069d.exe

  • Size

    407KB

  • MD5

    c9b6b9bfa26a7e9b2950f3e30820069d

  • SHA1

    282b807d3a7adb05dfb527d5e7db0ee81f36167a

  • SHA256

    8061cf54b5728fc8eea005c8f5214dccc50f5417ac3d4b17de87aeec8c4ba255

  • SHA512

    1bfc76f7ec30162e5d015fec96f27ac55d19f0370fa62d07b58b7cb375ef1f7da82bc6ec448e1aac9ea524fd2b736e495bb166104a4498b4c1b24f4e8536fed6

  • SSDEEP

    12288:Tg0Cq6x4aIhpJIew5rzWZfb6YkOVYGXKmRjVNL:TyfsJezoxkOVim

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Modifies data under HKEY_USERS 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9b6b9bfa26a7e9b2950f3e30820069d.exe
    "C:\Users\Admin\AppData\Local\Temp\c9b6b9bfa26a7e9b2950f3e30820069d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 848
      2⤵
      • Program crash
      PID:4508
    • C:\eF35400EoBhB35400\eF35400EoBhB35400.exe
      "\eF35400EoBhB35400\eF35400EoBhB35400.exe" "C:\Users\Admin\AppData\Local\Temp\c9b6b9bfa26a7e9b2950f3e30820069d.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 840
        3⤵
        • Program crash
        PID:3920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4908 -ip 4908
    1⤵
      PID:416
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:3132
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3828 -ip 3828
        1⤵
          PID:1332
        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:4060
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
          • Suspicious use of FindShellTrayWindow
          PID:4416
        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
          1⤵
            PID:2172
          • C:\Windows\system32\sihost.exe
            sihost.exe
            1⤵
            • Suspicious use of FindShellTrayWindow
            PID:1128
          • C:\Windows\system32\sihost.exe
            sihost.exe
            1⤵
            • Suspicious use of FindShellTrayWindow
            PID:3536
          • C:\Windows\system32\sihost.exe
            sihost.exe
            1⤵
            • Suspicious use of FindShellTrayWindow
            PID:2376
          • C:\Windows\system32\sihost.exe
            sihost.exe
            1⤵
            • Suspicious use of FindShellTrayWindow
            PID:3548
          • C:\Windows\system32\sihost.exe
            sihost.exe
            1⤵
            • Suspicious use of FindShellTrayWindow
            PID:2432

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          2
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Winlogon Helper DLL

          1
          T1547.004

          Privilege Escalation

          Boot or Logon Autostart Execution

          2
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Winlogon Helper DLL

          1
          T1547.004

          Defense Evasion

          Modify Registry

          2
          T1112

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\eF35400EoBhB35400\eF35400EoBhB35400.exe
            Filesize

            407KB

            MD5

            1ef94d42f5e2c78aa70b6fcb1b15c9cf

            SHA1

            547d4d9dc7b11cade6eb4633e0122d3420a9bc49

            SHA256

            984093c6cd08ccd615de74cce83064fffc5d58dc4356c9de158a9f1adb1e4d41

            SHA512

            d3eba85233b56e26acf0fbbcf844665aed2d8f498c741ed7f9582426c250e01f9c166d1f3aa9c2ac8e5ff0d5d5d4d8c8f8f4187451bad5e7023630c54102c28d

          • memory/3828-94-0x0000000000400000-0x00000000004CC000-memory.dmp
            Filesize

            816KB

          • memory/3828-95-0x0000000002010000-0x0000000002011000-memory.dmp
            Filesize

            4KB

          • memory/3828-179-0x0000000000400000-0x00000000004CC000-memory.dmp
            Filesize

            816KB

          • memory/4908-0-0x0000000000690000-0x0000000000693000-memory.dmp
            Filesize

            12KB

          • memory/4908-1-0x0000000000400000-0x00000000004CC000-memory.dmp
            Filesize

            816KB

          • memory/4908-2-0x00000000006B0000-0x00000000006B1000-memory.dmp
            Filesize

            4KB

          • memory/4908-82-0x0000000000400000-0x00000000004CC000-memory.dmp
            Filesize

            816KB

          • memory/4908-111-0x0000000000400000-0x00000000004CC000-memory.dmp
            Filesize

            816KB