Analysis
-
max time kernel
162s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
c9c94e7de16ae088cc9bece32c264812.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9c94e7de16ae088cc9bece32c264812.exe
Resource
win10v2004-20240226-en
General
-
Target
c9c94e7de16ae088cc9bece32c264812.exe
-
Size
171KB
-
MD5
c9c94e7de16ae088cc9bece32c264812
-
SHA1
a05982bf41654726e8db9a910b6fb4a8aba4fa81
-
SHA256
9a81134b3c673ae7acec80878e046efd88a5fd616a9409e40954d9a265cd7761
-
SHA512
0405116b797e2e43f8407aca721981f422175480be2c60758d406569372a25adf37ad9f577af748e6c906d3340fdcbe7e2561040c0aa88c77d579ac48da9f364
-
SSDEEP
3072:dcH4QQKq6uewjct8lYpiYWbSsuQhaP4FGWNG3kUD7hJzIyjLhn3WLf5HGmC:+hQN6ujXYppWbSNQcP4FGkir5JzIShnR
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = ",explorer.exe" c9c94e7de16ae088cc9bece32c264812.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe c9c94e7de16ae088cc9bece32c264812.exe File created C:\Windows\SysWOW64\hh.exe c9c94e7de16ae088cc9bece32c264812.exe File created C:\Windows\SysWOW64\explorer.exe c9c94e7de16ae088cc9bece32c264812.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\Local Settings explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2448 wrote to memory of 4988 2448 c9c94e7de16ae088cc9bece32c264812.exe 90 PID 2448 wrote to memory of 4988 2448 c9c94e7de16ae088cc9bece32c264812.exe 90 PID 2448 wrote to memory of 4988 2448 c9c94e7de16ae088cc9bece32c264812.exe 90 PID 2448 wrote to memory of 1280 2448 c9c94e7de16ae088cc9bece32c264812.exe 91 PID 2448 wrote to memory of 1280 2448 c9c94e7de16ae088cc9bece32c264812.exe 91 PID 2448 wrote to memory of 1280 2448 c9c94e7de16ae088cc9bece32c264812.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9c94e7de16ae088cc9bece32c264812.exe"C:\Users\Admin\AppData\Local\Temp\c9c94e7de16ae088cc9bece32c264812.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe2⤵
- Modifies registry class
PID:4988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\c9c94e7de16ae088cc9bece32c264812.exe.de.bat2⤵PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263B
MD51502496305fbcb680c51aa65cab46e66
SHA102f36086e9258f947e5383c158f4fbd573cd3132
SHA256d6a67411c9ecff318dfa50492d43ccd7b78fd3af45da376c816065734d148bc4
SHA512cafb885db42698c0e8295ddfa8cde9add5cdb1b64134d3503d88268b55b7158e27283e1c327d4eb8a24ebbd5af46797a173f9a6255c8c6558804e59b075f6763