Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
cb88956b765445b5b073e6934c7eab08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb88956b765445b5b073e6934c7eab08.exe
Resource
win10v2004-20240226-en
General
-
Target
cb88956b765445b5b073e6934c7eab08.exe
-
Size
763KB
-
MD5
cb88956b765445b5b073e6934c7eab08
-
SHA1
be988a17dd322418deb21e497c882035654eeb66
-
SHA256
e040de0e7f4d613ed9cab462ec0ffa944b6e5ca125f971c4bef5a71195ede57a
-
SHA512
93a8e416018c9e165530b2152a450d7b14c4e79e8dd5c245139c57bae09da09ced4b89b5041ad2c280e309fa15af2f3261a9496bdd31ff61505d527b8c61ec4e
-
SSDEEP
12288:aGKLKkc69/hWT9lAksP12EgVgcruncSOg2umW1+nib2C08vw/wSaTwIzP+lN0J:adLKkjWvANP1PAJ0Auf+G2l8Owt5zP+e
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" faaiilll.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation faaiilll.exe -
Executes dropped EXE 2 IoCs
pid Process 1708 faaiilll.exe 2652 msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\af = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" faaiilll.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5068 set thread context of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ faaiilll.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 5068 cb88956b765445b5b073e6934c7eab08.exe Token: SeIncreaseQuotaPrivilege 1708 faaiilll.exe Token: SeSecurityPrivilege 1708 faaiilll.exe Token: SeTakeOwnershipPrivilege 1708 faaiilll.exe Token: SeLoadDriverPrivilege 1708 faaiilll.exe Token: SeSystemProfilePrivilege 1708 faaiilll.exe Token: SeSystemtimePrivilege 1708 faaiilll.exe Token: SeProfSingleProcessPrivilege 1708 faaiilll.exe Token: SeIncBasePriorityPrivilege 1708 faaiilll.exe Token: SeCreatePagefilePrivilege 1708 faaiilll.exe Token: SeBackupPrivilege 1708 faaiilll.exe Token: SeRestorePrivilege 1708 faaiilll.exe Token: SeShutdownPrivilege 1708 faaiilll.exe Token: SeDebugPrivilege 1708 faaiilll.exe Token: SeSystemEnvironmentPrivilege 1708 faaiilll.exe Token: SeChangeNotifyPrivilege 1708 faaiilll.exe Token: SeRemoteShutdownPrivilege 1708 faaiilll.exe Token: SeUndockPrivilege 1708 faaiilll.exe Token: SeManageVolumePrivilege 1708 faaiilll.exe Token: SeImpersonatePrivilege 1708 faaiilll.exe Token: SeCreateGlobalPrivilege 1708 faaiilll.exe Token: 33 1708 faaiilll.exe Token: 34 1708 faaiilll.exe Token: 35 1708 faaiilll.exe Token: 36 1708 faaiilll.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 5068 wrote to memory of 1708 5068 cb88956b765445b5b073e6934c7eab08.exe 89 PID 1708 wrote to memory of 2652 1708 faaiilll.exe 97 PID 1708 wrote to memory of 2652 1708 faaiilll.exe 97 PID 1708 wrote to memory of 2652 1708 faaiilll.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb88956b765445b5b073e6934c7eab08.exe"C:\Users\Admin\AppData\Local\Temp\cb88956b765445b5b073e6934c7eab08.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\faaiilll.exeC:\Users\Admin\AppData\Local\Temp\faaiilll.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0