Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
d350709be85cab9b1f112530541afb2f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d350709be85cab9b1f112530541afb2f.exe
Resource
win10v2004-20240226-en
General
-
Target
d350709be85cab9b1f112530541afb2f.exe
-
Size
320KB
-
MD5
d350709be85cab9b1f112530541afb2f
-
SHA1
04fadd3175cba341c0a1a2efdb425788eaf66b95
-
SHA256
48260b4e9ecbee92e4c467de79f84b6466985387636d688f35eb930c6a8f1d07
-
SHA512
8efc106621c0ee793c0852fd8875e741af3dac2be01dfb9010daf563220fb33ca2c9226f7d691631407ffe5bfa706479bf261dd0915ccc515b51ba296e4e13c1
-
SSDEEP
6144:m+4Xid6tGhNubOvIowXKWCx5OVprYOaFJI1C/ssFjaS9YtF:0tGnvwLCx5OTAc1Qxl0F
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\IcmpSettings svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\IcmpSettings\AllowInboundEchoRequest = "1" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\svchost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe:*:Enabled:svchost" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 100 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wmupdate = "C:\\Windows\\wmupdate.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\wmupdate.exe svchost.exe File created C:\Windows\wmupdate.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 100 svchost.exe 100 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3244 wrote to memory of 100 3244 d350709be85cab9b1f112530541afb2f.exe 89 PID 3244 wrote to memory of 100 3244 d350709be85cab9b1f112530541afb2f.exe 89 PID 3244 wrote to memory of 100 3244 d350709be85cab9b1f112530541afb2f.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d350709be85cab9b1f112530541afb2f.exe"C:\Users\Admin\AppData\Local\Temp\d350709be85cab9b1f112530541afb2f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:100
-
-
C:\Windows\system32\WerFault.exe"C:\Windows\system32\WerFault.exe" -k -lc NDIS NDIS-20240318-1049.dmp1⤵PID:2856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5d350709be85cab9b1f112530541afb2f
SHA104fadd3175cba341c0a1a2efdb425788eaf66b95
SHA25648260b4e9ecbee92e4c467de79f84b6466985387636d688f35eb930c6a8f1d07
SHA5128efc106621c0ee793c0852fd8875e741af3dac2be01dfb9010daf563220fb33ca2c9226f7d691631407ffe5bfa706479bf261dd0915ccc515b51ba296e4e13c1