Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
d369b0abb477bed3cda7ee99b203d45d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d369b0abb477bed3cda7ee99b203d45d.exe
Resource
win10v2004-20240226-en
General
-
Target
d369b0abb477bed3cda7ee99b203d45d.exe
-
Size
344KB
-
MD5
d369b0abb477bed3cda7ee99b203d45d
-
SHA1
e77c9f4eead9652134c3eb82741bfecdd6a191e0
-
SHA256
769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c
-
SHA512
257cebd19cc4509bdd9e7a62a0623bd2fffac3554f113707aba187370490b3a741438b0eec18a42fb214467862e48491bc69ba6f1b56549eb5445f73c3252cd5
-
SSDEEP
6144:VcPsBlXxcupxfbs9Sx7NqRz9In+Ml1vob6dtv4Dr5pT:Vflmupxfa0SodlhoW7v4v5pT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exeavg.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation avg.exe -
Executes dropped EXE 3 IoCs
Processes:
avg.exearpa.exeunsecapp.exepid process 4584 avg.exe 3908 arpa.exe 4568 unsecapp.exe -
Loads dropped DLL 2 IoCs
Processes:
arpa.exeunsecapp.exepid process 3908 arpa.exe 4568 unsecapp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
arpa.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ESET Malware ProtectionLYo = "\"C:\\ProgramData\\ESET Malware ProtectionLYo\\unsecapp.exe\" -app" arpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ESET Malware ProtectionLYo = "\"C:\\ProgramData\\ESET Malware ProtectionLYo\\unsecapp.exe\" -app" arpa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\Windows\Temp\avg.exe nsis_installer_1 C:\Windows\Temp\avg.exe nsis_installer_2 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d369b0abb477bed3cda7ee99b203d45d.exeavg.exerundll32.exearpa.exedescription pid process target process PID 1808 wrote to memory of 4584 1808 d369b0abb477bed3cda7ee99b203d45d.exe avg.exe PID 1808 wrote to memory of 4584 1808 d369b0abb477bed3cda7ee99b203d45d.exe avg.exe PID 1808 wrote to memory of 4584 1808 d369b0abb477bed3cda7ee99b203d45d.exe avg.exe PID 4584 wrote to memory of 2988 4584 avg.exe rundll32.exe PID 4584 wrote to memory of 2988 4584 avg.exe rundll32.exe PID 4584 wrote to memory of 2988 4584 avg.exe rundll32.exe PID 2988 wrote to memory of 3908 2988 rundll32.exe arpa.exe PID 2988 wrote to memory of 3908 2988 rundll32.exe arpa.exe PID 2988 wrote to memory of 3908 2988 rundll32.exe arpa.exe PID 3908 wrote to memory of 4568 3908 arpa.exe unsecapp.exe PID 3908 wrote to memory of 4568 3908 arpa.exe unsecapp.exe PID 3908 wrote to memory of 4568 3908 arpa.exe unsecapp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d369b0abb477bed3cda7ee99b203d45d.exe"C:\Users\Admin\AppData\Local\Temp\d369b0abb477bed3cda7ee99b203d45d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\windows\temp\avg.exec:\windows\temp\avg.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\arpa.exe3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\arpa.exe"C:\Users\Admin\AppData\Local\Temp\arpa.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe"C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -app5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4568
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:1876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD528c6f235946fd694d2634c7a2f24c1ba
SHA1e9a9ce1ff07834d6ba9a51ba0d9e7c7a0b68d3e5
SHA256c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763
SHA51216865c473e010950a2aa25263af70074ad7539a86dc20e0a253df39e54e3635e99e821d4df83cd7a0eaeff10c75782966439d16d056427e824be8df953e138be
-
Filesize
81KB
MD527a4ed145a9a6cb41af09b8927fd5bee
SHA1815be32e1ae7ec20621e87239a6279fbba2fc8b5
SHA2563fbbf30015b64b50912c09c43052ac48b1983e869cebfb88dd1271fcb4e60d10
SHA5122978496330e0dcfafad6b9186181febe4af28cb7bec227bfab3f0be711e5160b96692a9752e260bf585abc0a5d481bd4d408ead88e0e2973552e4abb934107a8
-
Filesize
20KB
MD55b92266d9a26260b4c9920ede267ba37
SHA1372d5455fdb689787e7e49f7799510c6c2cdf6b7
SHA256d3c41834ea1a05eb19b6012a9c0c4a2dd9df243af0df56885edabedfe3fea261
SHA512db9b277d74d1c50b8580b8dbeef1f5c3f54a6cf436a95c658bf7b8201d48ed651400fdde84d7297abf7f71b1f8f2bf335716833e564fa25cf10483b5f8766ec5
-
Filesize
125KB
MD5fba356748c02da7a65ddef9470aa1cf2
SHA1e0e3b538d015b1eb06a8a663bc746a36c3cc5848
SHA256792eba5ba91a52bfb3b369107f38fb9a7e7b7987cd870f465338eae59e81f3f6
SHA512f626824b33ea03f690500058c73ba662a1363535f80e7b05149dc8b580bd6bf514b334f3509283933993d0947b254c30cb6ddbf7be99d53de471997a2ef2f71d