Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 13:22
Static task
static1
Behavioral task
behavioral1
Sample
d39de5973189eb4d0c884dfaa103597a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d39de5973189eb4d0c884dfaa103597a.exe
Resource
win10v2004-20240226-en
General
-
Target
d39de5973189eb4d0c884dfaa103597a.exe
-
Size
160KB
-
MD5
d39de5973189eb4d0c884dfaa103597a
-
SHA1
625766dd30fb1e2a077ca7c15b0f74de1dc5556c
-
SHA256
7277fc173a65e84426217ea49d790b19b5b5d8a3f24be2acca4f4e6a1635858e
-
SHA512
e99b39ad04ef89c68e7692aa9bfc2a90364b6d7f3bb2e3fa35924158256d85cab2971706220f6263fd21c668ade39a7c82043ee33d445826fb1b161067e28a1e
-
SSDEEP
3072:Zghg8Sn4dnbla5eree+ELWqqdSTvC6HWYppiAKNWlpt7ryfrb0l3icB6Cb:Zwq4Rl+erlRLcd5626pDX3BOzIl3icVb
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3528 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation d39de5973189eb4d0c884dfaa103597a.exe -
Executes dropped EXE 1 IoCs
pid Process 4572 d54dec2e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\icfgnt532 = "rundll32.exe icfgnt532.dll,ojur" d39de5973189eb4d0c884dfaa103597a.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\icfgnt532.dll d39de5973189eb4d0c884dfaa103597a.exe File opened for modification C:\Windows\SysWOW64\icfgnt532.dll d39de5973189eb4d0c884dfaa103597a.exe File created C:\Windows\SysWOW64\a31b9a5c.dll d39de5973189eb4d0c884dfaa103597a.exe File opened for modification C:\Windows\SysWOW64\a31b9a5c.dll d39de5973189eb4d0c884dfaa103597a.exe File created C:\Windows\SysWOW64\4230ae9b.dll d39de5973189eb4d0c884dfaa103597a.exe File opened for modification C:\Windows\SysWOW64\4230ae9b.dll d39de5973189eb4d0c884dfaa103597a.exe File created C:\Windows\SysWOW64\dfdb4a41.dll d39de5973189eb4d0c884dfaa103597a.exe File opened for modification C:\Windows\SysWOW64\dfdb4a41.dll d39de5973189eb4d0c884dfaa103597a.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 456 sc.exe 2012 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4568 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4568 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1380 wrote to memory of 456 1380 d39de5973189eb4d0c884dfaa103597a.exe 89 PID 1380 wrote to memory of 456 1380 d39de5973189eb4d0c884dfaa103597a.exe 89 PID 1380 wrote to memory of 456 1380 d39de5973189eb4d0c884dfaa103597a.exe 89 PID 1380 wrote to memory of 2012 1380 d39de5973189eb4d0c884dfaa103597a.exe 93 PID 1380 wrote to memory of 2012 1380 d39de5973189eb4d0c884dfaa103597a.exe 93 PID 1380 wrote to memory of 2012 1380 d39de5973189eb4d0c884dfaa103597a.exe 93 PID 1380 wrote to memory of 3528 1380 d39de5973189eb4d0c884dfaa103597a.exe 94 PID 1380 wrote to memory of 3528 1380 d39de5973189eb4d0c884dfaa103597a.exe 94 PID 1380 wrote to memory of 3528 1380 d39de5973189eb4d0c884dfaa103597a.exe 94 PID 1380 wrote to memory of 4572 1380 d39de5973189eb4d0c884dfaa103597a.exe 98 PID 1380 wrote to memory of 4572 1380 d39de5973189eb4d0c884dfaa103597a.exe 98 PID 1380 wrote to memory of 4572 1380 d39de5973189eb4d0c884dfaa103597a.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d39de5973189eb4d0c884dfaa103597a.exe"C:\Users\Admin\AppData\Local\Temp\d39de5973189eb4d0c884dfaa103597a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create icfgnt532 type= share start= auto DisplayName= "Internet Connection Wizard" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\icfgnt532.dll,ojur"2⤵
- Launches sc.exe
PID:456
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description icfgnt532 "Internet Connection Wizard"2⤵
- Launches sc.exe
PID:2012
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe firewall add portopening TCP 1599 messenger2⤵
- Modifies Windows Firewall
PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\d54dec2e.exe"C:\Users\Admin\AppData\Local\Temp\d54dec2e.exe"2⤵
- Executes dropped EXE
PID:4572
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x49c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ab437ad2ca17aecbccbb582a9b426975
SHA168a333a6b8746bdc8f13d3e6bae11dfeb782706b
SHA2567d408f3a3197c7dc7a6ca0f6360c6102899019e2ddb222450539807b11437a6e
SHA5122e7feb013ea7a6105b7fa8b2040d47d14e06197aead6cae30a965f311863fdae4e58837579a6b6d4343450d59ea51c619f2cb5ae6cf88f2b5eb0857fc64f2dd9