Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 23:45
Static task
static1
Behavioral task
behavioral1
Sample
d760d5cef98c6d306de263950d4ca2c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d760d5cef98c6d306de263950d4ca2c3.exe
Resource
win10v2004-20240226-en
General
-
Target
d760d5cef98c6d306de263950d4ca2c3.exe
-
Size
1.9MB
-
MD5
d760d5cef98c6d306de263950d4ca2c3
-
SHA1
3a0b7a15c2cb69a03c314df51aaca285a1033270
-
SHA256
75ec8584cb9c027d9218bdc03cc2be4d425b46d2e4c5998999be973c488b48ba
-
SHA512
ff528a1851b7b6c4d606d5f21cf681eaa37ac0ceaf80d3bdb55c7a4127bd99bef67f7876fe8db80b0d98b75afb8f17c2019e435efbe59a7a53c259ea35a61e90
-
SSDEEP
49152:cfLtxlzvBV2Ag/96v7fD+dHANE8i1JFCGLvEcTIMMdY179:axLV2Ag/Uv7fDPNERUQvx/yY1x
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\PCenter\\pc.exe" d760d5cef98c6d306de263950d4ca2c3.exe -
Executes dropped EXE 1 IoCs
pid Process 3736 agent.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\agent.exe = "C:\\Program Files (x86)\\PCenter\\agent.exe" d760d5cef98c6d306de263950d4ca2c3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\PCenter\faq\images\gimg4.jpg d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg5.jpg d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg6.jpg d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\sounds\3.mp3 d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\faq\guide.html d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\sounds\1.mp3 d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\pc.exe d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\agent.exe d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg9.jpg d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg1.jpg d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg8.jpg d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg3.jpg d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg7.jpg d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\uninstall.exe d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg10.jpg d760d5cef98c6d306de263950d4ca2c3.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg2.jpg d760d5cef98c6d306de263950d4ca2c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3736 agent.exe 3736 agent.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3736 agent.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3736 agent.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3736 5112 d760d5cef98c6d306de263950d4ca2c3.exe 92 PID 5112 wrote to memory of 3736 5112 d760d5cef98c6d306de263950d4ca2c3.exe 92 PID 5112 wrote to memory of 3736 5112 d760d5cef98c6d306de263950d4ca2c3.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d760d5cef98c6d306de263950d4ca2c3.exe"C:\Users\Admin\AppData\Local\Temp\d760d5cef98c6d306de263950d4ca2c3.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\PCenter\agent.exe"C:\Program Files (x86)\PCenter\agent.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD51430af0a66f15be074aea998c834b881
SHA1fd9183aa672e5ad46529f0dc039cc4be379a565b
SHA25620ec56d7412e54ff759bfc174cc7fa45d644a87ef432541f7392fa4d00bceb8f
SHA512b592159eb6d2d16937ca9b90f7938915579de4539bbd27830c228711bacd71f070bd1ea12b8263640dd11bfe5002ec0a4e63b9803863d6a5454071a7b68842a8