Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
a84eb505e211dbee4dbf7c7f7137f6bb06adfcf62e52545a0db1d381fa19d369.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
a84eb505e211dbee4dbf7c7f7137f6bb06adfcf62e52545a0db1d381fa19d369.exe
Resource
win11-20240221-en
General
-
Target
a84eb505e211dbee4dbf7c7f7137f6bb06adfcf62e52545a0db1d381fa19d369.exe
-
Size
1.3MB
-
MD5
acd76df109da634b19792adbae6d87ed
-
SHA1
192715a95afc4dd84f5227c4f2345062db60e6f0
-
SHA256
a84eb505e211dbee4dbf7c7f7137f6bb06adfcf62e52545a0db1d381fa19d369
-
SHA512
572855c30002ef7358cc025bec66f856e0e77b418c5da9dd6756557317d66ab67eb7dd772e83948347e9302bd45e41d6495508b3fa4024f202daadef3e6e8a5a
-
SSDEEP
24576:4WmAFubSRUqxeOlXDQjLStrHvNZSEy4eZls3VaZy/le2VjUiN9J:U26qxewXDYLSt5UExeZSIZse2VjUi3J
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3560 Engine.exe 1568 Morgan.exe.pif 4816 Morgan.exe.pif -
resource yara_rule behavioral1/memory/3560-18-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/files/0x0005000000022762-17.dat upx behavioral1/files/0x0005000000022762-16.dat upx behavioral1/memory/3560-97-0x0000000000400000-0x0000000000557000-memory.dmp upx behavioral1/memory/3560-98-0x0000000000400000-0x0000000000557000-memory.dmp upx -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1568 set thread context of 4816 1568 Morgan.exe.pif 113 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3270530367-132075249-2153716227-1000\{8B57450C-49CF-49A5-BB73-76567587467B} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3270530367-132075249-2153716227-1000\{E7953A02-A00F-4F7D-B33A-13A3B96A8285} svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4504 PING.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4836 powershell.exe 4836 powershell.exe 4836 powershell.exe 4836 powershell.exe 4804 powershell.exe 4804 powershell.exe 4804 powershell.exe 4804 powershell.exe 1568 Morgan.exe.pif 1568 Morgan.exe.pif 1568 Morgan.exe.pif 1568 Morgan.exe.pif 1568 Morgan.exe.pif 1568 Morgan.exe.pif 1568 Morgan.exe.pif 1568 Morgan.exe.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4836 powershell.exe Token: SeDebugPrivilege 4804 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1568 Morgan.exe.pif 1568 Morgan.exe.pif 1568 Morgan.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1568 Morgan.exe.pif 1568 Morgan.exe.pif 1568 Morgan.exe.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4396 OpenWith.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1280 wrote to memory of 3560 1280 a84eb505e211dbee4dbf7c7f7137f6bb06adfcf62e52545a0db1d381fa19d369.exe 93 PID 1280 wrote to memory of 3560 1280 a84eb505e211dbee4dbf7c7f7137f6bb06adfcf62e52545a0db1d381fa19d369.exe 93 PID 1280 wrote to memory of 3560 1280 a84eb505e211dbee4dbf7c7f7137f6bb06adfcf62e52545a0db1d381fa19d369.exe 93 PID 3560 wrote to memory of 5036 3560 Engine.exe 96 PID 3560 wrote to memory of 5036 3560 Engine.exe 96 PID 3560 wrote to memory of 5036 3560 Engine.exe 96 PID 5036 wrote to memory of 3152 5036 CmD.exe 98 PID 5036 wrote to memory of 3152 5036 CmD.exe 98 PID 5036 wrote to memory of 3152 5036 CmD.exe 98 PID 3152 wrote to memory of 4836 3152 cmd.exe 99 PID 3152 wrote to memory of 4836 3152 cmd.exe 99 PID 3152 wrote to memory of 4836 3152 cmd.exe 99 PID 3152 wrote to memory of 4804 3152 cmd.exe 104 PID 3152 wrote to memory of 4804 3152 cmd.exe 104 PID 3152 wrote to memory of 4804 3152 cmd.exe 104 PID 3152 wrote to memory of 4348 3152 cmd.exe 105 PID 3152 wrote to memory of 4348 3152 cmd.exe 105 PID 3152 wrote to memory of 4348 3152 cmd.exe 105 PID 3152 wrote to memory of 1568 3152 cmd.exe 106 PID 3152 wrote to memory of 1568 3152 cmd.exe 106 PID 3152 wrote to memory of 1568 3152 cmd.exe 106 PID 3152 wrote to memory of 4504 3152 cmd.exe 107 PID 3152 wrote to memory of 4504 3152 cmd.exe 107 PID 3152 wrote to memory of 4504 3152 cmd.exe 107 PID 1568 wrote to memory of 4816 1568 Morgan.exe.pif 113 PID 1568 wrote to memory of 4816 1568 Morgan.exe.pif 113 PID 1568 wrote to memory of 4816 1568 Morgan.exe.pif 113 PID 1568 wrote to memory of 4816 1568 Morgan.exe.pif 113 PID 1568 wrote to memory of 4816 1568 Morgan.exe.pif 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\a84eb505e211dbee4dbf7c7f7137f6bb06adfcf62e52545a0db1d381fa19d369.exe"C:\Users\Admin\AppData\Local\Temp\a84eb505e211dbee4dbf7c7f7137f6bb06adfcf62e52545a0db1d381fa19d369.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\SETUP_31896\Engine.exeC:\Users\Admin\AppData\Local\Temp\SETUP_31896\Engine.exe /TH_ID=_3264 /OriginExe="C:\Users\Admin\AppData\Local\Temp\a84eb505e211dbee4dbf7c7f7137f6bb06adfcf62e52545a0db1d381fa19d369.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\CmD.exeC:\Windows\system32\CmD.exe /c cmd < Stay3⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avastui5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avgui5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^SUBSTANCESCREENSAVERSSPRINGSINFORMATIONIRC$" Lambda5⤵PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\mfrjepi4.njb\20092\Morgan.exe.pif20092\\Morgan.exe.pif 20092\\w5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\mfrjepi4.njb\20092\Morgan.exe.pifC:\Users\Admin\AppData\Local\Temp\mfrjepi4.njb\20092\Morgan.exe.pif6⤵
- Executes dropped EXE
PID:4816
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 85⤵
- Runs ping.exe
PID:4504
-
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:2892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:1672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5407b26d1da5b001355adbc2b21afbdb8
SHA1e598f4c32593b304ad147a5f26cffee3d5c49a96
SHA256737e959cb3a9844cc699801b4d50ef6d602e2d491c18085df6b7701a66f2ea26
SHA5123a0e94eb64d83ff7d9853178326ed845bd25bc47fc13ad502d5bc592794622304dbbc1f43c46cb473a6e29d816ff979ba51c21ce0b7a2f82477e27fe19c75bf0
-
Filesize
35KB
MD5a4eec359cf2ad94b207393837e2d868b
SHA1d2aba15535534c985e6b057af1b0b529461e4edf
SHA25657e4df38b6b8f21dbfe82d28e777b4533b73999ec6bfdb54bc9c876c76765ff0
SHA512f553b26bdfe1fe6ee7239302307ab765d0886d441be5862688ae29574724fe4eda491a9f4e189ffb8f7b7727a26d6311f50edd6f1767e2523f9e99e7f74b7e39
-
Filesize
1KB
MD50238e36abf78dcd005adc0c1cdc51180
SHA1679608f3ac0620d8e5101d82b1e8c59a023907af
SHA25644b7e60bb90f5f359ea7d63ba7b1ce3eab23b2ece05561b13df2e2a2359ed9f5
SHA5128b4b89cd527c0a80d79942263e7bb6f95166b7453999398327fdcb032c207204f29020d2b768deda0488e58f998c8262e850d82d651363b3bac9c881464bec4b
-
Filesize
52KB
MD57d464ebc775b776a3e74dad3b9d8d3b8
SHA122d5aaba17a021a53424ef43e568933e3192be77
SHA2566019e783401d971f6bfdef951d56f73ba6b2e4de6883f8f967f2ceb66214332b
SHA512b6cdbbc5cb5184ddbb6afd1af91dfbc74785e003a043018b6eed347d4b771a2a3461198acbda3bd4537247a0c680bd4b20db75f49bc42e563733bda1b8141f85
-
Filesize
5KB
MD56a97ea48aa33081c855a803e194794b8
SHA133f8a67e37ffe4e7e424c98aded3e18faab5c620
SHA25667f011f0545eb20ab81ca08fc632f2a9e126ebc0912dea6adbe11efe07956069
SHA512573e816200f46e44df78d013586d236851d44f0c9b028253a1550541393ba96e580ec42998ab6544f6dfb44945f0760ae38bf25d775555d9c6151e0d5fd24ff5
-
Filesize
9KB
MD5ff4afc87ab927c078f2db85edc8ff5e8
SHA1db91f5180bf0466a9de8e59e5e382be62e27c02f
SHA2563d19e09f130c600b0f01f220319386755a8550583b1ff1584382f551d459a3b4
SHA512e2222c0f39a0c200f2c633fc9677add9fad0b11fa801609925190cda64a78efb1b1fed3de16b2b9719e7ddd379e668dc38c3492bf79ddb73da5250613ee2bc8d
-
Filesize
16KB
MD5e35ca825c2d877117bb9eed000d33785
SHA1525c32e893a8e0790524fb1bbe1c231ce97c6263
SHA256caaa87b74bb152ca20b7e33d53a4fbf6e44aa1df3cb7ca2e4cd258bd528cfa47
SHA51228b2a437d3e4826a2c0b347ff60f80548a476ad09b1b555ab0b77d48de607a26ec1bd9730ee5aa1283c4ba6788165399838c56eda0c8acd762d717c4446a8589
-
Filesize
59KB
MD5be6082c7dc6b4f44e4a801a41a7fc3a2
SHA14564ad69ee8e9f2d0963f021bcefd4970e746d68
SHA256a6f610d0accc62c66d88c541d3e66d754cead157d9aa13e4fe1372c138525d9e
SHA512ecb152ad658801f811b8afe25f640fc71eef9fb717b225303f58fc73e8ad799b86e757126f2e19b03c8d4aea507900cfb3ddca32071524a89debb2f0f2f13596
-
Filesize
28KB
MD5d7ffe44f2dc53a1fb32dbe57439cdc6b
SHA1164085c8f8815e67c8c90859d85c696579750556
SHA256aaab37bd56d318c7edefeebaf817de029c79cfa7cd37f31f5ec8d9349dc4f375
SHA51217b6a24b40e45e0ffbbb1a1acd8d55be71c4b2f90664181ca42afcd10ab92a194b2f7cf32084421fa66f6f7b38ff2149388159cc66d1c6e21658897cfb8aee2b
-
Filesize
31KB
MD523ac9ccb1a08111978fb84165967d7ae
SHA1b7cb2a5c705e1f32ce0a97573690bcc780557b99
SHA256b05a5ee2cd84d19353efb0e7121b9b6cbcffde7f981bed477cac7970e1c1e94b
SHA5123cd902f6cf00616bbc012d203500eaf8961f7f2e07ccc0dcb8340c5f39b07cd9bc49f567073ac9cc70d4bfb55cd674ef1348f1ecdfce45d2f8fcca609869b85f
-
Filesize
14KB
MD52a25f39ca7eeb79786257709a5179bbc
SHA1895e58ece430d5651e01225f9abf8455b2a663d3
SHA2569be44b1b8d610916ed942b7e12d780b9810135fcb6679db39991053ec46ffb0d
SHA512cfbbe8a9aa2025c525a4f63b099ea99d63dde6b17ab8381e74049fe9b54360ea21e748b7deb3c921242e5d2a63c5e61b76d2eb8ed630fbf6e07019a606b26f7b
-
Filesize
47KB
MD56330fd7374fbaf95132bf241030a135e
SHA1172a0e5438f8a5cc807717526c2cb28139328ee3
SHA256f3defc1c1dcd479515b049e5e191462e1734a1e27ed1de49fbc9517fc348053f
SHA5123f2660429b7545fcad99c3c0b71c5d168237469358a2a1de6975dab1228636b4b04bde24d75c6d1ef303ff42df10df51682086d091160d2be7fd18beb4b44288
-
Filesize
51KB
MD51fc291d9b0e8037e263b15093f2d45f6
SHA1686aa83b227150ae994144e935474320d5fa0194
SHA256a3b62ac45f88d818710ef9e4f129561e013220095289fef0d1598e928b015459
SHA512104392615d1faeaaed2e248965520df60b3795f79b0f9a8f37e71cd960658fb40ef49e5acca7a231bc54be5db3b840230ee7bfcf65050ec132426ee9e935974b
-
Filesize
7KB
MD51dd88f67f029710d5c5858a6293a93f1
SHA13e5ef66613415fe9467b2a24ccc27d8f997e7df6
SHA256b5dad33ceb6eb1ac2a05fbda76e29a73038403939218a88367925c3a20c05532
SHA5127071fd64038e0058c8c586c63c62677c0ca403768100f90323cf9c0bc7b7fcb538391e6f3606bd7970b8769445606ada47adcdcfc1e991e25caf272a13e10c94
-
Filesize
2KB
MD50a24ae65cac43414bea2cdd1dcb7d089
SHA18e3de808a62dc2b7b5157c2d962360dbd73986ce
SHA25655bc43b473ae6f9f056ba11004d42a43700ebf8a293db199a636e643972013fb
SHA512feaa6a074f7eaab2bb366ffc0de3a60b7f499c90a5799b8556b1f94755c1d9a6280e5fb32ac51c51fd75158df4fbd8f44bb18c5a9dd237b82026fd04a931a291
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
92KB
MD5676907b355bc8e4c8aec994e1ff331e1
SHA101ab7c16bb872cc34ebae8e6259e14978d5443ca
SHA2569cdd724fb8a12ed0fb787d58dd27ad173e09a387e3413b2d745aa8492437c0df
SHA512f394c30316c4d81d5b1f1111ab3221b2d90fa243bf77329ada9a5cb1ffcfaa01445a52acb525da4c59759aa3d1e1278924b7a2d1c79af15478736b94f6ec162a
-
Filesize
70KB
MD546a52e627673775cb1fa207c24a497b8
SHA1c508bc4894bda8b8f9e27d481671253392fb3f67
SHA256e1f404b21873adf60d79a78643031f1fb119cb7882428829122e0173124a012d
SHA512edd0621a22d706743c9d0de4ffdcb1266aedb6c26181f739b0e33ce1d292d702e43f7a3f9ee8bffbd6e75aff7687efeffcff05d7bc3756362e9fc76e2fdde460
-
Filesize
136KB
MD529c8d00602ad7ce997d476e9ae398e0c
SHA10b33c4060f07c97c831c160769c34613ca086c9b
SHA256e72f9c125e62d27afec041aed52b63d3e6470270bd4afe05752e624326418aa5
SHA5122d1ea17e945ecca8ec8d0f4b5e86a282af1714c0e0a2887440ebb73c916f9a1a5c87398aec5bddfbd611b897c8d025c3114903c0de30339330fcbbf850b4261c
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c