Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2024, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
d7abdf205577c961251e5ba839893da0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d7abdf205577c961251e5ba839893da0.exe
Resource
win10v2004-20240319-en
General
-
Target
d7abdf205577c961251e5ba839893da0.exe
-
Size
13KB
-
MD5
d7abdf205577c961251e5ba839893da0
-
SHA1
5decf1ee6eadd16d0c5b1b60a45a8fa8cc103528
-
SHA256
2bce9deb36bdeddf9741bd111dcff13a0ad527b56ec8a66518fc4d5da6f1c5b7
-
SHA512
00c79f40518eb41264f02b665348fc4a29683d80c77a2178ac160bc8315557510c58cfb50e6eb472bfc034c3e81b42bf9c0f890dc90eb74342ca794d9bf773a2
-
SSDEEP
192:9ktEZ2i9iBJQTbF2qOPcLtSGDPYv85Cw7p9SvmmF1aE3jdlpZx9Wn5aAhhS9WDQ0:etEXUJPcSUl9w1HdZxA0MhS9Wc0
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\nsyvvcfo.dll = "{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}" d7abdf205577c961251e5ba839893da0.exe -
Loads dropped DLL 1 IoCs
pid Process 3088 d7abdf205577c961251e5ba839893da0.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\nsyvvcfo.tmp d7abdf205577c961251e5ba839893da0.exe File opened for modification C:\Windows\SysWOW64\nsyvvcfo.tmp d7abdf205577c961251e5ba839893da0.exe File opened for modification C:\Windows\SysWOW64\nsyvvcfo.nls d7abdf205577c961251e5ba839893da0.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8} d7abdf205577c961251e5ba839893da0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32 d7abdf205577c961251e5ba839893da0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32\ = "C:\\Windows\\SysWow64\\nsyvvcfo.dll" d7abdf205577c961251e5ba839893da0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32\ThreadingModel = "Apartment" d7abdf205577c961251e5ba839893da0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3088 d7abdf205577c961251e5ba839893da0.exe 3088 d7abdf205577c961251e5ba839893da0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3088 d7abdf205577c961251e5ba839893da0.exe 3088 d7abdf205577c961251e5ba839893da0.exe 3088 d7abdf205577c961251e5ba839893da0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3088 wrote to memory of 3344 3088 d7abdf205577c961251e5ba839893da0.exe 96 PID 3088 wrote to memory of 3344 3088 d7abdf205577c961251e5ba839893da0.exe 96 PID 3088 wrote to memory of 3344 3088 d7abdf205577c961251e5ba839893da0.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7abdf205577c961251e5ba839893da0.exe"C:\Users\Admin\AppData\Local\Temp\d7abdf205577c961251e5ba839893da0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\DA62.tmp.bat2⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4788 --field-trial-handle=2232,i,9772508353233483703,11473701862007458502,262144 --variations-seed-version /prefetch:81⤵PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD51159dcec0497b039ef3cdd4ede179e69
SHA120081aa6e97ccf7b686b3b22843b7d4619927b39
SHA256e175aedf73cccaf6e45754513d7686f80a9ae0a9c7605c4dc8df9b9397fd3026
SHA512a66248d23f79da9d399b43e1926e0afd69fe6936f5aa9d5b7cadc10e2db3056de832763d9d0efd9d9d0a5127f1b68ae03f5ae3c7d429c04afbc10e3687ef916b
-
Filesize
428B
MD5249211d24809ab715c8ec1ceb6c97cc4
SHA1e69440b857f83f74fa9a71c132dd60e9c6e583ff
SHA2569288bbd417ccf3d63abd1724061f711128d64cc826cb865f59bfc2352a74bfe4
SHA512ce5f716b1093741f24f6364e18bc98c893500381e802c78d513309e50abd27c26edebed7bb3da6dab412d7d53ceb9aff2f809e2e28376ffa2e02747660e64d7a
-
Filesize
2.1MB
MD590137076490e6a07b34b5fd8c1b88779
SHA14729160fb125dc411af0b109362769525770299a
SHA256dabcfd8947397d499fecf530469e68513e522b02929c76eb2d8049003a60a7b9
SHA512dcd54a8eadacbfe9007ff26a79046cd3c9f0eba48577eede5c63a344986adfd21bf2b6a97069700a8c2e6e2428cd4434a33338b17b6e0b000d57a48d05e2084b