Analysis
-
max time kernel
167s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
32699d6edee198eaa15f03feaf8b895c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32699d6edee198eaa15f03feaf8b895c.exe
Resource
win10v2004-20240226-en
General
-
Target
32699d6edee198eaa15f03feaf8b895c.exe
-
Size
1.2MB
-
MD5
32699d6edee198eaa15f03feaf8b895c
-
SHA1
14395dccfea97444a0031e185276e3f83cb0c6a3
-
SHA256
aa5063b6e0df42d9e7b064e2d658355efb1bdde37ec1d31617e370b0f2906549
-
SHA512
665953161f376a88da58a8e10431f72d60965f4d25df09932059d6ff0802cabb24c79bb44ddad355694558b118e36bf88278ba168ee03c462ed7c1dc7e52664d
-
SSDEEP
24576:jyhYW6oivxbvbVSLKCdFB2YuEWB/3wgQmlMsqjnhMgeiCl7G0nehbGZpbD:j8YlbvbaNFwYG93wgMDmg27RnWGj
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 988 alg.exe 3760 DiagnosticsHub.StandardCollector.Service.exe 3252 fxssvc.exe 2304 elevation_service.exe 4016 maintenanceservice.exe 2268 OSE.EXE -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 32699d6edee198eaa15f03feaf8b895c.exe File opened for modification C:\Windows\system32\AppVClient.exe 32699d6edee198eaa15f03feaf8b895c.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\7307da3bd8c8c63e.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 32699d6edee198eaa15f03feaf8b895c.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 32699d6edee198eaa15f03feaf8b895c.exe File opened for modification C:\Windows\system32\fxssvc.exe 32699d6edee198eaa15f03feaf8b895c.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_112359\java.exe alg.exe File opened for modification C:\Program Files\dotnet\dotnet.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_112359\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 32699d6edee198eaa15f03feaf8b895c.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3796 32699d6edee198eaa15f03feaf8b895c.exe Token: SeAuditPrivilege 3252 fxssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32699d6edee198eaa15f03feaf8b895c.exe"C:\Users\Admin\AppData\Local\Temp\32699d6edee198eaa15f03feaf8b895c.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:988
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:512
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2304
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4016
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2268
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD51a69e5306ec70092ff021704fdbfbc72
SHA154f2f008f93f4296dfdda335f766b03098a5281e
SHA25660b0bb698194712d1840a316b018787f6bfefb5ed43f788400bf8d99aa4fa9be
SHA512734c4360aff1d373f2f36a0f8025662470c8e8f2c4a77e9c5c0658a5771396fd5f86d43bc42f39aacc924793ac8c260d3f9cc63ba67d91525411390f2a7e5e8e
-
Filesize
1.4MB
MD590d1092ecd07eab818939b596dba18c6
SHA14ee94e238a640b6928e7c66a6429f9812c9e42ca
SHA2569f5e95f4cabe807ec013b06858d2da0081d59a245059180ce8d74d89e72ad9ef
SHA512220744452a8aea11fdaf343a184f201e8e41c76f08d142ef485a06589e02f992abfa3ee12248dda4bdbb6b3a48ba60cf0f9f795163364a8b03f9fe7064686a77
-
Filesize
1.4MB
MD5186196e79524999d199eb551e7323b88
SHA1e14a085af59708c484ee09a6ca5ed1af0583a2df
SHA256b5ba3fc0a54460b7d85fd9e567dcccead63972cc4e6274908a4540d118cb9994
SHA512b14184c2493017b5b5ef4681b81c115971502d6150154878396a334c7fbf6c402f9ff5f38adbcd9e44e58e79870144e303dcdb02b7426a3db81e17b4469a4586
-
Filesize
2.1MB
MD5f87e4623da02f5d0c9895bae610f0bc9
SHA1d8f312cafaf576c1bd554dd6dfc0eea206624d15
SHA256afe0a41b4d822fb4bd9cc88ad30cc6c3279c5c4912dced8a2cf8e9f231b5ad45
SHA512ce2cc8c4981dc0a21d81d1cbf116fd0e7b54820b64690945af25cca7caf50f43ef3b0199b99a17bbb2dc88a831892f03db04b90adacbd2eb33b31484c530f1e4
-
Filesize
1.3MB
MD5012547bbb11bae6d499436ddc531d98a
SHA1bd34ff72013f340b82233f99ff1d7b600fedd091
SHA256793cdffd56b09572dedfec002ab6fcea8759d6471c8c5b7f5f959c06ddadebba
SHA512cef527b4ef8df84dbaf449af045e80755671c9d8f7a9e23df6943fc4f022436dcfde390f4db4b94fe5cfb839ac7666ddc3bceb65513b2191a9bf5cae08bece25
-
Filesize
1.2MB
MD5bcf15be8e2d73ffd02a33cf070d86f10
SHA1cfa0955a43852882e7ad5378230847c4b982a280
SHA256991110f9e202153f4749cd3ac86ffede4f415458a9e11cf595080d277ab1becb
SHA512073d93ccc17d7446b1486dcf3a00f759ff25fca88968669c053d614f6ca2c0d80f0501211c1c10474c440ae081ad638fa326eaa8f8e78314d86c3f0e4b5b057d
-
Filesize
1.3MB
MD5e45558d7068675fa939060e0d424f653
SHA12ad8c94c8035d3dae726039f6e3db4af4bfa85f9
SHA256df210e41a9f595b531d9992eea425d2c23f8f1ce69825d33d9a6d497469ec342
SHA5121fa5220d9a0cc861917be972c8ea8fa6cfc7d5b54560e65fabd8d6ac72b356c80dcc020ea7f55998283aba81441718b7c6eb177cb0751de5cd400d1c1c5321bd
-
Filesize
1.3MB
MD5bea7139e3fe8b90cf773d525ca9a1703
SHA1c6cdaf2f132381db813567d3446c160433311c93
SHA256ad6bfbe16bab9a9d0e2925d33ee70162a9fcca2515bdd926e8585f925f89fde0
SHA51283f0fd00750344f6a1b27f667b5c93347ddeba3b0c4b78f28bdb1a2de9c463b73f427f1bc0da7690afa7530bdd16ed061c9f2443fe6cd02c8b61057f8514a8c9