Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 03:02

General

  • Target

    d09039c17434d523b01e13468ed9446dc26c9a8061875a654de8747605df20eb.exe

  • Size

    151KB

  • MD5

    82fa99987d4a4e4c6add3bfecddd43d9

  • SHA1

    01a86a7262e5430b2b6ec0e88fe2e4e29497c148

  • SHA256

    d09039c17434d523b01e13468ed9446dc26c9a8061875a654de8747605df20eb

  • SHA512

    24d60f2c7fa8be61d28b95c941435209278304cc9f37835bd3e9ae41b1baf93271ee3b6352a4923d2acdf1e396133071d1092e9ffda5c75b327370038637532b

  • SSDEEP

    1536:oOoq1XuNCQy7vm9iV+sW6VQcFa/SNmBtBneGr4qjOOiE5gVehKOjNrG58Z3qOT/w:SK66hW6k6uBneGEq6OiE5uehKyazo/w

Score
9/10

Malware Config

Signatures

  • Detects executables packed with ASPack 15 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d09039c17434d523b01e13468ed9446dc26c9a8061875a654de8747605df20eb.exe
    "C:\Users\Admin\AppData\Local\Temp\d09039c17434d523b01e13468ed9446dc26c9a8061875a654de8747605df20eb.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Users\Admin\AppData\Local\Temp\ d09039c17434d523b01e13468ed9446dc26c9a8061875a654de8747605df20eb.exe
      "C:\Users\Admin\AppData\Local\Temp\ d09039c17434d523b01e13468ed9446dc26c9a8061875a654de8747605df20eb.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1492
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\system32\dashost.exe
      dashost.exe {df152304-f587-40f4-85ee4548f7c8460a}
      2⤵
        PID:2940
      • C:\Windows\system32\dashost.exe
        dashost.exe {3d526bea-ae45-4c51-9bd773b3329c108a}
        2⤵
          PID:4188
        • C:\Windows\system32\dashost.exe
          dashost.exe {0a2e541a-e15d-4517-85ff3782b247422b}
          2⤵
            PID:952

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ d09039c17434d523b01e13468ed9446dc26c9a8061875a654de8747605df20eb.exe

          Filesize

          81KB

          MD5

          321b68d735ace871f0925934911044c1

          SHA1

          e8a5e39dddd1d595bdd43639c0ed1e6ffb537563

          SHA256

          f2fdb7bf291962f08f575b94a3701217fe35b74bfa389f4ef241246ffe2a61f9

          SHA512

          a7ce9f0d08076648c679871d04df52e2b91a93316922c586735ec8ace25d077cb798e465c79532f332f028b3c77e16eb8d7f3269bc9a374ffdbc97840fe0547b

        • C:\Users\Admin\AppData\Local\Temp\_bfsvc.exe

          Filesize

          70KB

          MD5

          f8b821b34d4c35253cea622ccae97b3e

          SHA1

          f0a9c97031a802de62a55e80234188219eb73f04

          SHA256

          d40117b82bd74498d3d0e5c5ffc7dda9b5eaa393cd03528b7d102a541d85b418

          SHA512

          ef0276fe604f9fb58f13db9cc5de7dc19cbf6bb9f4c4eb0546d543f864d63c544d3466d25823084159caea0ead0966f6f11cb0e5dc53314f3105cc848b747164

        • memory/1440-657-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-52-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-100-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-218-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-338-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-492-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-770-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-910-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-1073-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-1221-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-1385-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-1484-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1440-1623-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB