Analysis
-
max time kernel
141s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe
Resource
win10v2004-20240412-en
General
-
Target
8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe
-
Size
438KB
-
MD5
f57619f1e4eece21c3183e445001ff4d
-
SHA1
146055f362d9134917819949a329985318221808
-
SHA256
8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774
-
SHA512
e612a2482e598e185f72f5620ce9bf07b871d227fdc67a45cf2a4cfa0409c8e0b332211c220d2f39eeeb63c035092873f1a72693c71cdb998c687a55beda96ce
-
SSDEEP
6144:WdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70NqY:s8kxNhOZElO5kkWjhD4A45lGU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2204 FIR.EXE -
Modifies system executable filetype association 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command FIR.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\$Recycle.Bin\\XYW.EXE \"%1\" %*" 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XYW.EXE = "C:\\$Recycle.Bin\\XYW.EXE" 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\M: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\Q: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\V: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\J: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\K: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\P: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\T: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\G: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\H: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\N: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\R: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\U: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\E: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\I: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\O: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe File opened (read-only) \??\S: 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Users\\MUUQYH.EXE \"%1\"" 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Users\\MUUQYH.EXE %1" 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open\command 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Users\\MUUQYH.EXE \"%1\"" 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\$Recycle.Bin\\XYW.EXE %1" 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\$Recycle.Bin\\XYW.EXE \"%1\" %*" 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command FIR.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2204 FIR.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 2204 4748 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe 86 PID 4748 wrote to memory of 2204 4748 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe 86 PID 4748 wrote to memory of 2204 4748 8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe"C:\Users\Admin\AppData\Local\Temp\8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe"1⤵
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\PerfLogs\FIR.EXEC:\PerfLogs\FIR.EXE2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD5b6d55b13bf6d70c09a31b6fa4220f494
SHA1009823191e00d82aaeb8ef695a66bb58ebb4cc58
SHA256384c1d08d44412fe1cba0fc7b03ca0176839dc8486867c12937e956470dd729a
SHA5127b6afa916232900a8ae0bcf0eb693c0d26b609816a963fb31d59649611f3a189fa478aaa62c1cd139a610918de2bb37dcf596447fe112f8a284cfa19b2d0e95d