Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
Resource
win10v2004-20240412-en
General
-
Target
ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
-
Size
668KB
-
MD5
f5a9217e194d53e7278423686286a391
-
SHA1
fb77be3876a2dc7c3e310e9fa16e96e69915b315
-
SHA256
ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84
-
SHA512
9011e6f131318d13a2d635356d48ac768c3e2f76dda8e7148d6431ee37db4a478a6cce9a1686d69b89d1ecfb7671844b4b76f35ab8efeff6c88b3f38f27fbf3b
-
SSDEEP
12288:tMMlcxAM4ssOdatX20XEnmf2xt8srDxm/RYSWt4lGU5626XJYSuDqe0HcBoB:1ciM4sAamfa8swC3OlGC6l5e0e
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 13 64 rundll32.exe 13 64 rundll32.exe 13 64 rundll32.exe 13 64 rundll32.exe 13 64 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3260 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe\"" ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2.bat = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\~5006525051632653882\\2.bat\"" ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3260 set thread context of 64 3260 rundll32.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeBackupPrivilege 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeRestorePrivilege 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: 33 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeIncBasePriorityPrivilege 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: 33 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeIncBasePriorityPrivilege 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: 33 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeIncBasePriorityPrivilege 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeBackupPrivilege 2436 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeRestorePrivilege 2436 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: 33 2436 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeIncBasePriorityPrivilege 2436 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: 33 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeIncBasePriorityPrivilege 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeDebugPrivilege 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2332 wrote to memory of 5100 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 86 PID 2332 wrote to memory of 5100 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 86 PID 2332 wrote to memory of 2436 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 88 PID 2332 wrote to memory of 2436 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 88 PID 2332 wrote to memory of 2436 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 88 PID 2332 wrote to memory of 2940 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 93 PID 2332 wrote to memory of 2940 2332 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 93 PID 2940 wrote to memory of 1048 2940 cmd.exe 95 PID 2940 wrote to memory of 1048 2940 cmd.exe 95 PID 1048 wrote to memory of 3260 1048 rundll32.exe 96 PID 1048 wrote to memory of 3260 1048 rundll32.exe 96 PID 1048 wrote to memory of 3260 1048 rundll32.exe 96 PID 3260 wrote to memory of 64 3260 rundll32.exe 97 PID 3260 wrote to memory of 64 3260 rundll32.exe 97 PID 3260 wrote to memory of 64 3260 rundll32.exe 97 PID 3260 wrote to memory of 64 3260 rundll32.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe"C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe"1⤵
- Adds Run key to start application
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c set2⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exePECMD**pecmd-cmd* PUTF -dd -skipb=588800 -len=95855 "C:\Users\Admin\AppData\Local\Temp\~7651150042606607205.tmp",,C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\~5006525051632653882\2.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\system32\rundll32.exerundll32 ./1713161804.dll dllentrypoint3⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\rundll32.exerundll32 ./1713161804.dll dllentrypoint4⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe5⤵
- Blocklisted process makes network request
PID:64
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD54fe3607b4c01296b113e08f46cd76a04
SHA10267353daa20fb9d30d7460bab108d0a328d56b2
SHA256247c09410d5ea2ee97500e91f0b3e57bb7290c1518084d3447c6fab8f08b235c
SHA5120d405a8d17af2d6ea465452586f59522f5681b1d19c60e03f960202fdd8293bb36e97aa47ac66b5e79104beb1815ce5179a5032f4a8e2c80edf96af050b8f751
-
Filesize
39B
MD5715da46a4cc962d88be2cafe42eedd66
SHA19771b59f518541e0d069b52df70ccfe078cbcc3a
SHA2566c782df52d05fb69739152b1de15314419416c8574abcd678d838c3d0574c735
SHA5123740475d9a78f51d1a4ae8434b69c76fc6a115a06deda2e234cdb38f3903ff10e640dd2aa75e5a996709839b7f85691d75574e77bfe57389c247cff058d06c61
-
Filesize
93KB
MD5835b66cbbd0f128745bb599c5084116f
SHA1f74e6458e1dec5a37451116ce0d2b8a3bcb72cc8
SHA256783700e78c2994420768bb735212f079b6d5eaf6f0c2b62dd028f9319f464a08
SHA512e260a98b65f76c2b25da9f1ef63770535918779c7a7f149d70682cd4057e83a5bda396dfbb73b2d74ed9002162163db764cc1ae5b0a43a4941411116edfe7f6a
-
Filesize
120B
MD580507abb0b1575866c4a0e5ef9ec28bd
SHA1bbadf07fc5300dcf42963b23ab635696caf4315b
SHA256fd5d88b7220de1a9732bf6fc39980e50285c3f77e1f040dbf93060880a0f695e
SHA512b4573e394044bcfc8f52656224e8266d091f30a22b6e32f3d488e61cc574aab603771460c253dd5325f1dca104a49dee53fe26890a3c516eef1195b1e31c7079