Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe
Resource
win10v2004-20240226-en
General
-
Target
ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe
-
Size
213KB
-
MD5
9f56c78b9409d1d1af7b9a7b996eca57
-
SHA1
664107f2d267ad84a5ab4a41bb142b2d460f081c
-
SHA256
ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90
-
SHA512
0d96b35c68a0af651f74fe8a24310f041b5a213f82fc4d86d431c25d7ecaf3d35813ba306e194fd2e4cb8da82e05bf3fa04e4cc909e43b3bec7621a91fac5824
-
SSDEEP
6144:ztvBPnU1b7e9SQii1EkoNlhlrQ2ZrM2xo:Zv1nWdQP1EDhZPxo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3764 Isass.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 228 ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe 228 ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe 3764 Isass.exe 3764 Isass.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 228 wrote to memory of 3764 228 ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe 90 PID 228 wrote to memory of 3764 228 ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe 90 PID 228 wrote to memory of 3764 228 ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe"C:\Users\Admin\AppData\Local\Temp\ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD59f56c78b9409d1d1af7b9a7b996eca57
SHA1664107f2d267ad84a5ab4a41bb142b2d460f081c
SHA256ae5da10273738644c3c9eb3d73c1fa55c537a0fd56bd141f9c61d52c65018e90
SHA5120d96b35c68a0af651f74fe8a24310f041b5a213f82fc4d86d431c25d7ecaf3d35813ba306e194fd2e4cb8da82e05bf3fa04e4cc909e43b3bec7621a91fac5824
-
Filesize
683KB
MD563f1f6e0f70994476aa3f38783ce1e99
SHA107b3f2ab07eb7812fb7c767e20947c855eaec36b
SHA256e35d0c3c340b494bd91a09bbd4232f4ab0bd526e7ea0fe31f9076cdf6f25f4c8
SHA512860f8b8cc934d22b2a6d594081cdb5d2bf2eb40c709d6573026ed042befa0a7312c6948d2cf5eb091d4f166fc6161b047286928d7e0cadab020d858e87e3b26f