Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe
Resource
win10v2004-20240226-en
General
-
Target
ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe
-
Size
384KB
-
MD5
7aa14a025510fa26e46424325153cc67
-
SHA1
56776af9d448675e96a4ad2c289798229095553b
-
SHA256
ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f
-
SHA512
5affca2864c55969cd998c59cbb2a9a3399c1e23ad5861b6f7ffd4e4a0a9babc79c6aa80c298e2bcbde4b9cee1da4b27b9c35d6f1ba1280ea90b16155165ccf9
-
SSDEEP
6144:+A8TpOnZnLGiNeb28W0Mzk3P1LTmXV5UNvup99CdoOK:+AEpORGiAb2zZIlTsmup93
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 6 IoCs
resource yara_rule behavioral2/memory/536-1-0x0000000000400000-0x00000000004EE000-memory.dmp UPX behavioral2/memory/536-13-0x0000000000400000-0x00000000004EE000-memory.dmp UPX behavioral2/memory/2080-19-0x0000000000400000-0x00000000004EE000-memory.dmp UPX behavioral2/memory/2080-22-0x0000000000400000-0x00000000004EE000-memory.dmp UPX behavioral2/memory/2080-28-0x0000000000400000-0x00000000004EE000-memory.dmp UPX behavioral2/memory/2080-30-0x0000000000400000-0x00000000004EE000-memory.dmp UPX -
Deletes itself 1 IoCs
pid Process 2080 oF28326MdInP28326.exe -
Executes dropped EXE 1 IoCs
pid Process 2080 oF28326MdInP28326.exe -
resource yara_rule behavioral2/memory/536-1-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral2/memory/536-13-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral2/memory/2080-19-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral2/memory/2080-22-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral2/memory/2080-28-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral2/memory/2080-30-0x0000000000400000-0x00000000004EE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\oF28326MdInP28326 = "C:\\ProgramData\\oF28326MdInP28326\\oF28326MdInP28326.exe" oF28326MdInP28326.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1428 536 WerFault.exe 90 4280 2080 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe Token: SeDebugPrivilege 2080 oF28326MdInP28326.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2080 oF28326MdInP28326.exe 2080 oF28326MdInP28326.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 536 wrote to memory of 2080 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 94 PID 536 wrote to memory of 2080 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 94 PID 536 wrote to memory of 2080 536 ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe"C:\Users\Admin\AppData\Local\Temp\ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 6682⤵
- Program crash
PID:1428
-
-
C:\ProgramData\oF28326MdInP28326\oF28326MdInP28326.exe"C:\ProgramData\oF28326MdInP28326\oF28326MdInP28326.exe" "C:\Users\Admin\AppData\Local\Temp\ae393459f9dfd0824c8a0438eb7569f6772752302139f5f22fdbfc5e589f7e1f.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 6683⤵
- Program crash
PID:4280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 536 -ip 5361⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2080 -ip 20801⤵PID:2176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1412 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD58e4fbf74154f4a9160ce0ca4fc755e65
SHA178330bd28ae142e5f045d8aace39a606e6d21b5b
SHA256cfc795ea09cdbb61f8f4790dd3a3ccdae88eb022ec28294e2239432b72759dbe
SHA51259978eb7d68c90b659304294a4b3487f627121833760ad82d191194aabc274f4c28be4f4f498143305dece9ab543576d6029137c9832dec992534b852a5a8616