Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe
Resource
win10v2004-20240412-en
General
-
Target
c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe
-
Size
209KB
-
MD5
b1df1c9592f82fec08bc3114ce1ebfe3
-
SHA1
c167b5539586af0fac0ee0db0011f29275ad2417
-
SHA256
c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963
-
SHA512
7a3ff8769dc2d8944f9d2cbea7e6d34d65b8f82b7085e4d1a5747acb6ab680458161d32fdfe039fc2310d996b2284a2a02d7a2716c4d7e7132b9ba0e1cd37701
-
SSDEEP
1536:2wqlEbWxNcgi6BHbWy//5SnTkj0qs6/rld73n+ipRx9bU5y:qlugim7WQxSo0qVl13+iXwg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4964 svchost.exe -
Enumerates connected drives 3 TTPs 34 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\J: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\K: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\M: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\Q: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\T: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\H: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\L: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\P: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\S: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\R: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\U: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\O: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\E: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\I: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\V: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\N: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\T: svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\svchost.exe c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV\EFile = "053038176053037190092022049037111013038065153006010201066106220084004190092131222082205079178232231184142212162150234164210069036180160220060" c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV\DFile c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV\DFile svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3260 c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe 3260 c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4964 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3260 wrote to memory of 4964 3260 c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe 85 PID 3260 wrote to memory of 4964 3260 c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe 85 PID 3260 wrote to memory of 4964 3260 c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe"C:\Users\Admin\AppData\Local\Temp\c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Program Files (x86)\svchost.exe"C:\Program Files (x86)\svchost.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:4964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5f7c139fbabaf199152ed943d79b89d44
SHA1d35d0849185ea64db49ca807d0e82dfe34225cdd
SHA2568a457b221f5b1701aa035de89a0095d7348bea5f1ffd21b23c4ecea03cc3367f
SHA512756bc4070712f7564c5959fc1f7d5ee5a570956abbdb87d8d89a6038f8a9e9ba7b7674823b926520b537f419d4b4c9ce29d34dd646653bf5eaa402fed66da54c