Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe
Resource
win10v2004-20240412-en
General
-
Target
0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe
-
Size
107KB
-
MD5
33e06f65b319484f48184bdbf6cba33f
-
SHA1
3081c2831095f50b15728352b3cb70974512774b
-
SHA256
0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a
-
SHA512
bfe762c92f4f02ca174c794f37bb243720014d869f964d65b1ae201b1ce8ea05a70758fd6b6845df9e74848237386237f08338fda1f944832336de6fd4b62c3a
-
SSDEEP
1536:+7PvnKhWQtC3Izj6TrlDa2z6Ewd0zvPTQw9LBZRQ8V3zhbPp:uPvKztiIzj6xtDLBZRQ8Vj5Pp
Malware Config
Signatures
-
Detects executables packed with eXPressor 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023466-3.dat INDICATOR_EXE_Packed_eXPressor behavioral2/memory/4384-6-0x0000000013150000-0x0000000013167000-memory.dmp INDICATOR_EXE_Packed_eXPressor -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CFF8FD86-05DB-4990-92A9-0EE5FDFB7BFE} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CFF8FD86-05DB-4990-92A9-0EE5FDFB7BFE}\stubpath = "C:\\Windows\\system32\\WinHelp3.exe" regedit.exe -
Deletes itself 1 IoCs
pid Process 1008 WinHelp3.exe -
Executes dropped EXE 1 IoCs
pid Process 1008 WinHelp3.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHelp3.exe 0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 964 4384 WerFault.exe 95 4888 4384 WerFault.exe 95 -
Runs .reg file with regedit 1 IoCs
pid Process 744 regedit.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1008 WinHelp3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4748 wrote to memory of 744 4748 0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe 89 PID 4748 wrote to memory of 744 4748 0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe 89 PID 4748 wrote to memory of 744 4748 0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe 89 PID 4748 wrote to memory of 1008 4748 0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe 90 PID 4748 wrote to memory of 1008 4748 0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe 90 PID 4748 wrote to memory of 1008 4748 0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe 90 PID 1008 wrote to memory of 4384 1008 WinHelp3.exe 95 PID 1008 wrote to memory of 4384 1008 WinHelp3.exe 95 PID 1008 wrote to memory of 4384 1008 WinHelp3.exe 95 PID 1008 wrote to memory of 4384 1008 WinHelp3.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe"C:\Users\Admin\AppData\Local\Temp\0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Users\Admin\AppData\Local\Temp\240635703.reg2⤵
- Modifies Installed Components in the registry
- Runs .reg file with regedit
PID:744
-
-
C:\Windows\SysWOW64\WinHelp3.exeC:\Windows\system32\WinHelp3.exe kowdgjttgC:\Users\Admin\AppData\Local\Temp\0a9db6e9e13a8c8e14b3562c4af3d96d4c7e68a00ffbb722d2caa2c037ba334a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 2044⤵
- Program crash
PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 2124⤵
- Program crash
PID:4888
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4384 -ip 43841⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4384 -ip 43841⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378B
MD594f4a855c827e15e1fa7c8a57bc22e06
SHA1e640023daa26b2ef3e7371f9b0b1c9798f3f72ce
SHA256bf2b394d40273a7305a3b03bd982d199a224842818a2133cb8c0fdad05873cee
SHA512b0388fb467332bc344f034a9152642417f81c75d609398d62744a0e90bc2efbfa4db59c9f6d60bc8bd9cc7f982a89dd532fd17d198a2a02c9512544909306a3a
-
Filesize
107KB
MD5bc3d531ea8651fcab56c1b8883d6c682
SHA1bc4b39fe1b9a6631c6c2fab09222527898aabc25
SHA2569dadcb5a5bd6d6b8910bd5622142cccd9e812600fdb6fa8f412c4e3de9259d6a
SHA5125a26fe1ab383eca3af4dcaf2e3712af596f16cf24c1e65ce193dc93b60f7e4ce250413cd838236c7970e9e98d0c9394d3c145a872dad01fe8201867e4ce58138