Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 01:14
Behavioral task
behavioral1
Sample
30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe
Resource
win10v2004-20240419-en
General
-
Target
30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe
-
Size
685KB
-
MD5
358882e686c3e47616ca29ff4e4b0b5c
-
SHA1
f91139cacb91bef9097b6b7d6cf4bd61ca90b976
-
SHA256
30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf
-
SHA512
0fbe1fd2fad8690618d1fa859f8d0b4e5e74ab03792190de2939e40c1939ca9703d6ed9f84f4efb1f02fda5408f7f2a3a4b9c481dff47296d6877fb3551ecf1c
-
SSDEEP
12288:IsHzOUNUSB/o5LsI1uwajJ5yvv1l2QYnpTI11TflNkMIQPHR:biUmSB/o5d1ubcvynmPTflNXIQPHR
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/3224-0-0x0000000000940000-0x0000000000AC3000-memory.dmp UPX behavioral2/memory/3224-16-0x0000000000940000-0x0000000000AC3000-memory.dmp UPX -
resource yara_rule behavioral2/memory/3224-0-0x0000000000940000-0x0000000000AC3000-memory.dmp upx behavioral2/memory/3224-16-0x0000000000940000-0x0000000000AC3000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3224-16-0x0000000000940000-0x0000000000AC3000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3224 set thread context of 2340 3224 30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe 87 PID 2340 set thread context of 3540 2340 svchost.exe 56 PID 2340 set thread context of 4044 2340 svchost.exe 103 PID 4044 set thread context of 3540 4044 regsvr32.exe 56 PID 4044 set thread context of 2348 4044 regsvr32.exe 115 -
Program crash 1 IoCs
pid pid_target Process procid_target 1528 3224 WerFault.exe 83 -
description ioc Process Key created \Registry\User\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3224 30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe 2340 svchost.exe 3540 Explorer.EXE 3540 Explorer.EXE 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe 4044 regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3224 30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe 3224 30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3224 30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe 3224 30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3540 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3224 wrote to memory of 2340 3224 30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe 87 PID 3224 wrote to memory of 2340 3224 30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe 87 PID 3224 wrote to memory of 2340 3224 30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe 87 PID 3224 wrote to memory of 2340 3224 30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe 87 PID 3540 wrote to memory of 4044 3540 Explorer.EXE 103 PID 3540 wrote to memory of 4044 3540 Explorer.EXE 103 PID 3540 wrote to memory of 4044 3540 Explorer.EXE 103 PID 4044 wrote to memory of 2348 4044 regsvr32.exe 115 PID 4044 wrote to memory of 2348 4044 regsvr32.exe 115
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe"C:\Users\Admin\AppData\Local\Temp\30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\30f809d683f002853864a35cdcee48b223f474da1124827ea5c5202cc6b235cf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 7363⤵
- Program crash
PID:1528
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2348
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3224 -ip 32241⤵PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD50a92df38792d1c19b3390c570ee51ea4
SHA17be70ad463bfb7971c25195e72b95f1d33ed729a
SHA256a7528575cbe52b17734c3f4f8df96ee695d047a79233b758a5db5f9a03c9ae93
SHA512d77acb63f1456595c33f5f45b05bbbc750a0f4074c4cbb7c4332f8a0256de7feedfa947bfa7b9de2fbc69f00f7b73573d5752684fd35bbf581df3dc74c6a1775