Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
HxDPortableSetup.exe
Resource
win10v2004-20240419-en
General
-
Target
HxDPortableSetup.exe
-
Size
3.3MB
-
MD5
565554ea03b1ef7812e66f13262de601
-
SHA1
77558ff5d65d181b9de3ba353538283f51de396c
-
SHA256
7eed3fbb271a7db6d061106a0e20a5a193388f800812266cdbb7526e469820a8
-
SHA512
b2b052102b1f712bbf7959cba7268c4f033492a6027779d7c6711f024a2c9bbe3d573a3695e92da407b12072e79ea6750d78695bb29bf632ea7cd87e9a9bf2f8
-
SSDEEP
98304:SYgmygQ4mUSSlmD5u6hY1T/zgzdpV9u1O:fgmw4iS+r205pVMo
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2728 HxDPortableSetup.tmp 3676 HxD64.exe 4024 HxD64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings HxDPortableSetup.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 HxDPortableSetup.tmp 2728 HxDPortableSetup.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 HxDPortableSetup.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3676 HxD64.exe 3676 HxD64.exe 3676 HxD64.exe 3676 HxD64.exe 3676 HxD64.exe 3676 HxD64.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2728 1656 HxDPortableSetup.exe 85 PID 1656 wrote to memory of 2728 1656 HxDPortableSetup.exe 85 PID 1656 wrote to memory of 2728 1656 HxDPortableSetup.exe 85 PID 2728 wrote to memory of 3676 2728 HxDPortableSetup.tmp 99 PID 2728 wrote to memory of 3676 2728 HxDPortableSetup.tmp 99 PID 3676 wrote to memory of 4024 3676 HxD64.exe 100 PID 3676 wrote to memory of 4024 3676 HxD64.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\HxDPortableSetup.exe"C:\Users\Admin\AppData\Local\Temp\HxDPortableSetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\is-F62ER.tmp\HxDPortableSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-F62ER.tmp\HxDPortableSetup.tmp" /SL5="$401CA,2973524,121344,C:\Users\Admin\AppData\Local\Temp\HxDPortableSetup.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\Desktop\HxD\HxD64.exe"C:\Users\Admin\Desktop\HxD\HxD64.exe" /chooselang:enu /createdefaultconfig:normal3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\Desktop\HxD\HxD64.exeC:\Users\Admin\Desktop\HxD\HxD64.exe /chooselang4⤵
- Executes dropped EXE
PID:4024
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534acc2bdb45a9c436181426828c4cb49
SHA15adaa1ac822e6128b8d4b59a54d19901880452ae
SHA2569c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07
SHA512134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb
-
Filesize
6.6MB
MD514fca45f383b3de689d38f45c283f71f
SHA15cb16e51c3bb3c63613ffd6d77505db7c5aa4ed6
SHA2569d460040a454deeb3fe69300fe6b9017350e1efcb1f52f7f14a4702d96cb45ca
SHA5120014192bd5f0eb8b2cd80042937ccc0228ff19123b10ee938e3b72a080e3f8d3d215f62b68810d4e06b5fad8322d0327dcd17d0a29fd0db570c0cd7da825634c
-
Filesize
3B
MD5392b810f865591aa5ec210e849ae769f
SHA1f3fd0c8f2a347e168ef392e38c52f4134987a3a6
SHA25678b33626b46709ebe04edd99ea813ed291183bebb025ea5e4783ca2260811943
SHA5125d650d9045243ce2495a845683b3252419bc283fe9ecec85b56de0a179a5df77d8ddf8ccb41ff555043bf1e9a3c9a0a3e1efec17cc2d291b5236589a80df0f04