Analysis

  • max time kernel
    155s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 12:11

General

  • Target

    1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe

  • Size

    4.3MB

  • MD5

    071f8bfffa76377293c3846706a9eee9

  • SHA1

    fb8a1393c2c7c9e3adb21930e10633605c028a2d

  • SHA256

    1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2

  • SHA512

    84d21135d1410597037321ce8434a27dee3878e4b3992ca2ae3837c0b1715f021aec3e5a42a00e2ae019b917c631b87bcd08844b672e3669f0c0c55b71789b4f

  • SSDEEP

    98304:tIOMcwQObrql/9CpTxJJphqC3vKfOlk36VncyH7kuK2OFVa:tIUfObrQ/kX8euKk36VnH62

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe
    "C:\Users\Admin\AppData\Local\Temp\1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jo6pN03.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jo6pN03.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\HX6eg45.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\HX6eg45.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq8fa68.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq8fa68.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1192
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aF72hB0.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aF72hB0.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4708
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/
              6⤵
                PID:2764
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Xd7831.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Xd7831.exe
              5⤵
              • Modifies Windows Defender Real-time Protection settings
              • Drops startup file
              • Executes dropped EXE
              • Windows security modification
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1036
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "powershell" Get-MpPreference -verbose
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4884
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4084
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
                  7⤵
                  • Creates scheduled task(s)
                  PID:1248
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:184
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
                  7⤵
                  • Creates scheduled task(s)
                  PID:4232
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4008 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:3784
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=3988 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:1
        1⤵
          PID:3168
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=4924 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:1
          1⤵
            PID:4728
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5444 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:1
            1⤵
              PID:4872
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5416 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:1
              1⤵
                PID:3956
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=6012 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
                1⤵
                  PID:2764
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3444 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
                  1⤵
                    PID:4604
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=6220 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
                    1⤵
                      PID:1452
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6332 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
                      1⤵
                      • Modifies registry class
                      PID:4744
                    • C:\Windows\system32\AUDIODG.EXE
                      C:\Windows\system32\AUDIODG.EXE 0x4ac 0x504
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1724
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6376 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
                      1⤵
                        PID:2116
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=4260 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:8
                        1⤵
                          PID:4168

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jo6pN03.exe

                          Filesize

                          3.8MB

                          MD5

                          8f20f82e55f613e3387d8a4393d84415

                          SHA1

                          1fbb59f002e77b5608e555d5fb856ec649a94128

                          SHA256

                          fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e

                          SHA512

                          3596ff1cd6012bc0c3f6a8f928dc124499b2c64406ae8e99d994e84c6f8e817869adb3c23a1ca221a418521dbba2592bef264c43514a0dbab794d69b57af3f4d

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\HX6eg45.exe

                          Filesize

                          2.4MB

                          MD5

                          b56c9c48c9be9fe4136433ba42ff386b

                          SHA1

                          ca41a545b363d093d54478164341a674d14fc20e

                          SHA256

                          6547f1c95bc0b060cd5e5f6b8e5e968b730cd21f758f6dd5371e802b13a5a1de

                          SHA512

                          cd0d1d2515ddfa2f82c0a231ac628087ec07e12ae18f16725c8c00f143e42babbdf6fdaa364c3a73995b11c500229ed2b80fb0b49ee9c053b27d00c0318b30f4

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq8fa68.exe

                          Filesize

                          2.0MB

                          MD5

                          e1ca89e321f8198d4253c9178eb523ff

                          SHA1

                          fe072ee589998082c37b054c4d8e4f0a6aa4eeb7

                          SHA256

                          3e36cb02ee15f0803929c4cc4ae0639ce652b40ae83519e020dc3e5273dde39a

                          SHA512

                          af0d2629e4fce28b141f77762d351ff64c64fc965b9fd51bad073948841c6ea19655e34a7d1aed30837c67cac6e0e5f8af52e9eca07d58a77fdf3d213cd59f2d

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1aF72hB0.exe

                          Filesize

                          894KB

                          MD5

                          3e82adb682d9d441331dde8a3c888f6e

                          SHA1

                          6dc1fe6731402b85d721946e65559a375878a3e1

                          SHA256

                          4b87018ae58796055ba9ae76bc21519c1e51f7dcfa79344b27047efec6d9d666

                          SHA512

                          f346d6eea780ae0cf5faf8fcbb7815a0c461de710a013ac5106c9eaad31dd778765c8709550911921653a13c3e94e5d860b472a671944b51edfa840c019ccca7

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2Xd7831.exe

                          Filesize

                          1.5MB

                          MD5

                          fb69bac77dd5e98885e6caea73271736

                          SHA1

                          51ad255e0b6ffe879375c4cda30f8791a13e1c55

                          SHA256

                          302f18643a0476b96ae334230de72d315f753902124fbb9b97d73d73941eed7e

                          SHA512

                          3558688f41a573793d4d717316b1243d1371bb02f7f2c41a5156c60fdbc66a38ab36ce0f3c57f6fb4f4da5b546b6f18eff663d5647829432c02ce2693f856716

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3fxey5ey.a2a.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • memory/1036-74-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-57-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-34-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-35-0x0000000009310000-0x0000000009386000-memory.dmp

                          Filesize

                          472KB

                        • memory/1036-36-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-37-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-93-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-92-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-91-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-81-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-30-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-32-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-48-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/1036-33-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                          Filesize

                          4.4MB

                        • memory/4884-58-0x0000000007130000-0x0000000007162000-memory.dmp

                          Filesize

                          200KB

                        • memory/4884-75-0x0000000007710000-0x00000000077A6000-memory.dmp

                          Filesize

                          600KB

                        • memory/4884-54-0x0000000005FD0000-0x0000000005FEE000-memory.dmp

                          Filesize

                          120KB

                        • memory/4884-53-0x0000000005B60000-0x0000000005EB4000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/4884-59-0x0000000070560000-0x00000000705AC000-memory.dmp

                          Filesize

                          304KB

                        • memory/4884-69-0x0000000006710000-0x000000000672E000-memory.dmp

                          Filesize

                          120KB

                        • memory/4884-70-0x0000000007370000-0x0000000007413000-memory.dmp

                          Filesize

                          652KB

                        • memory/4884-71-0x0000000007AB0000-0x000000000812A000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/4884-72-0x0000000007470000-0x000000000748A000-memory.dmp

                          Filesize

                          104KB

                        • memory/4884-73-0x00000000074E0000-0x00000000074EA000-memory.dmp

                          Filesize

                          40KB

                        • memory/4884-42-0x0000000005AB0000-0x0000000005B16000-memory.dmp

                          Filesize

                          408KB

                        • memory/4884-55-0x00000000061E0000-0x000000000622C000-memory.dmp

                          Filesize

                          304KB

                        • memory/4884-76-0x0000000007670000-0x0000000007681000-memory.dmp

                          Filesize

                          68KB

                        • memory/4884-77-0x0000000006600000-0x000000000660E000-memory.dmp

                          Filesize

                          56KB

                        • memory/4884-78-0x0000000006610000-0x0000000006624000-memory.dmp

                          Filesize

                          80KB

                        • memory/4884-79-0x00000000077B0000-0x00000000077CA000-memory.dmp

                          Filesize

                          104KB

                        • memory/4884-80-0x00000000076F0000-0x00000000076F8000-memory.dmp

                          Filesize

                          32KB

                        • memory/4884-41-0x0000000005A40000-0x0000000005AA6000-memory.dmp

                          Filesize

                          408KB

                        • memory/4884-40-0x00000000051E0000-0x0000000005202000-memory.dmp

                          Filesize

                          136KB

                        • memory/4884-39-0x00000000052A0000-0x00000000058C8000-memory.dmp

                          Filesize

                          6.2MB

                        • memory/4884-38-0x00000000027B0000-0x00000000027E6000-memory.dmp

                          Filesize

                          216KB