Overview
overview
10Static
static
72260e01650...fc.exe
windows10-2004-x64
1024b96bca46...df.exe
windows10-2004-x64
102590c6aee0...47.exe
windows7-x64
32590c6aee0...47.exe
windows10-2004-x64
102a4e0bfefe...ad.exe
windows10-2004-x64
1030b28fbbc6...6a.exe
windows10-2004-x64
1045405e3261...66.exe
windows10-2004-x64
104daea23a41...5a.exe
windows10-2004-x64
106568836094...3d.exe
windows10-2004-x64
1072a27ce3ad...a5.exe
windows10-2004-x64
107ba9a39823...5d.exe
windows10-2004-x64
107f181e671c...fc.exe
windows7-x64
37f181e671c...fc.exe
windows10-2004-x64
108a74314c35...5a.exe
windows10-2004-x64
7ae6ddd393a...d7.exe
windows10-2004-x64
10b2402bf5ca...fa.exe
windows10-2004-x64
10c39e49cedb...e5.exe
windows7-x64
7c39e49cedb...e5.exe
windows10-2004-x64
7cd321830f5...bc.exe
windows10-2004-x64
10cfcca94dd6...6e.exe
windows10-2004-x64
10dfa156ac28...ff.exe
windows10-2004-x64
10f25337a343...56.exe
windows10-2004-x64
10f5d16598bf...16.exe
windows7-x64
10f5d16598bf...16.exe
windows10-2004-x64
10Analysis
-
max time kernel
131s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:40
Behavioral task
behavioral1
Sample
2260e01650710f720d71241eb7bd5d4c48d8b8a009804752139cf762bcd962fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
24b96bca469764debd638550bc2704add4701110cc7a691fae627e361d8188df.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2590c6aee0971ee73ddf13b31120ab5a7a7268c588bc55a8fe221b203913c447.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
2590c6aee0971ee73ddf13b31120ab5a7a7268c588bc55a8fe221b203913c447.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2a4e0bfefe7b6b2a94d46c408fe05d1682392c66666138b8b0c32e028bf15aad.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
30b28fbbc6f9f8aa27776aa07f15f77a8fe9829ca5ded9e75d26ca377674a46a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
45405e326148ce7f80326893b92fe8efe62819ee5465fdc13767a76472e21566.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
4daea23a41245608877f956cf37370e6533344758835349d21470fee22792f5a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
6568836094de3a32f9c325ced189bb981eb0cf8f4492e1b8b901ef52879c063d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
72a27ce3ad4f2daa863374d24914b9bdd41f5b34e08b440b9988fd847de7a3a5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
7ba9a3982314fb26523fd5988b2b520e3a32094566503b3706d39e88d9a9b35d.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
7f181e671ca7e88969b8dbb65e5906d2d04178a6bfb5756591ea3bc12c4809fc.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
7f181e671ca7e88969b8dbb65e5906d2d04178a6bfb5756591ea3bc12c4809fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
8a74314c35a7a341a4dec6d70e0d6801d49282a77f6ca44fee133e1d3ae7b45a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
ae6ddd393a98c003c8da6717e815e71c83f5a3b75783ce55e2793d35c51a9ad7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b2402bf5ca4c67871f6519e689231078532c147c35500668d062dec52e27e9fa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
c39e49cedba79cf37944568e6b8975f59cf50c3ee02bad2cb56a9047b12fcee5.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
c39e49cedba79cf37944568e6b8975f59cf50c3ee02bad2cb56a9047b12fcee5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
cd321830f55d58d1391cb6f68bd887e31a7e1c0da19880caac02e0804afeb9bc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
cfcca94dd6bef9e4222fd6347d090711d60251b7718a2a4955753cd95d8e9a6e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
dfa156ac28a140cde5b62ac7d594d1000da526091fd584c8e8caa96c692a5bff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
f25337a343c26cdecd99eb7f095938fd24fb233463a8af3fa69acc5201eed956.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
f5d16598bff76b7aeece243b4478a48e666bbf1a2adb20f2684cefe2f7d06616.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
f5d16598bff76b7aeece243b4478a48e666bbf1a2adb20f2684cefe2f7d06616.exe
Resource
win10v2004-20240508-en
General
-
Target
8a74314c35a7a341a4dec6d70e0d6801d49282a77f6ca44fee133e1d3ae7b45a.exe
-
Size
12.3MB
-
MD5
a1e5c187755b1d1f6ecd92de6a1ee13d
-
SHA1
b809713035e9e0451f7ab7e7b8f29b2c8e44dff5
-
SHA256
8a74314c35a7a341a4dec6d70e0d6801d49282a77f6ca44fee133e1d3ae7b45a
-
SHA512
c6e484d4668cd78d67b5ba5f65ab4639c2c03906e8585388aba521ec0ec062f9ea24109f174e9c4805c33230b5162a40ffcc65095f68d6baa14ef6b69490ecf0
-
SSDEEP
196608:tUSP+yQZ55mfaEsVpxlTCUmT3p84YcgYp6OfPe1VyW4PTPJetC93t:tFw/41sVpTTC89PYgmPe1VSrPoC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 976 Five_Nights_at_Sonic_s.exe -
Loads dropped DLL 3 IoCs
pid Process 976 Five_Nights_at_Sonic_s.exe 976 Five_Nights_at_Sonic_s.exe 976 Five_Nights_at_Sonic_s.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8a74314c35a7a341a4dec6d70e0d6801d49282a77f6ca44fee133e1d3ae7b45a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 976 Five_Nights_at_Sonic_s.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5108 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5108 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 976 Five_Nights_at_Sonic_s.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3644 wrote to memory of 976 3644 8a74314c35a7a341a4dec6d70e0d6801d49282a77f6ca44fee133e1d3ae7b45a.exe 83 PID 3644 wrote to memory of 976 3644 8a74314c35a7a341a4dec6d70e0d6801d49282a77f6ca44fee133e1d3ae7b45a.exe 83 PID 3644 wrote to memory of 976 3644 8a74314c35a7a341a4dec6d70e0d6801d49282a77f6ca44fee133e1d3ae7b45a.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a74314c35a7a341a4dec6d70e0d6801d49282a77f6ca44fee133e1d3ae7b45a.exe"C:\Users\Admin\AppData\Local\Temp\8a74314c35a7a341a4dec6d70e0d6801d49282a77f6ca44fee133e1d3ae7b45a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Five_Nights_at_Sonic_s.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Five_Nights_at_Sonic_s.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:976
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f0 0x4701⤵
- Suspicious use of AdjustPrivilegeToken
PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD5e8c0279160405830ca73dca4a4271135
SHA11d8e18776974906104e92dcdcb8ee3ca5085edd8
SHA2560e4d2e3203c4131f78cfda913ba96b8708a31df2801552f6203ab4a311b5e35b
SHA51249673e57429aa8e2e45277a8e131fe68a0984b8230a9347fb437aa01ea2f4f12da91e85ede29bfd725af3b0a348fca0254e8c0ce82d1b979bfa6d292a0b6011d
-
Filesize
16.6MB
MD56a3914ec3fad2d6f1e3ffbc064b7bc76
SHA1189239dce9541cd9d841e8da51b01b21d139a48e
SHA2569a0ee5df414ad34b4671c34b200c82666ee4fcc37b4274417f103628fab0cb91
SHA51229cd9ee42917c30464f69fad1e9a3da9beaf69f81dde7c857b7b0f87774253da899cbfbcf7e813a5dbdff236c104f15ce1633e393f4e22de99db08040444aff4
-
Filesize
57KB
MD575f466753767c33e59f218d82660312b
SHA1181da454addc1413f2eb0cf0bb8eeed860ff296d
SHA25650bf531db3fae6dbe88f166b8aff11da18ef5a0ed6918bd23cb353068e56e2d4
SHA5129203e932c46d5a6782a42c3ead5a61ae55774cab9f2ea2ba2d2c5d17baf4b782e45d50140303fc4d8f84c98e7ecdf7c8d0801abc565de46c5676c2cf9748d626
-
Filesize
1.9MB
MD586e39e9161c3d930d93822f1563c280d
SHA1f5944df4142983714a6d9955e6e393d9876c1e11
SHA2560b28546be22c71834501f7d7185ede5d79742457331c7ee09efc14490dd64f5f
SHA5120a3e311c4fd5c2194a8807469e47156af35502e10aeb8a3f64a01ff802cd8669c7e668cc87b593b182fd830a126d002b5d5d7b6c77991158bffdb0b5b997f6b3
-
Filesize
237B
MD5277a235426b5526cf6c57dfcab0fb833
SHA1a727a52d5a992a216567597a62085b296b8d47f1
SHA2567d296b234411bffd6ef6c9cf008ef28af44410bb9b5dc3e50948dcb5a58fae62
SHA512a46395b66932a3953b0779c4703df3aef0c1b645f68f61f117704bf1f68167ee0bea739aa63fd416a051aa65737a98e3a8884c17d5d1c59bdf886abc23f497d4
-
Filesize
319KB
MD549069a0ab0892d2a4b1f5ff114571b5c
SHA1f75c3ef3b3da8fe182307ebf650bf0aa05678429
SHA25602224a4afa548de7b409d515dc4e9e7c5a60653f432639c568140a05cf84f045
SHA512557f6e2fff9b11bbf5e3508fbd871b8d4d14a619e11b17738c414903412ec80d6b7f74f80a3d80cbff7956fbe0f83453f03d49edb1550d35a6754638a33c5cb1