Overview
overview
10Static
static
30de9ceb4a3...69.exe
windows7-x64
30de9ceb4a3...69.exe
windows10-2004-x64
100e996fcc71...f5.exe
windows7-x64
30e996fcc71...f5.exe
windows10-2004-x64
102ab1df3f8f...6b.exe
windows7-x64
32ab1df3f8f...6b.exe
windows10-2004-x64
102d7becaac8...2a.exe
windows10-2004-x64
1050b189382d...9a.exe
windows7-x64
350b189382d...9a.exe
windows10-2004-x64
1057959e3af4...c6.exe
windows7-x64
357959e3af4...c6.exe
windows10-2004-x64
105f7c9e83d8...c5.exe
windows7-x64
35f7c9e83d8...c5.exe
windows10-2004-x64
1064b48352a0...25.exe
windows7-x64
364b48352a0...25.exe
windows10-2004-x64
108a870280a0...35.exe
windows7-x64
38a870280a0...35.exe
windows10-2004-x64
108f1e4113ca...56.exe
windows7-x64
38f1e4113ca...56.exe
windows10-2004-x64
1094cb7f4064...ae.exe
windows10-2004-x64
109d876cd8a7...ed.exe
windows7-x64
39d876cd8a7...ed.exe
windows10-2004-x64
10a4fbd5dfa9...dd.exe
windows7-x64
10a4fbd5dfa9...dd.exe
windows10-2004-x64
10b3796a101c...4b.exe
windows10-2004-x64
7f09814000e...42.exe
windows7-x64
3f09814000e...42.exe
windows10-2004-x64
10f18a59d97c...79.exe
windows10-2004-x64
7Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
0de9ceb4a3f0c63cb68673edcd3c26b70ac2ec4f12d5cdf1d81db75f95ef3e69.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0de9ceb4a3f0c63cb68673edcd3c26b70ac2ec4f12d5cdf1d81db75f95ef3e69.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
0e996fcc71a35f368ba66b5bcbbbd91872770dfbf086c97dd4f55f6a6a7d8df5.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
0e996fcc71a35f368ba66b5bcbbbd91872770dfbf086c97dd4f55f6a6a7d8df5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
2ab1df3f8fef1caee2ac62a5a72a677c82d0cc62b831066d9caa7cd26be2e26b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2d7becaac8437a8c0258bb0f063a1a2af48f03d8a3322e7389e31d21b2350a2a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
50b189382de3005433c015bc4f22fa6a9cebf1525a24a8eeb6fb3cf59ad3489a.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
50b189382de3005433c015bc4f22fa6a9cebf1525a24a8eeb6fb3cf59ad3489a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
57959e3af4c320aee2b25232e4f113ef2f450d94cb99bbef61b762a6a63ff2c6.exe
Resource
win7-20240508-en
Behavioral task
behavioral11
Sample
57959e3af4c320aee2b25232e4f113ef2f450d94cb99bbef61b762a6a63ff2c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
5f7c9e83d80a652c6bde9ce18eaca08f9cb8a8012568629c5813a8e40f7e7ac5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
64b48352a0dd795ca6516c50657af217337775242d7cc7c6b88a2881a343a825.exe
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
64b48352a0dd795ca6516c50657af217337775242d7cc7c6b88a2881a343a825.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
8a870280a0dc165cadf46427c4e47c56d3fa42aa2cf823a54358bf48f5102435.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
8a870280a0dc165cadf46427c4e47c56d3fa42aa2cf823a54358bf48f5102435.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
8f1e4113cab4b08359d501a8144bada9b1e16e7c08944bd38dffc1b93f044a56.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
8f1e4113cab4b08359d501a8144bada9b1e16e7c08944bd38dffc1b93f044a56.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
94cb7f4064a3c804b1fa19c3f5dc17ae361ced8153e20bd02842c65e16d1e3ae.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
9d876cd8a7ae7579651cacc17adc0cb431edfb9d97ab5211307feacb7d83fced.exe
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
9d876cd8a7ae7579651cacc17adc0cb431edfb9d97ab5211307feacb7d83fced.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
a4fbd5dfa976d2526590065d16e166ae2ba5b58a17bdcc8d1efbaca35ae55cdd.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
a4fbd5dfa976d2526590065d16e166ae2ba5b58a17bdcc8d1efbaca35ae55cdd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
f09814000e7cb43d244be02b82ed9e60e120494de3b1919428114f861d94a542.exe
Resource
win7-20231129-en
Behavioral task
behavioral27
Sample
f09814000e7cb43d244be02b82ed9e60e120494de3b1919428114f861d94a542.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral28
Sample
f18a59d97c873b24dac2d0b58c2c05627cd4379185e2fad2bbdbac27c2174d79.exe
Resource
win10v2004-20240508-en
General
-
Target
b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b.exe
-
Size
22.6MB
-
MD5
f405a45c4ecd213fded56e340298c9d6
-
SHA1
73ee6bdc0b4175894fd23d58fe4696997288e7ca
-
SHA256
b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b
-
SHA512
3db273d29319f8c41eb7a94098b480caf1b19bdd710471688d2e0d7b587d3cc2572c62ee0f917cc282c48405771374bca86d4138bf3d803960e6b3bb6f0abae4
-
SSDEEP
393216:Lt1OnpMR8K/HxAhnUMsXCSqOfkjABM96q7oGfM58Q5rm+qmpQo69rZkxPTWl3cdC:LtyO/Hx4UhO0hMAngM58crm4pk9rZkxo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1576 FnF Simulator.exe -
Loads dropped DLL 1 IoCs
pid Process 1576 FnF Simulator.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1576 FnF Simulator.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1256 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1256 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1576 FnF Simulator.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3392 wrote to memory of 1576 3392 b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b.exe 86 PID 3392 wrote to memory of 1576 3392 b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b.exe 86 PID 3392 wrote to memory of 1576 3392 b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b.exe"C:\Users\Admin\AppData\Local\Temp\b3796a101c5472ec92ed408404994548910bcae44a8f6d05925785b914dc7c4b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FnF Simulator.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FnF Simulator.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x518 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:1256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD5f79a74a03092918377d3c0c5d080d571
SHA14821f2e8e64e327f4b08fd690315f99a1e7497c3
SHA2563612028170742e6533b98215545d9c4e6d8a26a119f48b739b7a98c1158bdd7b
SHA512f3f094ec932e8901a3861845e878d79bc9e82156cdb5ef1d479b4d7222ece3a543649fd58fa7e0c320cfc28257eb2ec370a7c44622a3149d17111d5dfe22f6bd
-
Filesize
1.9MB
MD586e39e9161c3d930d93822f1563c280d
SHA1f5944df4142983714a6d9955e6e393d9876c1e11
SHA2560b28546be22c71834501f7d7185ede5d79742457331c7ee09efc14490dd64f5f
SHA5120a3e311c4fd5c2194a8807469e47156af35502e10aeb8a3f64a01ff802cd8669c7e668cc87b593b182fd830a126d002b5d5d7b6c77991158bffdb0b5b997f6b3
-
Filesize
22.6MB
MD5ec4410c30dd053e2b433a38df0923e5f
SHA1e341469afad91621ea7e44fab372b44eff417cbd
SHA2562ead88fde9a959ea7c89363470270a3bec7684a49331016aec024f43d6f7406f
SHA512d4bc6b6af8871b56e13f180904500e72a1c27e38c68db855c91b6a0b6c60542c9094ef1e88f8839aa2c8770bd6b8f6c9efc96cc97b2f45c9ffa9b77daaaa48c1
-
Filesize
97B
MD5396f73a1185a5642f5f1e2538b64396a
SHA1d72d687a5a1258986f218bfccacc6118c39ec4f9
SHA256e267293f58d257d2dd1e00ad25425bdb798fcbf75256a7d45b7d7086159dbc58
SHA512e17cfca14ce79c71eea01973385fa4151989d40bfc5a04b97fd3534ff5b4f04b385d11867d80a60325aa0bd13403910fee73ab9379f0e05c669d24d5d95957da
-
Filesize
5KB
MD546ab9ab569bbffc2a73395c0ff100c18
SHA12921200b46bfd7371a92fa97335733910a4a655e
SHA2569042ca40b2d258fd584e0734fc0a69e180ff658062bac92f0bbd215be7939c04
SHA51208f3ec6ae4cc8d917e9516c7ae59f3af600f8f39fcbdba30d9cc98b1e4614ac080bd51ed06a5a6b8f7613d929b0558364de0b97ddbd4178078b554a51b299bb7
-
Filesize
68KB
MD5cd3ceb809223008bbe408efb380aaa17
SHA185e2f758335a2f454568426b9bb782a60ca82639
SHA25688bd4e2dac44af0c4ea866e82505062e43453fb14ef01e802aeeaaa39f29a36d
SHA51252ab06d3869921267d2354d9ca335dd13322115648f7a6b9ee8580587006e91b6442cd470e5ceae5440a77039671d1d4680b70f207f6cc20625991097ea6fecc