Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 01:11

General

  • Target

    3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe

  • Size

    326KB

  • MD5

    a59664f37c25edaa69c39a65490ed3a9

  • SHA1

    01bb46541bc678fe9d97cea31cb61f3db861ba68

  • SHA256

    3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d

  • SHA512

    76ba5fea9e63bf091ac2f2234447ad48c93b1b21594fd2c737d24073efc2871265c83622364764c886769d579c727784c045d3d4b2fc0a6e778dc30e64f1f393

  • SSDEEP

    6144:Rj8KWXflIwycVYUcBrcisb765kohreOCSYA/U:+Kkfl3x0BrcdEkoWCc

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 5 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 12 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe
    "C:\Users\Admin\AppData\Local\Temp\3b50fe74f6b83d53efab2ee7e197026977dac17fdd3302c7df454fac19abb12d.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" cmd /c takeown /f "C:\Program Files\Windows Media Player\wmpnetwk.exe" && icacls "C:\Program Files\Windows Media Player\wmpnetwk.exe" /grant administrators:F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\Program Files\Windows Media Player\wmpnetwk.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2132
      • C:\Windows\system32\icacls.exe
        icacls "C:\Program Files\Windows Media Player\wmpnetwk.exe" /grant administrators:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:116
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:552
    • C:\Windows\system32\SearchProtocolHost.exe
      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
      2⤵
      • Modifies data under HKEY_USERS
      PID:2064
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 784
      2⤵
      • Modifies data under HKEY_USERS
      PID:2228
  • C:\Program Files\Windows Media Player\wmpnetwk.exe
    "C:\Program Files\Windows Media Player\wmpnetwk.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:4056
  • C:\Program Files\Windows Media Player\wmixedwk.exe
    "C:\Program Files\Windows Media Player\wmixedwk.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:2840
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in Program Files directory
        • Modifies data under HKEY_USERS
        PID:2932
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:4532
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:4520
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:4312
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:1136
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:4392
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:1564
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:4876
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:4420
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:1596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Media Player\background.jpg

    Filesize

    1.9MB

    MD5

    2ae78a18e71d4696964e021f3241287a

    SHA1

    562ac6a611ef5b44abd61db261a11289950f7efb

    SHA256

    ac4c16749c6d77dd153327c18c4bf6d48c8268efcbbb9d0515ea582e0fed19d2

    SHA512

    a7d1bcee4296fa1569d401b1886022da2384a33080baa1ab82cf86ff708351fe3784297d9e104927b7f581ad351bc7c900db5953e22dbd262ce76b9ee62c11ca

  • C:\Program Files\Windows Media Player\mpsvc.dll

    Filesize

    126KB

    MD5

    51835bc0013021fac02572d2a4f371c3

    SHA1

    1c5dc6300992e0410a469280c7384d2dee1033f0

    SHA256

    1ec23649104d52fe4bd81868896ace1860c2b579c07b1ff3ae8bf9b544cf093d

    SHA512

    beb67411146a72c610a298547e86934ef48258d9caaa0f7c024a9914d0e010dde5ddd9699e25baddbbe0c6b9cb3d43124de3673c4bae4fe45f61d7d7f0f99f68

  • C:\Program Files\Windows Media Player\wmpnetwk.exe

    Filesize

    23KB

    MD5

    90b85ffbdeead1be861d59134ea985b0

    SHA1

    55e9859aa7dba87678e7c529b571fdf6b7181339

    SHA256

    ed0dc979eed9ab9933c49204d362de575c7112a792633fda75bb5d1dab50a5c2

    SHA512

    8a1c10bbfe5651ab25bf36f4e8f2f65424c8e1004696c8141498b99ea2fbd7b3e5fae4d2cfee6835f7ff46bd2333602f4d8ac4a0f5b8e9757adb176332a3afce

  • C:\Windows\Temp\aad9f05a9a826b65ff2b94740ca196c2

    Filesize

    30KB

    MD5

    c81be5e09b787373d16ab3771fe8e29d

    SHA1

    4edb8e4ac1f4adc7cfa6db1040bd7caeaa0d08eb

    SHA256

    3371174d1828448fb83db954f9440e7b8bd7d6252c411fea60cb69b9e1000a4a

    SHA512

    40e8eaf3508a518cbda9bc45a94007450af1556cebb8f53aa10469cbec8bdee029c8db4ad1f07a74c8809f0a102f3a8bbf4b271090e4e8b9d2399bd89ebc05dc

  • memory/552-19-0x0000022AEA9C0000-0x0000022AEA9D0000-memory.dmp

    Filesize

    64KB

  • memory/552-35-0x0000022AEAAC0000-0x0000022AEAAD0000-memory.dmp

    Filesize

    64KB

  • memory/552-51-0x0000022AEEFB0000-0x0000022AEEFB8000-memory.dmp

    Filesize

    32KB

  • memory/2392-74-0x0000022631370000-0x0000022631399000-memory.dmp

    Filesize

    164KB

  • memory/2392-0-0x00007FF77F77A000-0x00007FF77F77B000-memory.dmp

    Filesize

    4KB

  • memory/2392-3-0x0000022631370000-0x0000022631399000-memory.dmp

    Filesize

    164KB

  • memory/2392-5-0x00007FF77F760000-0x00007FF77F7B6000-memory.dmp

    Filesize

    344KB

  • memory/2840-87-0x0000017919390000-0x00000179193AF000-memory.dmp

    Filesize

    124KB

  • memory/2840-86-0x0000000180000000-0x0000000180033000-memory.dmp

    Filesize

    204KB

  • memory/2840-77-0x0000000140000000-0x000000014011B000-memory.dmp

    Filesize

    1.1MB

  • memory/2840-80-0x0000000140000000-0x000000014011B000-memory.dmp

    Filesize

    1.1MB

  • memory/2840-81-0x0000000140000000-0x000000014011B000-memory.dmp

    Filesize

    1.1MB

  • memory/2840-76-0x0000000140000000-0x000000014011B000-memory.dmp

    Filesize

    1.1MB

  • memory/2840-82-0x0000000180000000-0x0000000180033000-memory.dmp

    Filesize

    204KB

  • memory/2840-85-0x0000000180000000-0x0000000180033000-memory.dmp

    Filesize

    204KB

  • memory/2840-78-0x0000000140000000-0x000000014011B000-memory.dmp

    Filesize

    1.1MB

  • memory/3548-65-0x0000000140000000-0x0000000140026000-memory.dmp

    Filesize

    152KB

  • memory/3548-63-0x0000000140000000-0x0000000140026000-memory.dmp

    Filesize

    152KB

  • memory/3548-64-0x0000000140000000-0x0000000140026000-memory.dmp

    Filesize

    152KB

  • memory/3548-68-0x0000000140000000-0x0000000140026000-memory.dmp

    Filesize

    152KB

  • memory/3548-66-0x0000000140000000-0x0000000140026000-memory.dmp

    Filesize

    152KB

  • memory/3548-71-0x0000000140000000-0x0000000140026000-memory.dmp

    Filesize

    152KB

  • memory/3548-72-0x0000000140000000-0x0000000140026000-memory.dmp

    Filesize

    152KB

  • memory/3548-67-0x0000000140000000-0x0000000140026000-memory.dmp

    Filesize

    152KB

  • memory/3548-69-0x0000000140000000-0x0000000140026000-memory.dmp

    Filesize

    152KB

  • memory/4056-73-0x00007FFEFBAB0000-0x00007FFEFBAD6000-memory.dmp

    Filesize

    152KB