Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe
Resource
win10v2004-20240426-en
General
-
Target
a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe
-
Size
1.1MB
-
MD5
14412d2aa398990082b683389385fb85
-
SHA1
158c3c43becd614837910f21ae163a4ebc09e80f
-
SHA256
a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b
-
SHA512
e9daa68d9793d85315a948640a0ed23e5f9576a54de1f79e21ebdaa641521c5bef14908c708ae29dc57d206a496497ac9ec575c38b1542e800c2d9366af4049f
-
SSDEEP
24576:BAHnh+eWsN3skA4RV1Hom2KXMmHaHhDxJV5RI2m0A/5:Yh+ZkldoPK8YaHxxJu2mN
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
Processes:
a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exesvchost.execertreq.exedescription pid process target process PID 2104 set thread context of 4848 2104 a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe svchost.exe PID 4848 set thread context of 3376 4848 svchost.exe Explorer.EXE PID 4848 set thread context of 780 4848 svchost.exe certreq.exe PID 780 set thread context of 3376 780 certreq.exe Explorer.EXE PID 780 set thread context of 3596 780 certreq.exe Firefox.exe -
Processes:
certreq.exedescription ioc process Key created \Registry\User\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 certreq.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
svchost.execertreq.exepid process 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 4848 svchost.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exesvchost.exeExplorer.EXEcertreq.exepid process 2104 a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe 4848 svchost.exe 3376 Explorer.EXE 3376 Explorer.EXE 780 certreq.exe 780 certreq.exe 780 certreq.exe 780 certreq.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exepid process 2104 a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe 2104 a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exepid process 2104 a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe 2104 a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3376 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exeExplorer.EXEcertreq.exedescription pid process target process PID 2104 wrote to memory of 4848 2104 a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe svchost.exe PID 2104 wrote to memory of 4848 2104 a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe svchost.exe PID 2104 wrote to memory of 4848 2104 a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe svchost.exe PID 2104 wrote to memory of 4848 2104 a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe svchost.exe PID 3376 wrote to memory of 780 3376 Explorer.EXE certreq.exe PID 3376 wrote to memory of 780 3376 Explorer.EXE certreq.exe PID 3376 wrote to memory of 780 3376 Explorer.EXE certreq.exe PID 780 wrote to memory of 3596 780 certreq.exe Firefox.exe PID 780 wrote to memory of 3596 780 certreq.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe"C:\Users\Admin\AppData\Local\Temp\a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a6986bf0b9dedf3fb327a3201ca01bf7f05b4d868839b3c10090b57f1740e99b.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4848 -
C:\Windows\SysWOW64\certreq.exe"C:\Windows\SysWOW64\certreq.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD54d8361eeb2e70a2b8731e63ddf0b50dd
SHA1f6a1e5ba7c59b6595809f42216a190481a34efae
SHA256c62a9316957f85723e4a9f5ae04a329cbaae3c26868a0bedd9b778208648db2a
SHA5125b62a25f5275026964171c7e844cec7c762da13135d9d1c086af4ca8bca29a32a8e770486ad6043db703044962f106d032a6efa75e01b9720b6cee21d1c27626