Analysis

  • max time kernel
    86s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 20:15

General

  • Target

    31de997cdc417ee2a4bcffd2e9998ce35945df9bb8bbe18a7bb08f7048cb64d3.exe

  • Size

    2.0MB

  • MD5

    d133f4968bf0cfcf2c3e94862eaa41b7

  • SHA1

    a4460e274eaa3d462aeeb530972ecc7b9d5f7844

  • SHA256

    31de997cdc417ee2a4bcffd2e9998ce35945df9bb8bbe18a7bb08f7048cb64d3

  • SHA512

    76be7bba7de2a267ad0ac01f815a683009ed87193d2db053e0dcaaf0c6a6d9b7681fb41a34267bef796f55ccd5d3fd51e1dcd0976a7d0a71846dd25d1bf9d6ea

  • SSDEEP

    49152:h8YqH4O8b8ITDnlIfeEXGF+6z8zmqtqCK3RTeyay+hviOZ8afQf2PynL:qDVrw+6zEmqtqCKkT6OWL

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Drops file in Windows directory 41 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31de997cdc417ee2a4bcffd2e9998ce35945df9bb8bbe18a7bb08f7048cb64d3.exe
    "C:\Users\Admin\AppData\Local\Temp\31de997cdc417ee2a4bcffd2e9998ce35945df9bb8bbe18a7bb08f7048cb64d3.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RCX93AD.tmp

    Filesize

    2.0MB

    MD5

    c6c123ca7dfd3c5a952852066d5f4df7

    SHA1

    a50a88ac4ae5b6cbbd8db479cfcc0e10dbd300cf

    SHA256

    e2c95e8d9f41919655fc41bbe63a3b147bfa1d09ef4a2991aaca59f958f05b90

    SHA512

    10f8abed25cd70554caed4d599f3890948e8f33b45294b455c775336c185abee908de755813f484d2fbca7451086d0d3d31dbd5704284d86e943bf5f433d8462

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\CreateWCChromeNativeMessagingHost.exe

    Filesize

    2.1MB

    MD5

    338d45b0dc1afa9a8bb9271c85486f39

    SHA1

    18d4e34bde9811effa41ca3b8cfb862aa43d6ade

    SHA256

    e0f6173c1a459f2f8b51e8e612b00d3b3ab9ed6fe061f29e0bbe2bcf27238f4e

    SHA512

    c66f80bd2174d60bc66d560b7fe782252552c58dfcfbf9af9b7843dfa98b49da1d863f8a8107c6627c76d1cc09897e8c8669b2cea9f5faf8f9851d270eabd73f

  • C:\Program Files (x86)\Common Files\Microsoft Shared\ink\fr-FR\WindowsWindows10.0.19041.1.160101.0800.exe

    Filesize

    2.0MB

    MD5

    40a8598ea1937daa92e900c0edbbbb8c

    SHA1

    e94f029a0886fac17710487390d6cf84c2a58dc4

    SHA256

    03fdf533e6a7978901adef3ec833794cb1565d0dc9ce5c1d800d320729aad03c

    SHA512

    fd1b0a2a8586dc880fc998d7d0b051861b35b7630b96d27833e4340f96edadbeacb5023c36b0426adeb22fcc6d052b772d102e1737f132be8fb0e7ad40da7a04

  • C:\Program Files (x86)\Windows Mail\SystemWABIMP.exe

    Filesize

    2.0MB

    MD5

    d133f4968bf0cfcf2c3e94862eaa41b7

    SHA1

    a4460e274eaa3d462aeeb530972ecc7b9d5f7844

    SHA256

    31de997cdc417ee2a4bcffd2e9998ce35945df9bb8bbe18a7bb08f7048cb64d3

    SHA512

    76be7bba7de2a267ad0ac01f815a683009ed87193d2db053e0dcaaf0c6a6d9b7681fb41a34267bef796f55ccd5d3fd51e1dcd0976a7d0a71846dd25d1bf9d6ea

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\es\mscorlibsystem.exe

    Filesize

    2.1MB

    MD5

    84f5ad74cf38c306c1f2906669b0d976

    SHA1

    ca9d210f68b5ff8b04f2bbe863f2e2b974c5c308

    SHA256

    a473f1e1c899ef6ef1971b9ed2c07b78b980b47ba02861218e9363ba121c4ee9

    SHA512

    c742c5ca70dfedda772056ee9d80a9d4e5206a99f421b058778441931f909200b28466daa7a73ad2ed13a205ff110cac2510d285cefb5bcc75ae341dcc5f9c1e