Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe
Resource
win10v2004-20240508-en
General
-
Target
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe
-
Size
925KB
-
MD5
45cc1bf65d887b4899f7c212b271e578
-
SHA1
95091ef8a659d6dbde4119cf45d8bc7600be35bd
-
SHA256
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a
-
SHA512
aaeecd5fc1c395de750be26a62eac4c993d54da38ee6210c03c113fb33ae91b8e6cd3088e5101d54fdbe2708ca4fc479cf0956979622aebfe2cc71fce22bc326
-
SSDEEP
12288:vLdUcmDiSGP31lk463i3tINrHtkvT3Op44ZOloWvOkR:vLdeiNS4Oi9IN3p7OloWvV
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exeRegSvcs.exeiexpress.exedescription pid process target process PID 3676 set thread context of 1844 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe RegSvcs.exe PID 1844 set thread context of 3480 1844 RegSvcs.exe Explorer.EXE PID 1844 set thread context of 1784 1844 RegSvcs.exe iexpress.exe PID 1784 set thread context of 3480 1784 iexpress.exe Explorer.EXE PID 1784 set thread context of 3840 1784 iexpress.exe Firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexpress.exedescription ioc process Key created \Registry\User\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 iexpress.exe -
Modifies registry class 2 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exepowershell.exeRegSvcs.exeiexpress.exepid process 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe 4832 powershell.exe 4832 powershell.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1844 RegSvcs.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
RegSvcs.exeExplorer.EXEiexpress.exepid process 1844 RegSvcs.exe 3480 Explorer.EXE 3480 Explorer.EXE 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe 1784 iexpress.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exepowershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe Token: SeDebugPrivilege 4832 powershell.exe Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3480 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exeExplorer.EXEiexpress.exedescription pid process target process PID 3676 wrote to memory of 4832 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe powershell.exe PID 3676 wrote to memory of 4832 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe powershell.exe PID 3676 wrote to memory of 4832 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe powershell.exe PID 3676 wrote to memory of 4176 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe RegSvcs.exe PID 3676 wrote to memory of 4176 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe RegSvcs.exe PID 3676 wrote to memory of 4176 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe RegSvcs.exe PID 3676 wrote to memory of 1844 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe RegSvcs.exe PID 3676 wrote to memory of 1844 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe RegSvcs.exe PID 3676 wrote to memory of 1844 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe RegSvcs.exe PID 3676 wrote to memory of 1844 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe RegSvcs.exe PID 3676 wrote to memory of 1844 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe RegSvcs.exe PID 3676 wrote to memory of 1844 3676 9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe RegSvcs.exe PID 3480 wrote to memory of 1784 3480 Explorer.EXE iexpress.exe PID 3480 wrote to memory of 1784 3480 Explorer.EXE iexpress.exe PID 3480 wrote to memory of 1784 3480 Explorer.EXE iexpress.exe PID 1784 wrote to memory of 3840 1784 iexpress.exe Firefox.exe PID 1784 wrote to memory of 3840 1784 iexpress.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe"C:\Users\Admin\AppData\Local\Temp\9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\9d3e2f47c9e19eb3dd2ad6ff1b00ae5e7b429c4c997268a42b3f75c6d448090a.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4176
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1844 -
C:\Windows\SysWOW64\iexpress.exe"C:\Windows\SysWOW64\iexpress.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82