Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe
Resource
win10v2004-20240226-en
General
-
Target
532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe
-
Size
1.8MB
-
MD5
3a63a81a00f53dd4395c50ec432b182e
-
SHA1
591f1577dfdc0c3b272d54d0c95121b739ccf886
-
SHA256
532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0
-
SHA512
ca04d4be3d4beb43037c0dc4a7264b63db7ec3d21d6eb4340418fd3cb320d631e40cd6cd6659dc3e176e1b4e1d2327384c5a7a56ddb5880efbe690d3cc15a005
-
SSDEEP
49152:BWNWvJ/aS8JCfmIa2Wtu5800SjRoCOAzU:BWMvJ/gsiSllO2
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 21 IoCs
Processes:
resource yara_rule behavioral2/memory/5036-3-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-5-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-6-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-7-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-8-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-9-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-25-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-27-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-28-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-40-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-44-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-45-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-46-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-49-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-50-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-51-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-52-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-53-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-54-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-55-0x0000000000400000-0x0000000000848000-memory.dmp UPX behavioral2/memory/5036-58-0x0000000000400000-0x0000000000848000-memory.dmp UPX -
Processes:
resource yara_rule behavioral2/memory/5036-3-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-5-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-6-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-7-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-8-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-9-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-25-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-27-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-28-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-40-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-44-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-45-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-46-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-49-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-50-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-51-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-52-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-53-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-54-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-55-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5036-58-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exedescription pid process target process PID 4764 set thread context of 5036 4764 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exepid process 5036 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 5036 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 5036 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 5036 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 5036 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 5036 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exedescription pid process target process PID 4764 wrote to memory of 5036 4764 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe PID 4764 wrote to memory of 5036 4764 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe PID 4764 wrote to memory of 5036 4764 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe PID 4764 wrote to memory of 5036 4764 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe PID 4764 wrote to memory of 5036 4764 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe PID 4764 wrote to memory of 5036 4764 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe PID 4764 wrote to memory of 5036 4764 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe PID 4764 wrote to memory of 5036 4764 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe 532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe"C:\Users\Admin\AppData\Local\Temp\532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe"C:\Users\Admin\AppData\Local\Temp\532c9475c54e38bf156e9832f784be442e372428efb9920f4dcac0e722dc1bc0.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4232 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5d31c44ba0c8b93109f493c820cc4ca5b
SHA15f321115e54c0ba64080a2567c6962f7c0277195
SHA256ad0643326174a170ff9eb5c1b81f7f62d7381ae1ac18022041d52aacb661122c
SHA512354dc23d508df8d471ac46edcea088a9a786b5b1195531f4a625259424ae3cacc92d9799a5646af6442f55f3f8f4e369fc757eacd05e59fbaee52bfaa35985db
-
Filesize
14.4MB
MD5bd8b2758e016f0aa4c375178ab038d01
SHA19d6de688f63623ec073bbe27994abd3c388bb360
SHA2567c92635c33cb4bbd2b169de15828e00e2cc3c1c95f561933e24b76f5b8f4a268
SHA5128530ef57b3b037dccf3bffea084d6770882d9960c240b98d17ba472c025392f860f1b4a048a9d1debb1a8a5bc72841a9d5cd989e53b08e9850fe373a54054597