Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe
Resource
win10v2004-20240226-en
General
-
Target
aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe
-
Size
699KB
-
MD5
7d2dffc850ea555d40c45f09570475c7
-
SHA1
6cc0693502bc8caefcde997e260b0798b4fbde1e
-
SHA256
aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89
-
SHA512
1e2036443166fea107ba4aab7ea4a5b991761c00d2b8e55ca17cb44fa06e9fbe09fb2c18979034af20be6f2d15c62880bcfcf8854b746080cc827e89a52ef865
-
SSDEEP
12288:6e37i8LkpEaIptKciGsJn4k4k0sa+NU89WJGTxUQvPCQv1ZdI7n0xRviwkR:6AOjEzpsrJ4kVh99WkUQvqQNZS0xRA
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
Processes:
aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exeRegSvcs.exeiexpress.exedescription pid process target process PID 1616 set thread context of 692 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe RegSvcs.exe PID 692 set thread context of 3300 692 RegSvcs.exe Explorer.EXE PID 692 set thread context of 456 692 RegSvcs.exe iexpress.exe PID 456 set thread context of 3300 456 iexpress.exe Explorer.EXE PID 456 set thread context of 4568 456 iexpress.exe Firefox.exe -
Processes:
iexpress.exedescription ioc process Key created \Registry\User\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 iexpress.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exeRegSvcs.exeiexpress.exepid process 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 692 RegSvcs.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
RegSvcs.exeExplorer.EXEiexpress.exepid process 692 RegSvcs.exe 3300 Explorer.EXE 3300 Explorer.EXE 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe 456 iexpress.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exedescription pid process Token: SeDebugPrivilege 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exeExplorer.EXEiexpress.exedescription pid process target process PID 1616 wrote to memory of 692 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe RegSvcs.exe PID 1616 wrote to memory of 692 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe RegSvcs.exe PID 1616 wrote to memory of 692 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe RegSvcs.exe PID 1616 wrote to memory of 692 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe RegSvcs.exe PID 1616 wrote to memory of 692 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe RegSvcs.exe PID 1616 wrote to memory of 692 1616 aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe RegSvcs.exe PID 3300 wrote to memory of 456 3300 Explorer.EXE iexpress.exe PID 3300 wrote to memory of 456 3300 Explorer.EXE iexpress.exe PID 3300 wrote to memory of 456 3300 Explorer.EXE iexpress.exe PID 456 wrote to memory of 4568 456 iexpress.exe Firefox.exe PID 456 wrote to memory of 4568 456 iexpress.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe"C:\Users\Admin\AppData\Local\Temp\aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:692 -
C:\Windows\SysWOW64\iexpress.exe"C:\Windows\SysWOW64\iexpress.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3700 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:848