Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 16:45
Behavioral task
behavioral1
Sample
Server3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Server3.exe
Resource
win10v2004-20240508-en
General
-
Target
Server3.exe
-
Size
37KB
-
MD5
9572900a67ed67c643c7298b951d2104
-
SHA1
e3b7291e39cafe608ffbeadba8135658d22dde2f
-
SHA256
b9418ffff1fdc91b3257ef2c42e6edc1605b38f2534e93c4f487a72f98279496
-
SHA512
07a115cfb2d5a97f06a10740c1e0f5ef9fb13bb248e6fbf1d7a815fe7139d7d499d4dfc638fe6544012bfa27b324535487b8446234edd4480e0b0446f8f22173
-
SSDEEP
384:rkc6ikDRxdDsyNyyszPIRPr28msD+rAF+rMRTyN/0L+EcoinblneHQM3epzXoNC/:ADeyNBszPIRy1sqrM+rMRa8NuKgt
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1968 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Server3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Server3.exe -
Drops startup file 2 IoCs
Processes:
Windows.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bcf19f19ec90f55db9d548f83598227f.exe Windows.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bcf19f19ec90f55db9d548f83598227f.exe Windows.exe -
Executes dropped EXE 1 IoCs
Processes:
Windows.exepid process 1616 Windows.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Windows.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bcf19f19ec90f55db9d548f83598227f = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows.exe\" .." Windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bcf19f19ec90f55db9d548f83598227f = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows.exe\" .." Windows.exe -
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
Windows.exedescription ioc process File created C:\autorun.inf Windows.exe File opened for modification C:\autorun.inf Windows.exe File created D:\autorun.inf Windows.exe File created F:\autorun.inf Windows.exe File opened for modification F:\autorun.inf Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3496 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Windows.exepid process 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe 1616 Windows.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Windows.exepid process 1616 Windows.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
Windows.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1616 Windows.exe Token: SeDebugPrivilege 3496 taskkill.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe Token: 33 1616 Windows.exe Token: SeIncBasePriorityPrivilege 1616 Windows.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Server3.exeWindows.exedescription pid process target process PID 1396 wrote to memory of 1616 1396 Server3.exe Windows.exe PID 1396 wrote to memory of 1616 1396 Server3.exe Windows.exe PID 1396 wrote to memory of 1616 1396 Server3.exe Windows.exe PID 1616 wrote to memory of 1968 1616 Windows.exe netsh.exe PID 1616 wrote to memory of 1968 1616 Windows.exe netsh.exe PID 1616 wrote to memory of 1968 1616 Windows.exe netsh.exe PID 1616 wrote to memory of 3496 1616 Windows.exe taskkill.exe PID 1616 wrote to memory of 3496 1616 Windows.exe taskkill.exe PID 1616 wrote to memory of 3496 1616 Windows.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Server3.exe"C:\Users\Admin\AppData\Local\Temp\Server3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\Windows.exe"C:\Users\Admin\AppData\Local\Temp\Windows.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Windows.exe" "Windows.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1968 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Exsample.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3496
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD59572900a67ed67c643c7298b951d2104
SHA1e3b7291e39cafe608ffbeadba8135658d22dde2f
SHA256b9418ffff1fdc91b3257ef2c42e6edc1605b38f2534e93c4f487a72f98279496
SHA51207a115cfb2d5a97f06a10740c1e0f5ef9fb13bb248e6fbf1d7a815fe7139d7d499d4dfc638fe6544012bfa27b324535487b8446234edd4480e0b0446f8f22173