Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2024 19:24

General

  • Target

    1fb5f8faa1252bb5d6d4ab9013916b8bfab391b7e83c334cbec57876dd14b464.exe

  • Size

    1.1MB

  • MD5

    28da96365513f4cc6ed583a7f2cbe83a

  • SHA1

    f681e6c3f0d26ebe4932230fc5a669295334ce38

  • SHA256

    1fb5f8faa1252bb5d6d4ab9013916b8bfab391b7e83c334cbec57876dd14b464

  • SHA512

    5f53b74f10468ffc0e5de95293f8e04af64ff41154663015098a4ea4a666f4d3f625f120c3ddf7411d6508011e6609dc9944b3ad963a1431d76cc41949be8ee6

  • SSDEEP

    24576:DxWVeyRYdwzYDteYIpLW4O8b8ITDnlzeqrs:D8YYW4O8b8ITDnlzeqw

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 42 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fb5f8faa1252bb5d6d4ab9013916b8bfab391b7e83c334cbec57876dd14b464.exe
    "C:\Users\Admin\AppData\Local\Temp\1fb5f8faa1252bb5d6d4ab9013916b8bfab391b7e83c334cbec57876dd14b464.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2620
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1324 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4412

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\Microsoft Shared\Filters\RCX74C6.tmp

      Filesize

      1.1MB

      MD5

      deade58ca91aab0ff839d640bcdbe905

      SHA1

      3d0dcef9f649e878ce92021aaf8ac45e148287a2

      SHA256

      31a461204c0bfbb3fbe7ef810889056dea089695862a6639caddbdde6b0b275c

      SHA512

      80d5e3dbc5f78d5ebcf5677f5eb3b23015e0cbc085a5b9aaf67910d816e562acfa93f8c6dbc7041243fcf667270578f012d380fc9038d9ee95f61221dc58b3d1

    • C:\Program Files (x86)\Common Files\Microsoft Shared\ink\de-DE\RCX604F.tmp

      Filesize

      1.1MB

      MD5

      f819b68c777208eb02c790b5d1db3144

      SHA1

      5150b35a6c9fef7a699e3b076b6410d242fc12b7

      SHA256

      38455eab877bc332e121fd3ac9829fefbedebaaad0f08dd24c663ddc76b2d678

      SHA512

      0a2e433327c3f12f847a4fc9ffd2d680cc5828e5dba03ab7044142cbeb527c52f8f23c0dba52f5ece915c31b7551633fe93958b04aafaaaea7f037ccba3f46a3

    • C:\Program Files (x86)\Internet Explorer\ja-JP\IEXPLOREInternet.exe

      Filesize

      1.1MB

      MD5

      28da96365513f4cc6ed583a7f2cbe83a

      SHA1

      f681e6c3f0d26ebe4932230fc5a669295334ce38

      SHA256

      1fb5f8faa1252bb5d6d4ab9013916b8bfab391b7e83c334cbec57876dd14b464

      SHA512

      5f53b74f10468ffc0e5de95293f8e04af64ff41154663015098a4ea4a666f4d3f625f120c3ddf7411d6508011e6609dc9944b3ad963a1431d76cc41949be8ee6