Resubmissions
21/06/2024, 17:58
240621-wkgm1ayfmc 10Analysis
-
max time kernel
588s -
max time network
482s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
Blank-Owner455.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Blank-Owner455.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Blank-Owner455.exe
Resource
win11-20240508-en
General
-
Target
Blank-Owner455.exe
-
Size
1.3MB
-
MD5
0708b141816e1287fb4bfec4c837ef6e
-
SHA1
65884a0d7f3fab21c1e1d9432525f6f9d255744a
-
SHA256
ddf1395c86c239c3c9c930038e69e5992c3d8260a47c96c1a21cdc770dfd5bf4
-
SHA512
cab5388cbad7750362acec225385d62abfb01cf7dcc32c85555334d90c86d84212bcf0dff47ff960003805cb2c4ef962543ae328ffe2fc75f4c156e01ef24e84
-
SSDEEP
24576:8x6//3ra8haNNG+NOYJFYNxNTvliZMa3X3N:MSWMaHtNnKNiOaH3N
Malware Config
Signatures
-
Class file contains resources related to AdWind 1 IoCs
resource yara_rule sample family_adwind4 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Blank-Owner455.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3004 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1717649097757.tmp" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings Blank-Owner455.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1096 OpenWith.exe 2928 javaw.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2928 1008 Blank-Owner455.exe 84 PID 1008 wrote to memory of 2928 1008 Blank-Owner455.exe 84 PID 2928 wrote to memory of 3004 2928 javaw.exe 85 PID 2928 wrote to memory of 3004 2928 javaw.exe 85 PID 2928 wrote to memory of 1876 2928 javaw.exe 87 PID 2928 wrote to memory of 1876 2928 javaw.exe 87 PID 2928 wrote to memory of 2916 2928 javaw.exe 89 PID 2928 wrote to memory of 2916 2928 javaw.exe 89 PID 2916 wrote to memory of 4316 2916 cmd.exe 91 PID 2916 wrote to memory of 4316 2916 cmd.exe 91 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1876 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Blank-Owner455.exe"C:\Users\Admin\AppData\Local\Temp\Blank-Owner455.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\MoonRar.jar"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3004
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1717649097757.tmp3⤵
- Views/modifies file attributes
PID:1876
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1717649097757.tmp" /f"3⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1717649097757.tmp" /f4⤵
- Adds Run key to start application
PID:4316
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD53afa89093d9a18541c6cef0257522632
SHA164d9f1c7bf428b4d08945eac19786e93f8957cce
SHA256f90904dac08a4a0837283aebf3fac5973299001ff7b43c34888f7cd2f78c3df0
SHA5123b9487f7021e137f63c3e10c85bb55f2c52feac392b598adf0ab5c783c149fb0e8dce741c1a90ebe209359218ebe1c29f4cc81f5e789915a8252e2edf5aba7a2
-
Filesize
830KB
MD5d8339dcc4a19345bd7cb55def570eef1
SHA1de69d3fe9a794282859c106e9a90e6647c1a0305
SHA2565eec9251dc8001252eec5303f4de828ee5d9dc079680d6d6ce6b192c10a1f7e3
SHA512207e56d4a3d2d60297d01098c23835482187fe444850f9abea8fb0e3f75e18d4c0403f0e893f30b51b307ccae020a512dec94f0963c29b429be5176613425fa7