Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2024 02:44

General

  • Target

    9ed5bbcdc3ba7bd86c534424f7a5c8f80bac6618b7b79cd8caad7060272e107f.exe

  • Size

    3.3MB

  • MD5

    30747903174aaf785850d4c0a306dd1f

  • SHA1

    6312833fd6b72358334d21ad2ce689ca3defb0c6

  • SHA256

    9ed5bbcdc3ba7bd86c534424f7a5c8f80bac6618b7b79cd8caad7060272e107f

  • SHA512

    74ed2e8188f60b9ec6d087f6e10b5b5cb79b8abeb625bd8f574c7d6f604ea888d487f893d1f89a53970e496de1d3dbefdc886132de02c7c1bd5d9e0a7132ec21

  • SSDEEP

    49152:v0JkLMjIxOE3cqFjTdiqH7ZQiIK4ePyS5wfm26hEbH4BMEt96kSOIsk3G8pxxuln:cxw3/tT5H7ZNIK4YLS0BLz6kyLWOPOP

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 1 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ed5bbcdc3ba7bd86c534424f7a5c8f80bac6618b7b79cd8caad7060272e107f.exe
    "C:\Users\Admin\AppData\Local\Temp\9ed5bbcdc3ba7bd86c534424f7a5c8f80bac6618b7b79cd8caad7060272e107f.exe"
    1⤵
    • Modifies firewall policy service
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4408
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
    1⤵
      PID:5024
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
      1⤵
        PID:4844
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3436 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:2316

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4408-0-0x00007FF6DF554000-0x00007FF6DF6CB000-memory.dmp

          Filesize

          1.5MB

        • memory/4408-1-0x00007FFA54C10000-0x00007FFA54C12000-memory.dmp

          Filesize

          8KB

        • memory/4408-2-0x00007FFA54C20000-0x00007FFA54C22000-memory.dmp

          Filesize

          8KB

        • memory/4408-3-0x00007FFA54150000-0x00007FFA54152000-memory.dmp

          Filesize

          8KB

        • memory/4408-4-0x00007FFA54160000-0x00007FFA54162000-memory.dmp

          Filesize

          8KB

        • memory/4408-5-0x00007FFA52810000-0x00007FFA52812000-memory.dmp

          Filesize

          8KB

        • memory/4408-6-0x00007FFA52820000-0x00007FFA52822000-memory.dmp

          Filesize

          8KB

        • memory/4408-9-0x00007FF6DF350000-0x00007FF6DFA0F000-memory.dmp

          Filesize

          6.7MB

        • memory/4408-18-0x00000153DED70000-0x00000153DEDF3000-memory.dmp

          Filesize

          524KB

        • memory/4408-20-0x00007FF6DF554000-0x00007FF6DF6CB000-memory.dmp

          Filesize

          1.5MB