Resubmissions

13/06/2024, 06:10

240613-gxea3sxamg 8

Analysis

  • max time kernel
    300s
  • max time network
    300s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 06:10

General

  • Target

    e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe

  • Size

    223KB

  • MD5

    3955af54fbac1e43c945f447d92e4108

  • SHA1

    53c5552c3649619e4e8c6a907b94573f47130fa4

  • SHA256

    e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16

  • SHA512

    fa028a040a5f075296aebab7f63a59b6cbba32ee0964dfc08768396cc012ff5d861191e2478914d79d4a424c3bba110505a58b97376c44c716f0b1ea70551037

  • SSDEEP

    3072:tneBqhy5aVLOwqI8sgwoEHXfwaNUM+/ORSs5G2Ms4f6TFZbhgvbUxzJ8Y:tETlsgOfDt+/V6JQO98

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Possible privilege escalation attempt 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 12 IoCs
  • Suspicious use of SetThreadContext 14 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe
    "C:\Users\Admin\AppData\Local\Temp\e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" cmd /c takeown /f "C:\Program Files\Windows Media Player\wmpnetwk.exe" && icacls "C:\Program Files\Windows Media Player\wmpnetwk.exe" /grant administrators:F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:744
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\Program Files\Windows Media Player\wmpnetwk.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:3836
      • C:\Windows\system32\icacls.exe
        icacls "C:\Program Files\Windows Media Player\wmpnetwk.exe" /grant administrators:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2352
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" cmd /c sc create "Accecss Auto Connetcion Manager" binPath= "C:\Program Files\Windows Media Player\wmixedwk.exe" START= auto DISPLAYNAME= "WebServer" TYPE= own
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Windows\system32\sc.exe
        sc create "Accecss Auto Connetcion Manager" binPath= "C:\Program Files\Windows Media Player\wmixedwk.exe" START= auto DISPLAYNAME= "WebServer" TYPE= own
        3⤵
        • Launches sc.exe
        PID:2032
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\kkxqbh.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Windows\system32\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • Runs ping.exe
        PID:1792
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Windows\system32\SearchProtocolHost.exe
      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
      2⤵
      • Modifies data under HKEY_USERS
      PID:4584
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 784
      2⤵
      • Modifies data under HKEY_USERS
      PID:1508
  • C:\Program Files\Windows Media Player\wmpnetwk.exe
    "C:\Program Files\Windows Media Player\wmpnetwk.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:3124
  • C:\Program Files\Windows Media Player\wmixedwk.exe
    "C:\Program Files\Windows Media Player\wmixedwk.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:3832
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in Program Files directory
        PID:4720
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:3784
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:5064
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:1916
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:3312
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:3412
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:1912
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:1636
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:2876
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:4972
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:1704
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        PID:1532

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Windows Media Player\background.jpg

          Filesize

          1.9MB

          MD5

          b37c3d3ab20f7e8a06232330122d1ed7

          SHA1

          6daa977d591b1cbb1ecde9fd82e14287a284bdd2

          SHA256

          e796f0d6d6960af232a1b8f039cd45a703c1743dfd6f4098cdde0a46a69e33a2

          SHA512

          da26eee1e9f1d594f2f4604838b66dac95db29373a59e347b1cf31022eb0040f5a9ebdd50c12f4af1dbbfd7c5bae20f3937cbdd8016e441d8822f9f86d03e5bb

        • C:\Program Files\Windows Media Player\down_info

          Filesize

          4B

          MD5

          e9257036daf20f062a498aab563d7712

          SHA1

          dc3c03160a963f53d408a0ed65f17901fe7ad6b8

          SHA256

          42a8d10424653fc26a1319a0c7f84ea30f43c8a009e7d99fcd9e8151332bdcf3

          SHA512

          1c65067b8b023e634437d5d64bb370521d26d00ea9cd2523671f6bed1c54cd510b0b962d987ebd89cf38fc4617cf01ff8c9669b2168e6719ed19a0a26ac05ac1

        • C:\Program Files\Windows Media Player\mpsvc.dll

          Filesize

          126KB

          MD5

          7b207ce9f9d71dfc2eaa2e959634a54d

          SHA1

          8222daa0c820e50d02ffabdc55dfb7461bbaa1e5

          SHA256

          757af7a540628004b446117be432342674f7830fa008f97a5f4a1ac386954bc2

          SHA512

          6ffbe6e33768e2fbea8c7cee428eb4b61e3eb1dd12e470de363f1d6e274296adabc8d1e681fe5a5f2b1dc8e8eb08bd360572bfd34706e82580c51be57f6fcf5a

        • C:\Program Files\Windows Media Player\wmpnetwk.exe

          Filesize

          23KB

          MD5

          90b85ffbdeead1be861d59134ea985b0

          SHA1

          55e9859aa7dba87678e7c529b571fdf6b7181339

          SHA256

          ed0dc979eed9ab9933c49204d362de575c7112a792633fda75bb5d1dab50a5c2

          SHA512

          8a1c10bbfe5651ab25bf36f4e8f2f65424c8e1004696c8141498b99ea2fbd7b3e5fae4d2cfee6835f7ff46bd2333602f4d8ac4a0f5b8e9757adb176332a3afce

        • C:\Windows\Temp\aad9f05a9a826b65ff2b94740ca196c2

          Filesize

          53KB

          MD5

          6bbeb71119422f08d999c7551e295480

          SHA1

          33e035d5936ba1568042143ad5be1a58f6b9e413

          SHA256

          b796efa9a01b9339de98535ad18a2f23c69f98185546f418c4509e0b0b95264a

          SHA512

          f818845f26951db462427ad04c506abb7827b167908392dff5e79b35826b2507b7319b6b970bb0cec54aa4955999a241a9cf8df63ac491ad2d8aa036859f10ba

        • C:\kkxqbh.bat

          Filesize

          135B

          MD5

          44a3af72a2e7efad7f05b5b264f2b133

          SHA1

          cfd7c8451a0c6e8123328b18f96bec50d04b50ab

          SHA256

          471ff503db8bd1d39701d587ec4f2d3c97c2843a53e812fe726c970f7306fbb4

          SHA512

          3d2009c7d4b82fd970ced78fe97b0d5ed08ca7a33480969deb5345195e50877e5efe8f80eeca86c63c5f87cc3779f7f9aba47eb1cca1c29656cb4f74bfd4e14a

        • memory/2120-3-0x0000018188A50000-0x0000018188A7C000-memory.dmp

          Filesize

          176KB

        • memory/2120-5-0x00007FF7773D0000-0x00007FF77740C000-memory.dmp

          Filesize

          240KB

        • memory/2120-0-0x00007FF7773DD000-0x00007FF7773DF000-memory.dmp

          Filesize

          8KB

        • memory/3784-90-0x0000000140000000-0x000000014011B000-memory.dmp

          Filesize

          1.1MB

        • memory/3784-91-0x0000000140000000-0x000000014011B000-memory.dmp

          Filesize

          1.1MB

        • memory/3832-73-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3832-74-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3832-77-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3832-78-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/3832-75-0x0000000140000000-0x0000000140138000-memory.dmp

          Filesize

          1.2MB

        • memory/4344-68-0x0000000140000000-0x0000000140026000-memory.dmp

          Filesize

          152KB

        • memory/4344-63-0x0000000140000000-0x0000000140026000-memory.dmp

          Filesize

          152KB

        • memory/4344-66-0x0000000140000000-0x0000000140026000-memory.dmp

          Filesize

          152KB

        • memory/4344-64-0x0000000140000000-0x0000000140026000-memory.dmp

          Filesize

          152KB

        • memory/4344-71-0x0000000140000000-0x0000000140026000-memory.dmp

          Filesize

          152KB

        • memory/4344-72-0x0000000140000000-0x0000000140026000-memory.dmp

          Filesize

          152KB

        • memory/4344-69-0x0000000140000000-0x0000000140026000-memory.dmp

          Filesize

          152KB

        • memory/4344-67-0x0000000140000000-0x0000000140026000-memory.dmp

          Filesize

          152KB

        • memory/4344-65-0x0000000140000000-0x0000000140026000-memory.dmp

          Filesize

          152KB

        • memory/4720-80-0x0000000140000000-0x00000001400D4000-memory.dmp

          Filesize

          848KB

        • memory/4720-83-0x0000000140000000-0x00000001400D4000-memory.dmp

          Filesize

          848KB

        • memory/4720-79-0x0000000140000000-0x00000001400D4000-memory.dmp

          Filesize

          848KB

        • memory/4720-81-0x0000000140000000-0x00000001400D4000-memory.dmp

          Filesize

          848KB

        • memory/4720-82-0x0000000140000000-0x00000001400D4000-memory.dmp

          Filesize

          848KB

        • memory/4720-85-0x0000000140000000-0x00000001400D4000-memory.dmp

          Filesize

          848KB

        • memory/4720-87-0x0000000140000000-0x00000001400D4000-memory.dmp

          Filesize

          848KB

        • memory/4720-84-0x0000000140000000-0x00000001400D4000-memory.dmp

          Filesize

          848KB

        • memory/4720-88-0x0000000140000000-0x00000001400D4000-memory.dmp

          Filesize

          848KB

        • memory/5084-51-0x000002CBA0D90000-0x000002CBA0D98000-memory.dmp

          Filesize

          32KB

        • memory/5084-36-0x000002CB9C8B0000-0x000002CB9C8C0000-memory.dmp

          Filesize

          64KB

        • memory/5084-19-0x000002CB9C7A0000-0x000002CB9C7B0000-memory.dmp

          Filesize

          64KB