Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
4fe2ce76f3df2e31f4f1f15750c7ba06b010b492a02c30a0b0dc2b50efb25bf1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4fe2ce76f3df2e31f4f1f15750c7ba06b010b492a02c30a0b0dc2b50efb25bf1.exe
Resource
win10v2004-20240508-en
General
-
Target
4fe2ce76f3df2e31f4f1f15750c7ba06b010b492a02c30a0b0dc2b50efb25bf1.exe
-
Size
197KB
-
MD5
b26cd6020fe4f9b3c9b2e5c86dc3cf81
-
SHA1
cd9444275c1661046681b2a444cb576b4398b5cd
-
SHA256
4fe2ce76f3df2e31f4f1f15750c7ba06b010b492a02c30a0b0dc2b50efb25bf1
-
SHA512
d27c21e85dbd1b732932a63e202dae8d35799578d78be5cccc0f7f03919744b90df353bd409cd54405ad7625977ab7402644957efe57a73c1b0d2596cf03dae5
-
SSDEEP
6144:7AZAiUMjNjwDyrdBbmlfkv1yyeSyIMBHrDFiBpO/rI1CUNrV8:EGbojrdBbmlfSeloyYV
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x00090000000235bb-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation WsAJDz.exe -
Executes dropped EXE 1 IoCs
pid Process 736 WsAJDz.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe WsAJDz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe WsAJDz.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE WsAJDz.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe WsAJDz.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exe WsAJDz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe WsAJDz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe WsAJDz.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleApp.exe WsAJDz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe WsAJDz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe WsAJDz.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe WsAJDz.exe File opened for modification C:\Program Files\dotnet\dotnet.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe WsAJDz.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe WsAJDz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe WsAJDz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe WsAJDz.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE WsAJDz.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe WsAJDz.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe WsAJDz.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe WsAJDz.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE WsAJDz.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe WsAJDz.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe WsAJDz.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe WsAJDz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1740 wrote to memory of 736 1740 4fe2ce76f3df2e31f4f1f15750c7ba06b010b492a02c30a0b0dc2b50efb25bf1.exe 89 PID 1740 wrote to memory of 736 1740 4fe2ce76f3df2e31f4f1f15750c7ba06b010b492a02c30a0b0dc2b50efb25bf1.exe 89 PID 1740 wrote to memory of 736 1740 4fe2ce76f3df2e31f4f1f15750c7ba06b010b492a02c30a0b0dc2b50efb25bf1.exe 89 PID 736 wrote to memory of 4888 736 WsAJDz.exe 95 PID 736 wrote to memory of 4888 736 WsAJDz.exe 95 PID 736 wrote to memory of 4888 736 WsAJDz.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fe2ce76f3df2e31f4f1f15750c7ba06b010b492a02c30a0b0dc2b50efb25bf1.exe"C:\Users\Admin\AppData\Local\Temp\4fe2ce76f3df2e31f4f1f15750c7ba06b010b492a02c30a0b0dc2b50efb25bf1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\WsAJDz.exeC:\Users\Admin\AppData\Local\Temp\WsAJDz.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\755869a4.bat" "3⤵PID:4888
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3608,i,15140928051103392835,1612840580898364401,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:81⤵PID:3680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD529bfd81fef32c659bae1b70a9c57d21e
SHA190fafc787c55a122605a310013445bcfa5895cc8
SHA256ade2fa9ff3c414ee0140448e91da8622df2d840d3e088b1250437d9bbd519b6d
SHA512c20d8bd72347ae60155248eea3b6fec63f2b8aca7c1ef853f81ccf578b10200c3b8dcdfc889c8a8c303b665b77441706f64bf8e86d1a9200f20c0dda75ec8d48
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e