Analysis
-
max time kernel
143s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 04:37
Static task
static1
Behavioral task
behavioral1
Sample
d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe
Resource
win10v2004-20240226-en
General
-
Target
d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe
-
Size
1.1MB
-
MD5
b7ae326bc9e0fbe2d39e8845aa5f7641
-
SHA1
53413c854f0165159fcf77fe733e4887a811da00
-
SHA256
d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733
-
SHA512
758d0bf83e658c7a7360d53c53ba0d45ff4f1892c6ff8005b639591d2d4455387fd336db1cedd4b4d9af74433c7a9fcb4e2ed6e60bfbd5e81424dc96a1437b64
-
SSDEEP
6144:gDCwfazrDCwfqDCwfyDDCwfADCwfyDDCwfqDCwfyDDCwfazm:g7azr7q7yD7A7yD7q7yD7azm
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hosts.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avscan.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hosts.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\OAILVCNY = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\OAILVCNY = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\OAILVCNY = "W_X_C.bat" WScript.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 6 IoCs
pid Process 4956 avscan.exe 1496 avscan.exe 4684 hosts.exe 4848 hosts.exe 652 avscan.exe 3484 hosts.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" avscan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" hosts.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\windows\W_X_C.vbs d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe File created \??\c:\windows\W_X_C.bat d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe File opened for modification C:\Windows\hosts.exe d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe File opened for modification C:\Windows\hosts.exe avscan.exe File opened for modification C:\Windows\hosts.exe hosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 9 IoCs
pid Process 3400 REG.exe 3776 REG.exe 4124 REG.exe 4156 REG.exe 1548 REG.exe 1152 REG.exe 1452 REG.exe 1284 REG.exe 3924 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 4956 avscan.exe 4848 hosts.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 4956 avscan.exe 1496 avscan.exe 4848 hosts.exe 4684 hosts.exe 652 avscan.exe 3484 hosts.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3684 wrote to memory of 3776 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 91 PID 3684 wrote to memory of 3776 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 91 PID 3684 wrote to memory of 3776 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 91 PID 3684 wrote to memory of 4956 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 93 PID 3684 wrote to memory of 4956 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 93 PID 3684 wrote to memory of 4956 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 93 PID 4956 wrote to memory of 1496 4956 avscan.exe 94 PID 4956 wrote to memory of 1496 4956 avscan.exe 94 PID 4956 wrote to memory of 1496 4956 avscan.exe 94 PID 4956 wrote to memory of 2076 4956 avscan.exe 95 PID 4956 wrote to memory of 2076 4956 avscan.exe 95 PID 4956 wrote to memory of 2076 4956 avscan.exe 95 PID 3684 wrote to memory of 116 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 96 PID 3684 wrote to memory of 116 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 96 PID 3684 wrote to memory of 116 3684 d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe 96 PID 2076 wrote to memory of 4848 2076 cmd.exe 100 PID 116 wrote to memory of 4684 116 cmd.exe 99 PID 2076 wrote to memory of 4848 2076 cmd.exe 100 PID 2076 wrote to memory of 4848 2076 cmd.exe 100 PID 116 wrote to memory of 4684 116 cmd.exe 99 PID 116 wrote to memory of 4684 116 cmd.exe 99 PID 4848 wrote to memory of 652 4848 hosts.exe 101 PID 4848 wrote to memory of 652 4848 hosts.exe 101 PID 4848 wrote to memory of 652 4848 hosts.exe 101 PID 4848 wrote to memory of 1640 4848 hosts.exe 102 PID 4848 wrote to memory of 1640 4848 hosts.exe 102 PID 4848 wrote to memory of 1640 4848 hosts.exe 102 PID 1640 wrote to memory of 3484 1640 cmd.exe 104 PID 1640 wrote to memory of 3484 1640 cmd.exe 104 PID 1640 wrote to memory of 3484 1640 cmd.exe 104 PID 116 wrote to memory of 1440 116 cmd.exe 106 PID 116 wrote to memory of 1440 116 cmd.exe 106 PID 116 wrote to memory of 1440 116 cmd.exe 106 PID 1640 wrote to memory of 1248 1640 cmd.exe 105 PID 1640 wrote to memory of 1248 1640 cmd.exe 105 PID 1640 wrote to memory of 1248 1640 cmd.exe 105 PID 2076 wrote to memory of 3600 2076 cmd.exe 107 PID 2076 wrote to memory of 3600 2076 cmd.exe 107 PID 2076 wrote to memory of 3600 2076 cmd.exe 107 PID 4956 wrote to memory of 1452 4956 avscan.exe 118 PID 4956 wrote to memory of 1452 4956 avscan.exe 118 PID 4956 wrote to memory of 1452 4956 avscan.exe 118 PID 4848 wrote to memory of 1284 4848 hosts.exe 120 PID 4848 wrote to memory of 1284 4848 hosts.exe 120 PID 4848 wrote to memory of 1284 4848 hosts.exe 120 PID 4956 wrote to memory of 4124 4956 avscan.exe 122 PID 4956 wrote to memory of 4124 4956 avscan.exe 122 PID 4956 wrote to memory of 4124 4956 avscan.exe 122 PID 4848 wrote to memory of 3924 4848 hosts.exe 124 PID 4848 wrote to memory of 3924 4848 hosts.exe 124 PID 4848 wrote to memory of 3924 4848 hosts.exe 124 PID 4956 wrote to memory of 4156 4956 avscan.exe 126 PID 4956 wrote to memory of 4156 4956 avscan.exe 126 PID 4956 wrote to memory of 4156 4956 avscan.exe 126 PID 4848 wrote to memory of 3400 4848 hosts.exe 128 PID 4848 wrote to memory of 3400 4848 hosts.exe 128 PID 4848 wrote to memory of 3400 4848 hosts.exe 128 PID 4956 wrote to memory of 1548 4956 avscan.exe 130 PID 4956 wrote to memory of 1548 4956 avscan.exe 130 PID 4956 wrote to memory of 1548 4956 avscan.exe 130 PID 4848 wrote to memory of 1152 4848 hosts.exe 132 PID 4848 wrote to memory of 1152 4848 hosts.exe 132 PID 4848 wrote to memory of 1152 4848 hosts.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe"C:\Users\Admin\AppData\Local\Temp\d705057413dc54e9b1866a194f00a1ce63871d99a4ff76ff7f4035eacf2ff733.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Modifies registry key
PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\windows\hosts.exeC:\windows\hosts.exe4⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat5⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\windows\hosts.exeC:\windows\hosts.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"6⤵
- Adds policy Run key to start application
PID:1248
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:1284
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:3924
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:3400
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:1152
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"4⤵
- Adds policy Run key to start application
PID:3600
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:1452
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:4124
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:4156
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:116 -
C:\windows\hosts.exeC:\windows\hosts.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4684
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"3⤵
- Adds policy Run key to start application
PID:1440
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4256 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:4468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52a8dcf9eac68d7b232bedad5e38c7f59
SHA1fc4148160b1958c024d5380d24f6c890eef019b2
SHA2564b33ab5ce9c5b26694d1549c9d4eaaa2550f96336e401ab2f91c6b8f54b0a8f7
SHA512253976ace1f16dcd49f5410867f96350805873518668bdeb2c927b4c4f792ca4fecd3c9181b63906b52c7830c6331d7195994343c63c96d46975e6a76af49f20
-
Filesize
195B
MD50b7843cfac17421f5112f317542457da
SHA160383d2b53c315cef3e26e2254448623fbf75de2
SHA256b5006a0ac0b2c3200787642471940c08570b8f21eb46a03b5e53d103cb99a8c7
SHA512cf57206cd2828e2e4ca2f6b2ac8818cf30c5c6d69854f719bcb3296b674d7d02d6067453965220948418fc995aa6d8441a30736f5fa9ce46d01d4056801ff918
-
Filesize
1.1MB
MD546410692a3b4db8d613d2592afeb392b
SHA1a808009cec4eec85c3d040478a715d353cc6f83b
SHA256a2dc78ea89cd069ee4ae116f3e032720a23b66e019580ae2ed74512162b09d56
SHA51231d2f81b31e2da4d06e973cb99f8c9535d892ab8b84c1392e7eddcf87017cef948a50e1c033b011b6899a89794e64f7bb3eef7283aadb8b3041c0588372d3255
-
Filesize
336B
MD54db9f8b6175722b62ececeeeba1ce307
SHA13b3ba8414706e72a6fa19e884a97b87609e11e47
SHA256d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78
SHA5121d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b