Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
bfad1fc041e176f9335d91cc4480e2c373d29354a33f5039212afe9e6d879978.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
bfad1fc041e176f9335d91cc4480e2c373d29354a33f5039212afe9e6d879978.exe
Resource
win10v2004-20240508-en
General
-
Target
bfad1fc041e176f9335d91cc4480e2c373d29354a33f5039212afe9e6d879978.exe
-
Size
272KB
-
MD5
616b848d17252f7dae4de86383d25bee
-
SHA1
797200ae77088b2c2f842bf48e73cfd46085b81b
-
SHA256
bfad1fc041e176f9335d91cc4480e2c373d29354a33f5039212afe9e6d879978
-
SHA512
9984b2a1c724a91b5a8b3d5234bd825c7f680fb0a9d46ed05ca7af7d7060c680669f0f6fbd1509128bc44ab173a5d73f014de335a32c3d33ee6b5d54a42599a0
-
SSDEEP
6144:/8MloJP9vDuuDCyd0E3QMfhqK3cTBWvlhAUH:/8MlgP9vv9WE3QqH3cVWthAUH
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vYGtzhImo0usSgDtgHeCaYcX5keqe8rg7.exe bfad1fc041e176f9335d91cc4480e2c373d29354a33f5039212afe9e6d879978.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vYGtzhImo0usSgDtgHeCaYcX5keqe8rg7.exe bfad1fc041e176f9335d91cc4480e2c373d29354a33f5039212afe9e6d879978.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Cry.img" bfad1fc041e176f9335d91cc4480e2c373d29354a33f5039212afe9e6d879978.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2852 bfad1fc041e176f9335d91cc4480e2c373d29354a33f5039212afe9e6d879978.exe Token: SeBackupPrivilege 412 vssvc.exe Token: SeRestorePrivilege 412 vssvc.exe Token: SeAuditPrivilege 412 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfad1fc041e176f9335d91cc4480e2c373d29354a33f5039212afe9e6d879978.exe"C:\Users\Admin\AppData\Local\Temp\bfad1fc041e176f9335d91cc4480e2c373d29354a33f5039212afe9e6d879978.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:412