Analysis
-
max time kernel
157s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 14:56
Static task
static1
Behavioral task
behavioral1
Sample
922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe
Resource
win10v2004-20240226-en
General
-
Target
922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe
-
Size
7.5MB
-
MD5
ca1ebdc2376812aca799e6115226b3a2
-
SHA1
d3fbf1051bc8cc75d2152b84f6fb176ff3beb2d6
-
SHA256
922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7
-
SHA512
e199cfaa6d758225634cd9ca20ea18620603c66917c14d4514b10aa69bbbb245031d926bc72083b7a1b05e9ad1dd3b7fcab0a88085541f10a8df11c73eda84df
-
SSDEEP
196608:gqKoY7V6HlI1PFWUs8bb2s73QFqENscckrtfFqTyOrZY:5Pm6H6FFWUs4CszQFq0sccDNO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2268 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe -
Executes dropped EXE 1 IoCs
pid Process 2268 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe -
resource yara_rule behavioral2/memory/1712-2-0x0000000002690000-0x000000000269B000-memory.dmp upx behavioral2/memory/2268-17-0x0000000002540000-0x000000000254B000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\Z: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\N: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\P: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\R: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\S: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\V: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\H: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\I: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\M: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\Y: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\K: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\Q: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\X: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\J: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\L: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\O: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\T: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\U: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\A: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\B: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\E: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe File opened (read-only) \??\W: 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1712 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 1712 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 1712 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 1712 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 1712 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 2268 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 2268 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 2268 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 2268 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 2268 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2268 1712 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 94 PID 1712 wrote to memory of 2268 1712 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 94 PID 1712 wrote to memory of 2268 1712 922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe"C:\Users\Admin\AppData\Local\Temp\922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7\922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exeC:\922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7\922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4016 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7\922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7.exe
Filesize7.5MB
MD5ca1ebdc2376812aca799e6115226b3a2
SHA1d3fbf1051bc8cc75d2152b84f6fb176ff3beb2d6
SHA256922de1dcb8e8e236de95a4755d195c3097c697ea259d92192f793ba58b5d8cb7
SHA512e199cfaa6d758225634cd9ca20ea18620603c66917c14d4514b10aa69bbbb245031d926bc72083b7a1b05e9ad1dd3b7fcab0a88085541f10a8df11c73eda84df
-
Filesize
68B
MD5a5d1d9e2c24b012bd44b6c2d33b99f76
SHA143fa374f4253d1068f01b76d49a0ea9b3e69cff5
SHA256fd9629f28d5079107c4745791939d39ded15fb60df3108ea178e6ba7a51083f6
SHA51261f2cc8d3ede819b05b1ef2ce99a26a2bccd9e379656b17e94232d5080e255be9650740ec221bb9e1f7251e710142124316e98a7ac3490928a866096c4ebe911
-
Filesize
102B
MD5992e64060a260acbc74826a6c07f8b1f
SHA1007d62046356d9e42153689de2d3d32b19c6c2a6
SHA256c09b890e9df9d83428b511d721c9570ef9f9d6c07c3d92198196c41c760439f6
SHA5127ff2c867e20ce71f17ad52946d468c489ce16a0bfe4f37b836280bc6994eab3ba560b6ba8da23ae1f0bad722e9ff7c7e66d6caec747f5e6ea202783026cbb28b