Analysis
-
max time kernel
133s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26/06/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
0abf41123877910a64eddabfbcd8ddde.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0abf41123877910a64eddabfbcd8ddde.exe
Resource
win10v2004-20240611-en
General
-
Target
0abf41123877910a64eddabfbcd8ddde.exe
-
Size
850KB
-
MD5
0abf41123877910a64eddabfbcd8ddde
-
SHA1
da6d3f46fa8192f4f4f56c2b227255077617a5e5
-
SHA256
49499dbdc2175d78d35812df6bdcce3eb6916b315f0e0c7bdf1f5af3f3d59088
-
SHA512
c9b5046d7c1c90ff499ff39120e8d50d326eeed60638908f1eb2d896509ba1434e00255f7446c336793ac4ef3eb0bb5ac1c8313725a0fc804bfd34f143772e10
-
SSDEEP
12288:LAnnfuU/BqIC2n9bD+3Xhgv8AidVh81FBGNE6sqne+gSGmaqhzdNqjbkHXHj6WQJ:sfuvO9ehgv8NxKGvsqSlqhBNy43kRDD
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0abf41123877910a64eddabfbcd8ddde.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" crap.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run crap.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Audio HD Driver = "C:\\Users\\Admin\\AppData\\Roaming\\ykYCaqNte7r.exe" crap.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation 0abf41123877910a64eddabfbcd8ddde.exe -
Executes dropped EXE 2 IoCs
pid Process 396 crap.exe 4948 M2-Tradehack.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audio HD Driver = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ykYCaqNte7r.exe" crap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Audio HD Driver = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ykYCaqNte7r.exe" crap.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0abf41123877910a64eddabfbcd8ddde.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0abf41123877910a64eddabfbcd8ddde.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA crap.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" crap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 396 crap.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4948 M2-Tradehack.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4948 M2-Tradehack.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3492 wrote to memory of 396 3492 0abf41123877910a64eddabfbcd8ddde.exe 82 PID 3492 wrote to memory of 396 3492 0abf41123877910a64eddabfbcd8ddde.exe 82 PID 3492 wrote to memory of 396 3492 0abf41123877910a64eddabfbcd8ddde.exe 82 PID 3492 wrote to memory of 4948 3492 0abf41123877910a64eddabfbcd8ddde.exe 83 PID 3492 wrote to memory of 4948 3492 0abf41123877910a64eddabfbcd8ddde.exe 83 PID 3492 wrote to memory of 4948 3492 0abf41123877910a64eddabfbcd8ddde.exe 83 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0abf41123877910a64eddabfbcd8ddde.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" crap.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0abf41123877910a64eddabfbcd8ddde.exe"C:\Users\Admin\AppData\Local\Temp\0abf41123877910a64eddabfbcd8ddde.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\crap.exe"C:\Users\Admin\AppData\Local\Temp\crap.exe"2⤵
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\M2-Tradehack.exe"C:\Users\Admin\AppData\Local\Temp\M2-Tradehack.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4948
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491KB
MD571f60b4093d45433f440f3c19fd762dd
SHA16abd7237cfb74f3dcb3086c86663bfb11b8a41a8
SHA25639dada2a77655d9beb536a9092a0298f655588bc18542d0d8ffd75f2ef1b929e
SHA512cac259b33ea6b8fb57985e27bd1fc711d29d7269ddfee4cfb8fbb12e3b8df4b8dd0fce132ecbaa089d18972e419d308521df726741c61e46555218e4ec891a37
-
Filesize
344KB
MD537cf85bacfbf0e89070784f4c5d669d7
SHA1c5a3f98ff3cda34488ffc4c509b5db87badb344a
SHA25676bab8d0a284abf4b90917ab271282ea183294b5a3c6e2f885e8635c3433ba49
SHA512bc2dfc68e472ddd1886102db1eca33ee0a8ede07fd6eac0589093dc621a936caf3a224801736a8097a119b15d51b81ae283835e617b9a8f6364938560f64e531