Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 04:52

General

  • Target

    ????.exe

  • Size

    117.8MB

  • MD5

    e4fb5b6879486628df824ce3dcc2e007

  • SHA1

    d02c1ac09bf788a8708b8d8e35d9091756087415

  • SHA256

    08442e8713ab66e3117f06372fbbda290e770630d79c5f46274d22af0caa5375

  • SHA512

    37084049a706301ee19c6b3fe9ccacaed9b9e0dc4ecb58d9d0487c04c1e6029078ca0c3cec5c261dc28be5ad76590a25e24dc3b1ba4585c3c6412965165401e7

  • SSDEEP

    1572864:Zbjpp6KvAbWqERVxLKeHbOnOO7uTss/iiwFTKlWOQsQxhEEkkiYvEX74BWpR9nai:bUXe8qhYvia1klj/

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\____.exe
    "C:\Users\Admin\AppData\Local\Temp\____.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\____.exe
      C:\Users\Admin\AppData\Local\Temp\____.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\apnetwork /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\apnetwork\Crashpad --annotation=_productName=apnetwork --annotation=_version=0.0.14 --annotation=prod=Electron --annotation=ver=16.2.1 --initial-client-data=0x2f0,0x2f4,0x2f8,0x2e8,0x2fc,0x7c3a970,0x7c3a980,0x7c3a98c
      2⤵
        PID:1720
      • C:\Users\Admin\AppData\Local\Temp\____.exe
        "C:\Users\Admin\AppData\Local\Temp\____.exe" --type=gpu-process --field-trial-handle=1040,14932913364263753142,4448301679050599968,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Roaming\apnetwork" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1052 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2576
      • C:\Users\Admin\AppData\Local\Temp\____.exe
        "C:\Users\Admin\AppData\Local\Temp\____.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1040,14932913364263753142,4448301679050599968,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Roaming\apnetwork" --mojo-platform-channel-handle=1216 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2448
      • C:\Users\Admin\AppData\Local\Temp\____.exe
        "C:\Users\Admin\AppData\Local\Temp\____.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\apnetwork" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --no-sandbox --field-trial-handle=1040,14932913364263753142,4448301679050599968,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1420 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:2532
      • C:\Windows\SysWOW64\sc.exe
        sc delete FadeService
        2⤵
        • Launches sc.exe
        PID:1124
      • C:\Windows\SysWOW64\sc.exe
        sc delete APNetworkService
        2⤵
        • Launches sc.exe
        PID:348
      • C:\Windows\SysWOW64\sc.exe
        sc queryex APNetworkService
        2⤵
        • Launches sc.exe
        PID:2160
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /d /s /c ""C:\Users\Admin\AppData\Local\Temp\resources\extraResources\apn_service.exe" /install"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Users\Admin\AppData\Local\Temp\resources\extraResources\apn_service.exe
          "C:\Users\Admin\AppData\Local\Temp\resources\extraResources\apn_service.exe" /install
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2340
          • C:\Windows\SysWOW64\net.exe
            net start APNetworkService
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1216
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start APNetworkService
              5⤵
                PID:2508
        • C:\Users\Admin\AppData\Local\Temp\____.exe
          "C:\Users\Admin\AppData\Local\Temp\____.exe" --type=gpu-process --field-trial-handle=1040,14932913364263753142,4448301679050599968,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Roaming\apnetwork" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1052 /prefetch:2
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2060
        • C:\Users\Admin\AppData\Local\Temp\____.exe
          "C:\Users\Admin\AppData\Local\Temp\____.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1040,14932913364263753142,4448301679050599968,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=audio --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Roaming\apnetwork" --mojo-platform-channel-handle=1532 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2056
      • C:\Users\Admin\AppData\Local\Temp\resources\extraResources\apn_service.exe
        C:\Users\Admin\AppData\Local\Temp\resources\extraResources\apn_service.exe
        1⤵
          PID:1264

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6e30494b9253130ad41b395ab4a7ceb6

          SHA1

          ccd5241edcaeb2c36ff24bd640d8d71448952261

          SHA256

          4a785127067962a240810d972c53a0c9cc3131ad6124999af5dc454e7475550f

          SHA512

          e141fc55f72faceb5ec5d08cf00428d9cb2be56e77ca9ecf7fb5b552ee8c4b2b1d91bcd4299ea5363e02261483b9e454c9f3555452bd4b2b608843b2a952c11f

        • C:\Users\Admin\AppData\Local\Temp\Cab25BB.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar262D.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\apnetwork\Crashpad\settings.dat

          Filesize

          40B

          MD5

          93f7bb9bee6d25c3d614d6a14ec74fbd

          SHA1

          f967856698114db9d5543f8a080e2826b9125172

          SHA256

          b112c0566b0581df693549e1cd4fa492aa063e2767fe29a0a113ee48e46e2bee

          SHA512

          b04e58d11afd6129071c36b746cc58ed8ddca579a802be10896368f6eab0be2515a562e9860758e09d171171e402948c7d82788fbc2c8945c1ac41344ac11305

        • C:\Users\Admin\AppData\Roaming\apnetwork\Session Storage\CURRENT

          Filesize

          16B

          MD5

          46295cac801e5d4857d09837238a6394

          SHA1

          44e0fa1b517dbf802b18faf0785eeea6ac51594b

          SHA256

          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

          SHA512

          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

        • C:\Users\Admin\AppData\Roaming\apnetwork\config.json

          Filesize

          2B

          MD5

          99914b932bd37a50b983c5e7c90ae93b

          SHA1

          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

          SHA256

          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

          SHA512

          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

        • C:\Users\Admin\AppData\Roaming\apnetwork\config.json

          Filesize

          29B

          MD5

          0799ca7d102110a905ca21b94611a6bb

          SHA1

          95a4c4747e5d602e2974fe61e5c6e1d86f8ca5fa

          SHA256

          5274b4d9db541cc217801862c8caf3bb075979b25dd5ced8ea4506aba43664fa

          SHA512

          eb8ed75921c4d5c8fc9b932ff5651cb45bb788ab233ee8d6093b12768a320a0b76b528d814fabcd4034b06e69465e930bb9e54a058cd242064480de76911281d

        • \??\pipe\crashpad_2004_OVPAMBHQCNXXQXRQ

          MD5

          d41d8cd98f00b204e9800998ecf8427e

          SHA1

          da39a3ee5e6b4b0d3255bfef95601890afd80709

          SHA256

          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

          SHA512

          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

        • memory/1264-249-0x0000000063D40000-0x0000000063D4F000-memory.dmp

          Filesize

          60KB