Analysis
-
max time kernel
144s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2024 01:05
Behavioral task
behavioral1
Sample
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe
Resource
win10v2004-20240704-en
General
-
Target
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe
-
Size
139.7MB
-
MD5
ab32fa6aaaf27e833cc65317b8fd6e98
-
SHA1
61b339765f53729fcd5a6631e7ef833de9dccad0
-
SHA256
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207
-
SHA512
5338550de90d654400ed051670ef3670f17c3279777fab65da9a4afd87caffeac8466b5700b58ef99e3c627959c87c3a4db5a9a0dfa34a8afa9387e3cf402271
-
SSDEEP
786432:wMBFPmYEDLVqSOqZDq+ybW1h4uyrzMVX9yvjBIA1toV+dUbWN3KPqiVslIBKOMxT:wRYcLQvqkWLYUNw91toV+dgTVBZo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Loads dropped DLL 6 IoCs
Processes:
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exepid process 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe -
Modifies registry class 17 IoCs
Processes:
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{59061e90-68e6-8fb9-ae4c-9414206328e2}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe\" -ToastActivated" f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{59061e90-68e6-8fb9-ae4c-9414206328e2} f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Key created \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\AppUserModelId f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{59061e90-68e6-8fb9-ae4c-9414206328e2}\LocalServer32 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Set value (str) \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe\DisplayName = "CoyoteMIDI" f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Set value (str) \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe\IconUri = "C:\\Users\\Admin\\AppData\\Local\\ToastNotificationManagerCompat\\Apps\\59061E90-68E6-8FB9-AE4C-9414206328E2\\Icon.png" f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Set value (str) \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe\IconBackgroundColor = "FFDDDDDD" f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Set value (int) \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe\Has7.0.1Fix = "1" f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Key created \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\CLSID f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{59061e90-68e6-8fb9-ae4c-9414206328e2}\AppId = "{59061e90-68e6-8fb9-ae4c-9414206328e2}" f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{59061e90-68e6-8fb9-ae4c-9414206328e2}\RunAs = "Interactive User" f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Key created \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Set value (str) \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe\CustomActivator = "{59061e90-68e6-8fb9-ae4c-9414206328e2}" f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Key created \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\CLSID\{59061e90-68e6-8fb9-ae4c-9414206328e2}\LocalServer32 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Key created \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\CLSID\{59061e90-68e6-8fb9-ae4c-9414206328e2} f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Set value (str) \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000_Classes\CLSID\{59061e90-68e6-8fb9-ae4c-9414206328e2}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe\" -ToastActivated" f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{59061e90-68e6-8fb9-ae4c-9414206328e2} f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exepid process 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
AUDIODG.EXEf1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exedescription pid process Token: 33 4888 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4888 AUDIODG.EXE Token: SeDebugPrivilege 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exepid process 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exepid process 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exepid process 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe 3944 f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe"C:\Users\Admin\AppData\Local\Temp\f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3944
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x338 0x49c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\.net\f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207\VkQR+XbK6hQojWx_lxl3Qp7ozg0URKc=\Melanchall_DryWetMidi_Native64.dll
Filesize65KB
MD542b0ac2ff31833a75a04c50d2b393a6f
SHA1b9f4cc5ff0622ac7a126a6ed6a5be86fc72f9e33
SHA2562debc5d1046f513db6a920c29b16de23ee29fd713a3447ce4c3d97313e0d3547
SHA512a454e4cb43eb18edef3a45a6720eb575c2ed2b497fc4deffa9a51e8f5bdfa805a007e6c10a496f03cd0f6e0a8c7ccd4b76d398521c163306fa09fe2df29f31e4
-
C:\Users\Admin\AppData\Local\Temp\.net\f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207\VkQR+XbK6hQojWx_lxl3Qp7ozg0URKc=\av_libglesv2.dll
Filesize4.2MB
MD573d2fb4c35d323813a86e3bf5c85c345
SHA181f751a34e0c25bdea93902a19a94a49ce1495df
SHA25685b3aee47c0e0eaf3a5ea5c75ba8131387a12639b6a0ef280c28531fb77695ae
SHA512e81677cc9b99ff3d54f67000a60489603e01a896f90c4ef0c883b82e2fdb7b90d2899c078958b3f060a20373b99cb6c4deb7f64cc4c7e0ba2a708209f4684ca4
-
C:\Users\Admin\AppData\Local\Temp\.net\f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207\VkQR+XbK6hQojWx_lxl3Qp7ozg0URKc=\libHarfBuzzSharp.dll
Filesize1.5MB
MD5f121a2afb03f1b8ca1784e544464a346
SHA19346297a66989dbe88bc459ee8bf936e7acb3d24
SHA256f13d0dae00a598620a436fd991219a2e0fe6157eac90faa025d4d76845cd996c
SHA512ebbb8c2d7d97521286af0f6b02195890b193e660a28e6b1e5112ed9f1fcc081c66587a7a82c8a9468d1a55d477880487d1b3edf1deb2ea285e17d70fbd56c6f1
-
C:\Users\Admin\AppData\Local\Temp\.net\f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207\VkQR+XbK6hQojWx_lxl3Qp7ozg0URKc=\libSkiaSharp.dll
Filesize9.0MB
MD526d723bd75b5c6591dfde18b71281920
SHA147c05d42af2968f83877bb9cbf744c938489f466
SHA2562ca940b7c4621ecd27d2f07c5f46fafa0375f493692cd4e6e1e66c07fbc8109a
SHA51290bbdd48588616177354402b91a3fac363f8eb7959af570e6cee1174eeab950077b71ed47645262daf0957ced5b90b3aa5a7146a5d04d52b5c7975a5d31c5ef7
-
C:\Users\Admin\AppData\Local\Temp\.net\f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207\VkQR+XbK6hQojWx_lxl3Qp7ozg0URKc=\portaudio.dll
Filesize171KB
MD5680ce7668780d32fbe25ad50ab4a45a1
SHA1233e8bf31e7f571165419f2470bcfc6fed880c61
SHA256b9b1d1dc5d05ad593325d38fb6f232d89bc326d6177da394b5f8fd5836abaac6
SHA512d3d4fb79fbcafcab9d5361e6e47ec48947d1c8ae1bb5355544bc2f79522c62d753abbc0e1418d275300d9f597773139df9164c46b2e2b8640f2a448489c42d53
-
C:\Users\Admin\AppData\Local\Temp\.net\f1f3466784f8757113fa3fc2f742b04202cb98cfa3e92f1b26c001bfcff2d207\VkQR+XbK6hQojWx_lxl3Qp7ozg0URKc=\uiohook.dll
Filesize647KB
MD505481d7a12e3dda1b46cd938eeca069c
SHA1721ef7e9ef75b0eb7045fb2651e036c83748fc92
SHA256cdd570722eec0beb4b7b79f99d1501a34f88b868b2dd1fdf4d7a1441dbc6c918
SHA5127b552aeeaf556a5cd097e9abfdf780e3c5b303e440fc6815410e125744177a98045c93df135668733e045b592a51dbc61d9f93baecabc2c821854c23825cde74
-
Filesize
73B
MD504c5bdc839c0a7b7859e27b11111db97
SHA1c0ef9f451efe9b4f1cdd09cc03283e3279fddb7f
SHA2562fa9909f4181e8912b71a2b32378426f46290492dba8be0f77ba27572bd5774e
SHA5128b2b4cf2331575390824acf419ef6d52a45527073dd7802c405a6861a9ada2c614eebb697b6aa5ab6773326fa650d59eea931f3390b4d9ea19cae2a1f7723ae3