Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
3bfa334b452f658ffa46b8ed3cf7b1d0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3bfa334b452f658ffa46b8ed3cf7b1d0N.exe
Resource
win10v2004-20240704-en
General
-
Target
3bfa334b452f658ffa46b8ed3cf7b1d0N.exe
-
Size
469KB
-
MD5
3bfa334b452f658ffa46b8ed3cf7b1d0
-
SHA1
ebaf6fa7ab76b2ef04809f05d861c13edfbd81fa
-
SHA256
174c091cc77bbb7cd052640988e4ca708bb626211350e58c25ac76db89fcdb58
-
SHA512
ba3ff4dc955c42083260231db960f4d320c72f10f76c49e29357fc123fee368b2b5970455bfc120d4decefec2c195b80e3e0e3334621cadaf1f7115fd5712a5e
-
SSDEEP
12288:Velc87eqqV5e+wBV6O+yBEu7lC6aNnOYv:VeSqqHeVBxVEL1AYv
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2116 Fondconv.exe 3296 certicpl.exe 2328 ~7A12.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Laun_ssp = "C:\\Users\\Admin\\AppData\\Roaming\\convinit\\Fondconv.exe" 3bfa334b452f658ffa46b8ed3cf7b1d0N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\certicpl.exe 3bfa334b452f658ffa46b8ed3cf7b1d0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 Fondconv.exe 2116 Fondconv.exe 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE 3548 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2116 Fondconv.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3548 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2116 1916 3bfa334b452f658ffa46b8ed3cf7b1d0N.exe 85 PID 1916 wrote to memory of 2116 1916 3bfa334b452f658ffa46b8ed3cf7b1d0N.exe 85 PID 1916 wrote to memory of 2116 1916 3bfa334b452f658ffa46b8ed3cf7b1d0N.exe 85 PID 2116 wrote to memory of 2328 2116 Fondconv.exe 87 PID 2116 wrote to memory of 2328 2116 Fondconv.exe 87 PID 2328 wrote to memory of 3548 2328 ~7A12.tmp 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\3bfa334b452f658ffa46b8ed3cf7b1d0N.exe"C:\Users\Admin\AppData\Local\Temp\3bfa334b452f658ffa46b8ed3cf7b1d0N.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\convinit\Fondconv.exe"C:\Users\Admin\AppData\Roaming\convinit"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\~7A12.tmp3548 480264 2116 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328
-
-
-
-
C:\Windows\SysWOW64\certicpl.exeC:\Windows\SysWOW64\certicpl.exe -s1⤵
- Executes dropped EXE
PID:3296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
469KB
MD50c2f15122bf6d5ed8e30bc07ae581bc7
SHA1d958c248a57d2e2958392ad50a2d68c18a258d8f
SHA2569650097d523e1adcd6ed2d6c0e68872fe4f0cc3ac69dadecd0d9d5022545636d
SHA512895651fa38ecb5f4fc7e877bfbf865e165c6900944fd1a45472e51a73a11d6e212cfbe81d82fa9d1f1209593f11eed7a85641ac59094fba482ec2b8bc74974bf