Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
a2eaa3485a9efff93e652cb5e3fef2bddaa1e631d2abc258a66f3d3b7f09f3de.exe
Resource
win7-20240704-en
General
-
Target
a2eaa3485a9efff93e652cb5e3fef2bddaa1e631d2abc258a66f3d3b7f09f3de.exe
-
Size
873KB
-
MD5
7c14e45f1b37c59138cafd3173e7acd5
-
SHA1
7ea141eb9f013e0dce8ee2b6a692153fefbcbb3a
-
SHA256
a2eaa3485a9efff93e652cb5e3fef2bddaa1e631d2abc258a66f3d3b7f09f3de
-
SHA512
52ce187cc850430f1710e898cf28a5f3a770f3a972f94f6c6c68c6e0042a5dd79b7451dbc95121dee4c0f005dbee2ccfa0aa8fc1850f3d66d7cd6c6c5a61490c
-
SSDEEP
3072:LgfqAxp7Trv/hQjtXCIiXZUiq9UlRLTTFfD8:EfbfTbpOCVXzDLL/Fr8
Malware Config
Extracted
systembc
179.43.178.96:4141
192.168.1.149:4141
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1660 tcemeg.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: SystemSettingsAdminFlows.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\tcemeg.job a2eaa3485a9efff93e652cb5e3fef2bddaa1e631d2abc258a66f3d3b7f09f3de.exe File opened for modification C:\Windows\Tasks\tcemeg.job a2eaa3485a9efff93e652cb5e3fef2bddaa1e631d2abc258a66f3d3b7f09f3de.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 2548 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 2548 SystemSettingsAdminFlows.exe Token: SeSystemEnvironmentPrivilege 2548 SystemSettingsAdminFlows.exe Token: SeBackupPrivilege 2548 SystemSettingsAdminFlows.exe Token: SeRestorePrivilege 2548 SystemSettingsAdminFlows.exe Token: SeSecurityPrivilege 2548 SystemSettingsAdminFlows.exe Token: SeTakeOwnershipPrivilege 2548 SystemSettingsAdminFlows.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 SystemSettingsAdminFlows.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 4704 1960 msedge.exe 101 PID 1960 wrote to memory of 4704 1960 msedge.exe 101 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 208 1960 msedge.exe 102 PID 1960 wrote to memory of 2700 1960 msedge.exe 103 PID 1960 wrote to memory of 2700 1960 msedge.exe 103 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104 PID 1960 wrote to memory of 220 1960 msedge.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2eaa3485a9efff93e652cb5e3fef2bddaa1e631d2abc258a66f3d3b7f09f3de.exe"C:\Users\Admin\AppData\Local\Temp\a2eaa3485a9efff93e652cb5e3fef2bddaa1e631d2abc258a66f3d3b7f09f3de.exe"1⤵
- Drops file in Windows directory
PID:1000
-
C:\ProgramData\nhbtnhr\tcemeg.exeC:\ProgramData\nhbtnhr\tcemeg.exe start1⤵
- Executes dropped EXE
PID:1660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault85268ba8h0ff8h4daah95fch3533a36cf69a1⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff87d4b46f8,0x7ff87d4b4708,0x7ff87d4b47182⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,15067306647538199269,1591156483110044515,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,15067306647538199269,1591156483110044515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,15067306647538199269,1591156483110044515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:668
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" FeaturedResetPC1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2548
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1088
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:2236
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
873KB
MD57c14e45f1b37c59138cafd3173e7acd5
SHA17ea141eb9f013e0dce8ee2b6a692153fefbcbb3a
SHA256a2eaa3485a9efff93e652cb5e3fef2bddaa1e631d2abc258a66f3d3b7f09f3de
SHA51252ce187cc850430f1710e898cf28a5f3a770f3a972f94f6c6c68c6e0042a5dd79b7451dbc95121dee4c0f005dbee2ccfa0aa8fc1850f3d66d7cd6c6c5a61490c
-
Filesize
152B
MD59abb787f6c5a61faf4408f694e89b50e
SHA1914247144868a2ff909207305255ab9bbca33d7e
SHA256ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07
SHA5120f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55
-
Filesize
5KB
MD5b885bee0f95a1bce408421eb3ea145bd
SHA10011a2c33be7ac4d1b71f4cc5acbc604dd502605
SHA25638759b9dd2fe232ffafcde42e10ece24b949e4ba1314646934c267b6cea4c215
SHA5121ffecddb9f451776dbe574ac4f5d51292b4355fd1df1e99437f9b464581a50950f0434a4a1d4d55e2ba93241c843d6c280afc71a1ad21e1198734afa8c02c227
-
Filesize
8KB
MD556eb514d38bfff078477264827284b1d
SHA1c5b9e2b96f912aec86ff9d364f8fdaa96ca7fac9
SHA256ab32c69629674019db6e72aab0ddf6011c4b2e8382868975e6d6e9fa66e34273
SHA512d70b6b63f24b80f901105592a3ea827a170bbed6bfd43b1ffd5cce37fb99f8664cf588255fa2eba9acc71dd1a7010983ff66bf6deaae54775661f07e85fd89e6