Overview
overview
5Static
static
3colorcpl.exe
windows10-2004-x64
1comp.exe
windows10-2004-x64
1compact.exe
windows10-2004-x64
1conhost.exe
windows10-2004-x64
1consent.exe
windows10-2004-x64
1control.exe
windows10-2004-x64
1convert.exe
windows10-2004-x64
1convertvhd.exe
windows10-2004-x64
1coredpussvr.exe
windows10-2004-x64
1credwiz.exe
windows10-2004-x64
1cscript.exe
windows10-2004-x64
1ctfmon.exe
windows10-2004-x64
1cttune.exe
windows10-2004-x64
1cttunesvr.exe
windows10-2004-x64
1curl.exe
windows7-x64
1curl.exe
windows10-2004-x64
1dasHost.exe
windows10-2004-x64
1dccw.exe
windows10-2004-x64
1dcomcnfg.exe
windows10-2004-x64
5ddodiag.exe
windows10-2004-x64
1deployment...er.exe
windows10-2004-x64
1desktopimgdownldr.exe
windows10-2004-x64
1dfrgui.exe
windows10-2004-x64
1dialer.exe
windows10-2004-x64
1directxdat...er.exe
windows10-2004-x64
1diskpart.exe
windows10-2004-x64
1diskperf.exe
windows10-2004-x64
1diskraid.exe
windows10-2004-x64
1diskusage.exe
windows10-2004-x64
1dispdiag.exe
windows10-2004-x64
5djoin.exe
windows10-2004-x64
1dllhost.exe
windows10-2004-x64
1Resubmissions
09/07/2024, 13:39
240709-qydwdayanf 709/07/2024, 07:52
240709-jqdr3swdle 609/07/2024, 06:42
240709-hgkzcs1bjl 509/07/2024, 06:34
240709-hb2d6azhjn 309/07/2024, 05:47
240709-ggxgqa1crh 4Analysis
-
max time kernel
121s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
colorcpl.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
comp.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
compact.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral4
Sample
conhost.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
consent.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral6
Sample
control.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
convert.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral8
Sample
convertvhd.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
coredpussvr.exe
Resource
win10v2004-20240708-en
Behavioral task
behavioral10
Sample
credwiz.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
cscript.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral12
Sample
ctfmon.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
cttune.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral14
Sample
cttunesvr.exe
Resource
win10v2004-20240708-en
Behavioral task
behavioral15
Sample
curl.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
curl.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
dasHost.exe
Resource
win10v2004-20240708-en
Behavioral task
behavioral18
Sample
dccw.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
dcomcnfg.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral20
Sample
ddodiag.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
deploymentcsphelper.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral22
Sample
desktopimgdownldr.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
dfrgui.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral24
Sample
dialer.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
directxdatabaseupdater.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral26
Sample
diskpart.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
diskperf.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral28
Sample
diskraid.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
diskusage.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral30
Sample
dispdiag.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
djoin.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral32
Sample
dllhost.exe
Resource
win10v2004-20240704-en
General
-
Target
dcomcnfg.exe
-
Size
28KB
-
MD5
dfa0d5bcde97e541aae197b791b0bf77
-
SHA1
602883cd4308964a2e0fc74a561861908400144f
-
SHA256
893a6c696459fe6f44c5e71dba1f792df37ba765095548d125ba43aca4f47b18
-
SHA512
bf78cf1c20941f4735549c427a8295b7b2ea5756d1246b7530c0e1e55a9c1f28574d93a0de4faf2392df07940f2733208451130718150357efc390a09b75087c
-
SSDEEP
192:XJTPYfus5uLG27WxL3uX8E4+7L5Eyf9CseWEFCpt2cjIfWJfsW0EW:ZTAWsYcL3fEP7LGj7FCp6fWyW0EW
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\comexp.msc mmc.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{90E5EACA-7441-4D99-A8AC-226BF6B330E1}.crmlog dllhost.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{90E5EACA-7441-4D99-A8AC-226BF6B330E1}.crmlog dllhost.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeSecurityPrivilege 2712 mmc.exe Token: 33 2712 mmc.exe Token: SeIncBasePriorityPrivilege 2712 mmc.exe Token: 33 2712 mmc.exe Token: SeIncBasePriorityPrivilege 2712 mmc.exe Token: 33 2712 mmc.exe Token: SeIncBasePriorityPrivilege 2712 mmc.exe Token: 33 2712 mmc.exe Token: SeIncBasePriorityPrivilege 2712 mmc.exe Token: 33 2712 mmc.exe Token: SeIncBasePriorityPrivilege 2712 mmc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 mmc.exe 2712 mmc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3692 wrote to memory of 2712 3692 dcomcnfg.exe 90 PID 3692 wrote to memory of 2712 3692 dcomcnfg.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcomcnfg.exe"C:\Users\Admin\AppData\Local\Temp\dcomcnfg.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe C:\Windows\system32\comexp.msc2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4376,i,3027467512973953085,11878940668304988630,262144 --variations-seed-version --mojo-platform-channel-handle=1028 /prefetch:81⤵PID:2080
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Drops file in Windows directory
PID:1652
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:3536