Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 10:19
Behavioral task
behavioral1
Sample
playit.exe
Resource
win7-20240708-en
General
-
Target
playit.exe
-
Size
202KB
-
MD5
96922ff790264130780d92489a232eb0
-
SHA1
c75d43dbb381650ec0a9684867b968bf658a0304
-
SHA256
a4aa9acf04e3377f7d0fd23f0677e29cf885436ee18af02de049899a9ab62d61
-
SHA512
0e50f48171d151aca6006f158be6d08985c62e915a5ec46fa9e9e1dc18c38112b4261209158826b15a0c48e05ac26a5af87628e6b57212c0590f962a7a06809d
-
SSDEEP
3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIRpPl1W4F0MpeCWBxwEJcA:QLV6Bta6dtJmakIM56lY4yMpeCoxwEx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation playit.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA playit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe 4352 playit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4352 playit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4352 playit.exe Token: 33 4260 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4260 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4352 wrote to memory of 364 4352 playit.exe 92 PID 4352 wrote to memory of 364 4352 playit.exe 92 PID 4352 wrote to memory of 364 4352 playit.exe 92 PID 364 wrote to memory of 2056 364 cmd.exe 94 PID 364 wrote to memory of 2056 364 cmd.exe 94 PID 364 wrote to memory of 2056 364 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\playit.exe"C:\Users\Admin\AppData\Local\Temp\playit.exe"1⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eddfec1f.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\cmd.execmd3⤵PID:2056
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x408 0x30c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3B
MD5dfff0a7fa1a55c8c1a4966c19f6da452
SHA1abac36149cf8b0e18d680ad240a392fc875517bc
SHA25604dc5b2136328a0dcb189df97734c7c72e5e1227fa0c03469a6ce608f32f1b66
SHA5126b2ceded114a90ec308b795405cb9ec18ea5e42c27d3366880b9fd7fa037bd5e89980e4e1e56ce800a7d2cac3cbfd9b8d3f48b21f6c28f6dd4ebee4983c015ca