Resubmissions

14/02/2025, 03:19

250214-dt85hazpgj 8

15/07/2024, 12:22

240715-pj7dpszhrl 8

14/07/2024, 17:11

240714-vqpp5asckh 8

14/07/2024, 17:07

240714-vmz2pasbjb 10

14/07/2024, 16:55

240714-ve3gvaygnq 8

01/05/2024, 09:05

240501-k2a11abe8v 10

24/03/2023, 19:33

230324-x9t53aba7y 10

Analysis

  • max time kernel
    988s
  • max time network
    907s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 17:11

General

  • Target

    Replace.exe

  • Size

    34.8MB

  • MD5

    fd5cd14325c51ecab6a57d1d665f8852

  • SHA1

    ea16aa0f197210437733c63a42a8f1dd6442d753

  • SHA256

    d433cd0ba6b6850a9f616b3b89754a005699547d4e04fadb75cade770156cfd1

  • SHA512

    9a2e4c8baa01fbafe6968905daeb8d3b7eb62c09d1d7584e973ad1c23d964093e161a51a7390dfaa598d2657f45ca17bf00b5055aeaf0441f875ddb364741d71

  • SSDEEP

    786432:i9hj60qHOBbQcVM3sct6C2ubdsUeGXV4yQnb+LQgRkrm12PYfrB:i9kH+o5sG2ysbhrmka

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Replace.exe
    "C:\Users\Admin\AppData\Local\Temp\Replace.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 "C:\Users\Admin\AppData\Local\Temp\wscC0DF.tmp",Start verpostfix=bt
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      PID:3756
    • C:\Users\Admin\AppData\Local\Temp\7zSC7BF5887\run.exe
      .\run.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:908
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2044
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
      1⤵
        PID:4080
      • C:\Users\Admin\AppData\Local\Temp\Replace.exe
        "C:\Users\Admin\AppData\Local\Temp\Replace.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4828
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 "C:\Users\Admin\AppData\Local\Temp\wsc3302.tmp",Start verpostfix=bt
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:1500
        • C:\Users\Admin\AppData\Local\Temp\7zSCD226925\run.exe
          .\run.exe
          2⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:4220
      • C:\Users\Admin\AppData\Local\Temp\Replace.exe
        "C:\Users\Admin\AppData\Local\Temp\Replace.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 "C:\Users\Admin\AppData\Local\Temp\wsc51F4.tmp",Start verpostfix=bt
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:1976
        • C:\Users\Admin\AppData\Local\Temp\7zS43154115\run.exe
          .\run.exe
          2⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:756
      • C:\Users\Admin\Desktop\Replace.exe
        "C:\Users\Admin\Desktop\Replace.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 "C:\Users\Admin\AppData\Local\Temp\wsc6C52.tmp",Start verpostfix=bt
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:4368
        • C:\Users\Admin\AppData\Local\Temp\7zS89423A45\run.exe
          .\run.exe
          2⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:2892
      • C:\Program Files\Image-Line\FL Studio 20\FL64.exe
        "C:\Program Files\Image-Line\FL Studio 20\FL64.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1608
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1056
      • C:\Program Files\7-Zip\7zFM.exe
        "C:\Program Files\7-Zip\7zFM.exe" "C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll"
        1⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3936
      • C:\Users\Admin\Desktop\Replace.exe
        "C:\Users\Admin\Desktop\Replace.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2144
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 "C:\Users\Admin\AppData\Local\Temp\wscF141.tmp",Start verpostfix=bt
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:2212
        • C:\Users\Admin\AppData\Local\Temp\7zS0681FEF5\run.exe
          .\run.exe
          2⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:5000
      • C:\Program Files\Image-Line\FL Studio 20\FL64.exe
        "C:\Program Files\Image-Line\FL Studio 20\FL64.exe"
        1⤵
        • Executes dropped EXE
        PID:2800
      • C:\Users\Admin\Desktop\Replace.exe
        "C:\Users\Admin\Desktop\Replace.exe" "C:\Program Files\Image-Line\FL Studio 20\FL64.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:908
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 "C:\Users\Admin\AppData\Local\Temp\wscB9F.tmp",Start verpostfix=bt
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:4928
        • C:\Users\Admin\AppData\Local\Temp\7zSC83F1916\run.exe
          .\run.exe "C:\Program Files\Image-Line\FL Studio 20\FL64.exe"
          2⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:1788
      • C:\Users\Admin\Desktop\Replace.exe
        "C:\Users\Admin\Desktop\Replace.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:5088
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 "C:\Users\Admin\AppData\Local\Temp\wsc18AF.tmp",Start verpostfix=bt
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:1692
        • C:\Users\Admin\AppData\Local\Temp\7zS0E3ECC26\run.exe
          .\run.exe
          2⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:2004
      • C:\Program Files\Image-Line\FL Studio 20\FL64.exe
        "C:\Program Files\Image-Line\FL Studio 20\FL64.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2604
      • C:\Program Files\Image-Line\FL Studio 20\FL64.exe
        "C:\Program Files\Image-Line\FL Studio 20\FL64.exe" C:\Users\Admin\Desktop\Replace.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3312
      • C:\Program Files\Image-Line\FL Studio 20\Replace.exe
        "C:\Program Files\Image-Line\FL Studio 20\Replace.exe" "C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3732
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 "C:\Users\Admin\AppData\Local\Temp\wsc9B8B.tmp",Start verpostfix=bt
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:1216
        • C:\Users\Admin\AppData\Local\Temp\7zS49EC61D6\run.exe
          .\run.exe "C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll"
          2⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:2432
      • C:\Program Files\Image-Line\FL Studio 20\FL64 - Copy.exe
        "C:\Program Files\Image-Line\FL Studio 20\FL64 - Copy.exe" "C:\Program Files\Image-Line\FL Studio 20\FL64.exe" "C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64 - Copy.dll" "C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll" "C:\Program Files\Image-Line\FL Studio 20\Replace - Copy.exe" "C:\Program Files\Image-Line\FL Studio 20\Replace.exe"
        1⤵
        • Loads dropped DLL
        PID:4748
      • C:\Program Files\Image-Line\FL Studio 20\FL64 - Copy.exe
        "C:\Program Files\Image-Line\FL Studio 20\FL64 - Copy.exe" "C:\Program Files\Image-Line\FL Studio 20\Replace.exe" "C:\Program Files\Image-Line\FL Studio 20\FL64.exe" "C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64 - Copy.dll" "C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll" "C:\Program Files\Image-Line\FL Studio 20\Replace - Copy.exe"
        1⤵
        • Loads dropped DLL
        PID:1836

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Image-Line\FL Studio 20\FL64.exe

        Filesize

        287KB

        MD5

        8d4aee53f9d6ea4a47dc73edd78dcef0

        SHA1

        4d12d67edd64877831dea463ce67c42ebca6e0ae

        SHA256

        6cfc98d1ffcdb983e64beac75ccde7d873e3c41fffde2f4d87dd0757eb5a620d

        SHA512

        54eaa03f18bccaddb04a8dd7127f1e9ce8eefaf1141e3b8684e7f6bbdcc45aa60aa276467f1df9bd361d0ac8c8de398959be18bf2e387dce34550716e44599ec

      • C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll

        Filesize

        47.5MB

        MD5

        9ad3502b6c9879e27f445ffae3ed7f2b

        SHA1

        ff6871ad399b0f5805f4b10daa537c146b6fc35e

        SHA256

        82a4e20319e831e5239850a2d04ebe7aa4f80266096fa585494a667cdce0af58

        SHA512

        567a49d89da7281b125c32f4e14cd34ee32e6494684c1457aebba8e7b39add10faf832e03df9f7964c672f73b52e12b1684ec36ab92e192f0800042c48e4504c

      • C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll

        Filesize

        46.8MB

        MD5

        10fa31d3951028a8a8610b182a754109

        SHA1

        a34cbdba94a7fa33d0d7680d03a15d8653f461a1

        SHA256

        fbd3857fcafab4d0c92c6d22e1cbf1b5b7749eb8f53fd2ebc0dd936279b75aa4

        SHA512

        bca2b4581d9d49f79084c7841d397eafb7f3ce566c32fc35c9fc6741d3e791a0e8f3ba58223131b8fb27f39e19b1bd9a4539301266368ec7dedb2bad83192667

      • C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll

        Filesize

        43.9MB

        MD5

        9df8cf9318f7e17895236468c2c3516d

        SHA1

        3021caf941ce86fdd359c492e23b0b184a3cdbb4

        SHA256

        3f70911b8100c1273d7b980418a112d5418788be19a4916940bd48e6e7c6e369

        SHA512

        df80dc01e4e9fcf9185aa6379366169fc474e3bc1ed27a5c4e17b9ffe5710a3cb0b1ffe09ee830d903629d60127a4d18e24f44a644b9d3e068069f479994bb3f

      • C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll

        Filesize

        25.3MB

        MD5

        6b0b130105bb36bcf08f51697cbfcab5

        SHA1

        6ebc3abe704b083cdb7a1c743e144b4c782f0fc6

        SHA256

        d6df9627c87ff0b32ecb2dc7db6c03f6ec0c20fe83bb84c92a2401e6ed363e7e

        SHA512

        46c031d5dc829a2f0fb54594832cc14282fe3faa17c2dd5d610c20118dbbf979eb38414c89899366705bf60cbdd2af9b575253fa4031f4765979f540653497cd

      • C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll

        Filesize

        21.4MB

        MD5

        972415411f1839f3bec39b4129ce3df4

        SHA1

        543dd8481754a2a7f605297f6027c8f6de3a8a14

        SHA256

        dc2a0ff010ce9ef795bf1d09d5a03554a23b204721c9e7e753c3732d9ad24f3a

        SHA512

        26d7adb9a6bd59d8f812bf2c5b0054149ff1a9f9f55a88271969a3657186ce15ec4a7d0d21d6c6acdfcd8715804887f50bbc23472b448e6fea3b50861e79b034

      • C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll

        Filesize

        48.5MB

        MD5

        e577ef3cfadbb80c6af8f37bf6e62f70

        SHA1

        c27f57e17539f09cec7b47c223dfa8ea54b851fe

        SHA256

        60392a436109f0b236c2b26ccaf677f3e0e0bd338aec35a6495c0a25f73e3f15

        SHA512

        a1fa8bb2e148e76e2ccedfed94d8c93841e086821fe258adb931f12a1685bf2f5b5a9a131aece81b18441fdb48112c5f5c914e49a8c689138333ff0c427bca49

      • C:\Program Files\Image-Line\FL Studio 20\FLEngine_x64.dll

        Filesize

        48.5MB

        MD5

        78c84624b984c225f4a15f3e9b307a11

        SHA1

        ef01104a227f89fcea4f0131f1e95bca588c749f

        SHA256

        2cba4ba75b227d2ba96f04b955c288b5e3cae36730d8820c604046a04080f5c7

        SHA512

        5243168a7a912c9aefb662f554150a3a59fd827508b18325cdaa9ff38aa4817bae21a540ca24c8eb94439e783bca57948701ecf79eb57fe78fc5b53633d0ddc8

      • C:\Users\Admin\AppData\Local\Temp\7zSC7BF5887\run.exe

        Filesize

        34.8MB

        MD5

        d77c3ef3efa7e38ef91137466eee801b

        SHA1

        0b6ce4b03f43c2a7290f95bfbbe9107298efeaef

        SHA256

        91c2295f354b0616aa6481708248f6ce35dbe9292901464fc6bf3a22522ccb2f

        SHA512

        7c0171509814f7e5f24b2a9d53a10ab282586ec56bcdedc2deb2ba1aa2b4d9edade6d6d753ca80fb65d147597bfd4ac9f30e330e88c695e72c913ff3ab224750

      • C:\Users\Admin\AppData\Local\Temp\wnsEFE4.tmp

        Filesize

        564B

        MD5

        5da4c1420f84ec727d1b6bdd0d46e62e

        SHA1

        280d08d142f7386283f420444ec48e1cdbfd61bb

        SHA256

        3c8cc37a98346bd0123b35e5ccd87bd07d69914dae04f8b49f61c150d96e9d1f

        SHA512

        7c51a628831d0236e8d314c71732b8a62e06334431d10f7c293c49b23665b2a6a1ddbc4772009010955b5228ea4a5cd97fb93581ce391ee1792e8a198b76111a

      • C:\Users\Admin\AppData\Local\Temp\wscC0DF.tmp

        Filesize

        6KB

        MD5

        41e689a7859429d628c34a82bcbb1187

        SHA1

        f435c4225fc00b3ce4543b812731a65d3722bdc3

        SHA256

        252dd587c652e9939432bd8b5574590c4a8db64660bc753f5490a472703f5c3a

        SHA512

        6a8f76f4d2eeb78df1c48f43c8d31f4510f2ba8da71fbb93d88627eba5f4cc74eb9aa12b7688d7fb62ed938fe2ac15bd2c060d6ad90e5b2c61114f74fcecec85

      • memory/1608-68-0x0000000002580000-0x0000000005743000-memory.dmp

        Filesize

        49.8MB

      • memory/1608-67-0x0000000002580000-0x0000000005743000-memory.dmp

        Filesize

        49.8MB

      • memory/1836-138-0x0000000002590000-0x0000000005753000-memory.dmp

        Filesize

        49.8MB

      • memory/1836-139-0x0000000002590000-0x0000000005753000-memory.dmp

        Filesize

        49.8MB

      • memory/2604-112-0x0000000003390000-0x0000000006553000-memory.dmp

        Filesize

        49.8MB

      • memory/2604-111-0x0000000003390000-0x0000000006553000-memory.dmp

        Filesize

        49.8MB

      • memory/3312-117-0x0000000003080000-0x0000000006243000-memory.dmp

        Filesize

        49.8MB

      • memory/3312-116-0x0000000003080000-0x0000000006243000-memory.dmp

        Filesize

        49.8MB

      • memory/4748-134-0x0000000002E00000-0x0000000005FC3000-memory.dmp

        Filesize

        49.8MB

      • memory/4748-135-0x0000000002E00000-0x0000000005FC3000-memory.dmp

        Filesize

        49.8MB