Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 03:16
Static task
static1
Behavioral task
behavioral1
Sample
473af2b09ea68fa56f19f779a55e2d60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
473af2b09ea68fa56f19f779a55e2d60N.exe
Resource
win10v2004-20240709-en
General
-
Target
473af2b09ea68fa56f19f779a55e2d60N.exe
-
Size
328KB
-
MD5
473af2b09ea68fa56f19f779a55e2d60
-
SHA1
c9a1250443b5fe9d8cc505e7bc975c9c1b565f97
-
SHA256
7efd63d0a01848bbd335e50af51ac21bb7654d6e7373e730b3b81dfb4f31a530
-
SHA512
a1de6aa8ebe74fcdab902efe056b3fadbca3033287407e415f9266e425074a2af7c5653cbb5a66849083f929766750c44ee4737561d54add1f1105fff74bafe4
-
SSDEEP
6144:J2XgY8FFX7Z6A/P352p4gFs/e8PeAZuon2T5T7UcIGMAQTeJ:J2X1cFx/PAp4ks/e6Fn2dEZGjQSJ
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\conhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\conhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 473af2b09ea68fa56f19f779a55e2d60N.exe -
Executes dropped EXE 4 IoCs
pid Process 1884 473af2b09ea68fa56f19f779a55e2d60N.exe 3456 conhost.exe 3880 conhost.exe 3012 conhost.exe -
resource yara_rule behavioral2/memory/1884-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1884-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1884-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1884-37-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3012-46-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3012-52-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3012-51-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3012-53-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/1884-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3880-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3012-65-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3012-66-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3012-71-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/3012-73-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Console Window Host = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\conhost.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3128 set thread context of 1884 3128 473af2b09ea68fa56f19f779a55e2d60N.exe 97 PID 3456 set thread context of 3880 3456 conhost.exe 104 PID 3456 set thread context of 3012 3456 conhost.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 2472 reg.exe 4108 reg.exe 4384 reg.exe 712 reg.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
description pid Process Token: 1 3012 conhost.exe Token: SeCreateTokenPrivilege 3012 conhost.exe Token: SeAssignPrimaryTokenPrivilege 3012 conhost.exe Token: SeLockMemoryPrivilege 3012 conhost.exe Token: SeIncreaseQuotaPrivilege 3012 conhost.exe Token: SeMachineAccountPrivilege 3012 conhost.exe Token: SeTcbPrivilege 3012 conhost.exe Token: SeSecurityPrivilege 3012 conhost.exe Token: SeTakeOwnershipPrivilege 3012 conhost.exe Token: SeLoadDriverPrivilege 3012 conhost.exe Token: SeSystemProfilePrivilege 3012 conhost.exe Token: SeSystemtimePrivilege 3012 conhost.exe Token: SeProfSingleProcessPrivilege 3012 conhost.exe Token: SeIncBasePriorityPrivilege 3012 conhost.exe Token: SeCreatePagefilePrivilege 3012 conhost.exe Token: SeCreatePermanentPrivilege 3012 conhost.exe Token: SeBackupPrivilege 3012 conhost.exe Token: SeRestorePrivilege 3012 conhost.exe Token: SeShutdownPrivilege 3012 conhost.exe Token: SeDebugPrivilege 3012 conhost.exe Token: SeAuditPrivilege 3012 conhost.exe Token: SeSystemEnvironmentPrivilege 3012 conhost.exe Token: SeChangeNotifyPrivilege 3012 conhost.exe Token: SeRemoteShutdownPrivilege 3012 conhost.exe Token: SeUndockPrivilege 3012 conhost.exe Token: SeSyncAgentPrivilege 3012 conhost.exe Token: SeEnableDelegationPrivilege 3012 conhost.exe Token: SeManageVolumePrivilege 3012 conhost.exe Token: SeImpersonatePrivilege 3012 conhost.exe Token: SeCreateGlobalPrivilege 3012 conhost.exe Token: 31 3012 conhost.exe Token: 32 3012 conhost.exe Token: 33 3012 conhost.exe Token: 34 3012 conhost.exe Token: 35 3012 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe Token: SeDebugPrivilege 3880 conhost.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3128 473af2b09ea68fa56f19f779a55e2d60N.exe 1884 473af2b09ea68fa56f19f779a55e2d60N.exe 3456 conhost.exe 3880 conhost.exe 3012 conhost.exe 3012 conhost.exe 3012 conhost.exe 3012 conhost.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 3128 wrote to memory of 1884 3128 473af2b09ea68fa56f19f779a55e2d60N.exe 97 PID 3128 wrote to memory of 1884 3128 473af2b09ea68fa56f19f779a55e2d60N.exe 97 PID 3128 wrote to memory of 1884 3128 473af2b09ea68fa56f19f779a55e2d60N.exe 97 PID 3128 wrote to memory of 1884 3128 473af2b09ea68fa56f19f779a55e2d60N.exe 97 PID 3128 wrote to memory of 1884 3128 473af2b09ea68fa56f19f779a55e2d60N.exe 97 PID 3128 wrote to memory of 1884 3128 473af2b09ea68fa56f19f779a55e2d60N.exe 97 PID 3128 wrote to memory of 1884 3128 473af2b09ea68fa56f19f779a55e2d60N.exe 97 PID 3128 wrote to memory of 1884 3128 473af2b09ea68fa56f19f779a55e2d60N.exe 97 PID 1884 wrote to memory of 960 1884 473af2b09ea68fa56f19f779a55e2d60N.exe 98 PID 1884 wrote to memory of 960 1884 473af2b09ea68fa56f19f779a55e2d60N.exe 98 PID 1884 wrote to memory of 960 1884 473af2b09ea68fa56f19f779a55e2d60N.exe 98 PID 960 wrote to memory of 3636 960 cmd.exe 101 PID 960 wrote to memory of 3636 960 cmd.exe 101 PID 960 wrote to memory of 3636 960 cmd.exe 101 PID 1884 wrote to memory of 3456 1884 473af2b09ea68fa56f19f779a55e2d60N.exe 102 PID 1884 wrote to memory of 3456 1884 473af2b09ea68fa56f19f779a55e2d60N.exe 102 PID 1884 wrote to memory of 3456 1884 473af2b09ea68fa56f19f779a55e2d60N.exe 102 PID 3456 wrote to memory of 3880 3456 conhost.exe 104 PID 3456 wrote to memory of 3880 3456 conhost.exe 104 PID 3456 wrote to memory of 3880 3456 conhost.exe 104 PID 3456 wrote to memory of 3880 3456 conhost.exe 104 PID 3456 wrote to memory of 3880 3456 conhost.exe 104 PID 3456 wrote to memory of 3880 3456 conhost.exe 104 PID 3456 wrote to memory of 3880 3456 conhost.exe 104 PID 3456 wrote to memory of 3880 3456 conhost.exe 104 PID 3456 wrote to memory of 3012 3456 conhost.exe 105 PID 3456 wrote to memory of 3012 3456 conhost.exe 105 PID 3456 wrote to memory of 3012 3456 conhost.exe 105 PID 3456 wrote to memory of 3012 3456 conhost.exe 105 PID 3456 wrote to memory of 3012 3456 conhost.exe 105 PID 3456 wrote to memory of 3012 3456 conhost.exe 105 PID 3456 wrote to memory of 3012 3456 conhost.exe 105 PID 3456 wrote to memory of 3012 3456 conhost.exe 105 PID 3012 wrote to memory of 3336 3012 conhost.exe 106 PID 3012 wrote to memory of 3336 3012 conhost.exe 106 PID 3012 wrote to memory of 3336 3012 conhost.exe 106 PID 3012 wrote to memory of 2528 3012 conhost.exe 107 PID 3012 wrote to memory of 2528 3012 conhost.exe 107 PID 3012 wrote to memory of 2528 3012 conhost.exe 107 PID 3012 wrote to memory of 3560 3012 conhost.exe 109 PID 3012 wrote to memory of 3560 3012 conhost.exe 109 PID 3012 wrote to memory of 3560 3012 conhost.exe 109 PID 3012 wrote to memory of 2132 3012 conhost.exe 110 PID 3012 wrote to memory of 2132 3012 conhost.exe 110 PID 3012 wrote to memory of 2132 3012 conhost.exe 110 PID 3336 wrote to memory of 2472 3336 cmd.exe 114 PID 3336 wrote to memory of 2472 3336 cmd.exe 114 PID 3336 wrote to memory of 2472 3336 cmd.exe 114 PID 2528 wrote to memory of 4108 2528 cmd.exe 115 PID 2528 wrote to memory of 4108 2528 cmd.exe 115 PID 2528 wrote to memory of 4108 2528 cmd.exe 115 PID 3560 wrote to memory of 4384 3560 cmd.exe 116 PID 3560 wrote to memory of 4384 3560 cmd.exe 116 PID 3560 wrote to memory of 4384 3560 cmd.exe 116 PID 2132 wrote to memory of 712 2132 cmd.exe 117 PID 2132 wrote to memory of 712 2132 cmd.exe 117 PID 2132 wrote to memory of 712 2132 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\473af2b09ea68fa56f19f779a55e2d60N.exe"C:\Users\Admin\AppData\Local\Temp\473af2b09ea68fa56f19f779a55e2d60N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\473af2b09ea68fa56f19f779a55e2d60N.exe"C:\Users\Admin\AppData\Local\Temp\473af2b09ea68fa56f19f779a55e2d60N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FIYUV.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Console Window Host" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /f4⤵
- Adds Run key to start application
PID:3636
-
-
-
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3880
-
-
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- Modifies registry key
PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f5⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- Modifies registry key
PID:4108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- Modifies registry key
PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f5⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- Modifies registry key
PID:712
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD5473af2b09ea68fa56f19f779a55e2d60
SHA1c9a1250443b5fe9d8cc505e7bc975c9c1b565f97
SHA2567efd63d0a01848bbd335e50af51ac21bb7654d6e7373e730b3b81dfb4f31a530
SHA512a1de6aa8ebe74fcdab902efe056b3fadbca3033287407e415f9266e425074a2af7c5653cbb5a66849083f929766750c44ee4737561d54add1f1105fff74bafe4
-
Filesize
154B
MD50d0a854e96bddf0e7df7f5f024674226
SHA1f45ca9c7f935422ddfb0550febdfc7a09baf2d98
SHA2565bab0b5c3ef8a28a7246854074a5a469c602a10ac803d18f2102399597d35907
SHA5128b6db387b3bb5774c691bcdd4d9f3a147e1556eee89fe1de929464510c01b14495157c14cbb355fc850b79dee500b8be7ae7a0c3b5ea0916d6eb9154f9ae73a8
-
Filesize
328KB
MD57c23f7686c34dcd03498c50c6551dd4d
SHA1ed9bfc7b36aa640cb67bee087c0d37efdfc3fd35
SHA256b9d1e46b663fe89c1961fad4f07be7cb0ba591fd1983e75bdf49718ec7bc33f5
SHA512dd01a27abbce659c656e38f5494eb60de95de15600398b0d440ebf38e503c25717a2ae2c3340bb55ff3a43a7a1c456d45e6e5dd1fe8b6f28590f214d2e3b8eef