Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
68a0b0d4db32db7b27d9a37b46f270e0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
68a0b0d4db32db7b27d9a37b46f270e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
68a0b0d4db32db7b27d9a37b46f270e0N.exe
-
Size
3.8MB
-
MD5
68a0b0d4db32db7b27d9a37b46f270e0
-
SHA1
377d7e0e7c840d58bb020ca57f9dde83e3bab3c6
-
SHA256
f3e50a9655e56058c63e0a403297c7edbef3e85e82b55758407a8033c72c4c93
-
SHA512
fcf45553d1948deeaf56c777fddbc0a3a95dd4ec583d536cd8a0d8f7b2e5ab658717e7e9ae002357658e56a67f66746d998287d956553b1802adb78764b8340f
-
SSDEEP
49152:cwVJ/qUQ5F5EexZD63Wb5wSSnebipRCoBRI17fMt6v77/lClNiuHL1jGgJ6OLCSI:3/257I6GnaipRT/md77AlDL1XsO8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3640 wmpscfgs.exe 4156 wmpscfgs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\users\\admin\\appdata\\local\\temp\\\\wmpscfgs.exe" 68a0b0d4db32db7b27d9a37b46f270e0N.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe 3640 wmpscfgs.exe 3640 wmpscfgs.exe 4156 wmpscfgs.exe 4156 wmpscfgs.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created \??\c:\program files (x86)\internet explorer\wmpscfgs.exe 68a0b0d4db32db7b27d9a37b46f270e0N.exe File created \??\c:\program files (x86)\adobe\acrotray .exe 68a0b0d4db32db7b27d9a37b46f270e0N.exe File created \??\c:\program files (x86)\adobe\acrotray.exe 68a0b0d4db32db7b27d9a37b46f270e0N.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 3664 4156 WerFault.exe 88 4940 3640 WerFault.exe 87 3248 3640 WerFault.exe 87 3668 4156 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe 3640 wmpscfgs.exe 4156 wmpscfgs.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1076 wrote to memory of 3640 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe 87 PID 1076 wrote to memory of 3640 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe 87 PID 1076 wrote to memory of 3640 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe 87 PID 1076 wrote to memory of 4156 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe 88 PID 1076 wrote to memory of 4156 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe 88 PID 1076 wrote to memory of 4156 1076 68a0b0d4db32db7b27d9a37b46f270e0N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\68a0b0d4db32db7b27d9a37b46f270e0N.exe"C:\Users\Admin\AppData\Local\Temp\68a0b0d4db32db7b27d9a37b46f270e0N.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
\??\c:\users\admin\appdata\local\temp\wmpscfgs.exec:\users\admin\appdata\local\temp\\wmpscfgs.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 4523⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 4523⤵
- Program crash
PID:3248
-
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 4523⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 4523⤵
- Program crash
PID:3668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4156 -ip 41561⤵PID:5024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3640 -ip 36401⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3640 -ip 36401⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4156 -ip 41561⤵PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5fd4f2b4b646e64f7b451f3e9417f7171
SHA1e80a35abe3872b5e104330bf2aaf9b2951510d00
SHA2567b197f7e6ebe8ed395a799d3ec983ce4b6571a0e1e85268fc9975da200a8b14e
SHA512d071162e1c8a3574afb40dc69a50f1f55924c76c876fdfaa6733b18f3230f8be36fd9588186f7ec022ec3a1cf1ffc89e3de6654691b33ea73d06d546fd061075
-
Filesize
3.8MB
MD5e99beb4ec6063b93b20e837f826c0ead
SHA165cae2ae0a0d925776a7e2b494cb3915bd44f014
SHA25609a30201766865dba6413fa73c94c193ab008e0fee1413a867a5355b2b3258d1
SHA512239abfe99bd16b2001b88cf4dfbffaab5af99a75a22793bad134c08c574becc0893f8e032c1fe8f70a6f55b7a9f88e12521897a45c2875f95d7b53eee9644f24