Analysis

  • max time kernel
    146s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 21:45

General

  • Target

    ska2pwej.aeh.exe

  • Size

    5.0MB

  • MD5

    929335d847f8265c0a8648dd6d593605

  • SHA1

    0ff9acf1293ed8b313628269791d09e6413fca56

  • SHA256

    6613acb18cb8bf501fba619f04f8298e5e633cb220c450212bbc9dd2bef9538d

  • SHA512

    7c9a4d1bec430503cc355dc76955d341e001b06196d4b508cc35d64feb2e8ba30e824e7c3a11c27135d7d99801f45f62a5b558563b4c78f89f5d156a929063fd

  • SSDEEP

    98304:rEzNRQ8SgI9jutylH+PjqHbUjHieB/12emQvYP:wNrPGC0ePjqHbUjHicQs2

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Script User-Agent 3 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ska2pwej.aeh.exe
    "C:\Users\Admin\AppData\Local\Temp\ska2pwej.aeh.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\AppData\Local\Temp\is-BEATK.tmp\ska2pwej.aeh.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BEATK.tmp\ska2pwej.aeh.tmp" /SL5="$80054,4511977,830464,C:\Users\Admin\AppData\Local\Temp\ska2pwej.aeh.exe"
      2⤵
      • Adds Run key to start application
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3144
      • C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe
        "C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1276
        • C:\Users\Admin\AppData\Local\Temp\pze1seix.exe
          "C:\Users\Admin\AppData\Local\Temp\pze1seix.exe" /VERYSILENT /SUPPRESSMSGBOXES /NOCANCEL /NORESTART
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3592
          • C:\Users\Admin\AppData\Local\Temp\is-SAVH5.tmp\pze1seix.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-SAVH5.tmp\pze1seix.tmp" /SL5="$A0202,5010045,830976,C:\Users\Admin\AppData\Local\Temp\pze1seix.exe" /VERYSILENT /SUPPRESSMSGBOXES /NOCANCEL /NORESTART
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:4360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Programs\Walliant\AsyncBridge.Net35.dll

    Filesize

    23KB

    MD5

    35cbdbe6987b9951d3467dda2f318f3c

    SHA1

    c0c7bc36c2fb710938f7666858324b141bc5ff22

    SHA256

    e4915f18fd6713ee84f27a06ed1f6f555cdbebe1522792cf4b4961664550cf83

    SHA512

    e1f456f0b4db885f8475d2837f32f31c09f4b303c118f59be4786cf4303a31a2d3004656a3fcfbbf354326ed404afcb4d60966bca04a5e5de8fb8feaf581bce7

  • C:\Users\Admin\AppData\Local\Programs\Walliant\Countly.dll

    Filesize

    114KB

    MD5

    bf6a0f5d2d5f54ceb5b899a2172a335b

    SHA1

    e8992a9d4aeb39647b262d36c1e28ac14702c83e

    SHA256

    32ef07a1a2954a40436d625814d0ce0e04f4a45e711beebc7e159d4c1b2556b6

    SHA512

    49a093345160b645209f4fc806ae67a55ff35e50f54c9fa7ec49d153743e448db9c2fafae61659165d0082fabc473c3e7d47573a481161ddb4c9b5fdd079fc90

  • C:\Users\Admin\AppData\Local\Programs\Walliant\Newtonsoft.Json.dll

    Filesize

    495KB

    MD5

    283544d7f0173e6b5bfbfbc23d1c2fb0

    SHA1

    3e33b2ef50dac60b7411a84779d61bdb0ed9d673

    SHA256

    9165e595b3a0de91ac91a38e742597e12ebb2a5a8fa53058d964a06ceaef7735

    SHA512

    150b45cd43dc5cf191c85524c15dea09fbb48766ad802851270eaacfd73f3d097fef8dcf0ea042184220e7bc71413677d88a206d8bbe60374986e4789054040b

  • C:\Users\Admin\AppData\Local\Programs\Walliant\SharpRaven.dll

    Filesize

    72KB

    MD5

    c1a31ab7394444fd8aa2e8fe3c7c5094

    SHA1

    649a0915f4e063314e3f04d284fea8656f6eb62b

    SHA256

    64b7231eda298844697d38dd3539bd97fe995d88ae0c5e0c09d63a908f7336c4

    SHA512

    3514a69552dd1e1b63a235d7e3a1e982a72a9741ade4a931fc8d8e61f402228ad3243be9321d87fdefdfe137fc357925a931966266ec58c19296adb210be9b0e

  • C:\Users\Admin\AppData\Local\Programs\Walliant\System.Threading.dll

    Filesize

    378KB

    MD5

    f5ee17938d7c545bf62ad955803661c7

    SHA1

    dd0647d250539f1ec580737de102e2515558f422

    SHA256

    8a791af9e3861e231662b657098a823b21a084cbb6a4901d6ccf363405849a78

    SHA512

    669a89ad811cda4f3ff4aa318aa03e26e4cb41ea22bc321bad02a671273d867cbd223a64bb30da592a5484a9f1cec77c96f5bf63b1fe586b6d3688b8c9da530c

  • C:\Users\Admin\AppData\Local\Programs\Walliant\sdk.dll

    Filesize

    11.3MB

    MD5

    fddc7534f3281feb4419da7404d89b4c

    SHA1

    19bdefc2c9e0abd03fe5ee4fad9c813a837f844f

    SHA256

    f13da9813fa11b81ee4180794cbad2b280422716a080bf4c0791996be7f7908e

    SHA512

    c5428179dc222366234125bd78f63a9350c9329e4d46646bb3361de143974d261bd7a8df6155bc7ef46ad3725302837f4769a26459b8b4b5b5304a810303b1ea

  • C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe

    Filesize

    257KB

    MD5

    60d3737a1f84758238483d865a3056dc

    SHA1

    17b13048c1db4e56120fed53abc4056ecb4c56ed

    SHA256

    3436c29dec2c7f633f4766acaf334f6c395d70ea6180c0ea7c1610591d5d89b9

    SHA512

    d34f42b59349f3be1ac39a57207f616a44f56a6c74157be8116fff5df75275928065065a89f10bd79849e58b14d1e5e0ea156be5996ff8ca4f5d854e107c96fe

  • C:\Users\Admin\AppData\Local\Programs\Walliant\walliant.exe.config

    Filesize

    1KB

    MD5

    b492287271363085810ef581a1be0fa3

    SHA1

    4b27b7d87e2fdbdda530afcda73784877cc1a691

    SHA256

    a5fcca5b80f200e9a3ff358d9cac56a0ffabb6f26d97da7f850de14f0fb2709e

    SHA512

    859fa454d8a72771038dc2ff9e7ec3905f83a6a828cc4fc78107b309bdcd45724c749357011af978163f93e7096eb9e9419e3258ea9bd6b652154fe6dd01d036

  • C:\Users\Admin\AppData\Local\Temp\is-BEATK.tmp\ska2pwej.aeh.tmp

    Filesize

    2.5MB

    MD5

    62e5dbc52010c304c82ada0ac564eff9

    SHA1

    d911cb02fdaf79e7c35b863699d21ee7a0514116

    SHA256

    bd54ad7a25594dc823572d9b23a3490ff6b8b1742a75e368d110421ab08909b2

    SHA512

    b5d863ea38816c18f7778ef12ea4168ceb0dae67704c0d1d4a60b0237ca6e758c1dfc5c28d4fc9679b0159de25e56d5dfff8addacd7a9c52572674d90c424946

  • C:\Users\Admin\AppData\Local\Temp\is-SAVH5.tmp\pze1seix.tmp

    Filesize

    3.0MB

    MD5

    1c8a8baba87598e70e741fce3d296ad6

    SHA1

    2117e850fd7062e3e1c4a581dee0286d5c2cdd9e

    SHA256

    03267d69da6acee9b8764bbeef4e33d14b8f40421bf455362f24f6c394b475cb

    SHA512

    6941ed092b3be73be2adef30307ee2a2bd19de563027dbb5874a8727fd5cc6dd18473665ff857364527f10c686b3a387329972c60c720b8b80bec982a65f7fbf

  • C:\Users\Admin\AppData\Local\Temp\pze1seix.exe

    Filesize

    5.6MB

    MD5

    8765fee1a879c775157b8efba5e31401

    SHA1

    af2f349223a08896bfe415266b3dee4c2c04a6eb

    SHA256

    44c661fc5e87462693202e46549b725b0914a20371e459e1717584aed15bb43f

    SHA512

    a2add965df33067bc0c500abbf6c4cfb4c8984711b8c00ef0b75a36100ee87c6783271bf7fead3505f2fdde4bf3979aaff1aef8907a69294c506afeac05a23b5

  • memory/1276-38-0x0000000073470000-0x0000000073A21000-memory.dmp

    Filesize

    5.7MB

  • memory/1276-99-0x0000000073470000-0x0000000073A21000-memory.dmp

    Filesize

    5.7MB

  • memory/1276-124-0x0000000071420000-0x0000000071F1A000-memory.dmp

    Filesize

    11.0MB

  • memory/1276-109-0x0000000071420000-0x0000000071F1A000-memory.dmp

    Filesize

    11.0MB

  • memory/1276-108-0x0000000071420000-0x0000000071F1A000-memory.dmp

    Filesize

    11.0MB

  • memory/1276-37-0x0000000073470000-0x0000000073A21000-memory.dmp

    Filesize

    5.7MB

  • memory/1276-35-0x0000000073472000-0x0000000073473000-memory.dmp

    Filesize

    4KB

  • memory/1276-93-0x0000000073470000-0x0000000073A21000-memory.dmp

    Filesize

    5.7MB

  • memory/1276-96-0x0000000071420000-0x0000000071F1A000-memory.dmp

    Filesize

    11.0MB

  • memory/1276-97-0x0000000071420000-0x0000000071F1A000-memory.dmp

    Filesize

    11.0MB

  • memory/1276-98-0x0000000073472000-0x0000000073473000-memory.dmp

    Filesize

    4KB

  • memory/1276-106-0x0000000071420000-0x0000000071F1A000-memory.dmp

    Filesize

    11.0MB

  • memory/1276-103-0x0000000071420000-0x0000000071F1A000-memory.dmp

    Filesize

    11.0MB

  • memory/1276-104-0x0000000071420000-0x0000000071F1A000-memory.dmp

    Filesize

    11.0MB

  • memory/1276-105-0x0000000071420000-0x0000000071F1A000-memory.dmp

    Filesize

    11.0MB

  • memory/3128-39-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/3128-70-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/3128-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/3128-0-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/3144-65-0x0000000000400000-0x000000000068E000-memory.dmp

    Filesize

    2.6MB

  • memory/3144-6-0x0000000000400000-0x000000000068E000-memory.dmp

    Filesize

    2.6MB

  • memory/3592-113-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/3592-125-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4360-126-0x0000000000400000-0x0000000000713000-memory.dmp

    Filesize

    3.1MB