Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 04:19
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe
Resource
win7-20240708-en
11 signatures
120 seconds
General
-
Target
6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe
-
Size
1.7MB
-
MD5
6fb8d9b8faf429fd1ac72fe9e8e2acb0
-
SHA1
749e3438eeba8dd45820fff71946891d5c37e9e5
-
SHA256
b33a30ae9ed33c83e82f513ae9c0c8daa332b91488ededdb45068498e11c30e1
-
SHA512
70b2c15918e6ee64b98aabbaa000e8f9364870e5adf36f5c9f33e41f3e3f9738843dd8e5467a2e2722352d8f4cfc269e5342012d92150b60112a0962e6d555b9
-
SSDEEP
24576:Etb20pkfCqT5TBWgNQ7aWS6aWTtVXVChV1SzCaJWN7W6AA:tCg5tQ7aCbTvEhVgGaJ8q5A
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svcmgr.org.url 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe -
resource yara_rule behavioral2/memory/4988-3-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4988-5-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4988-4-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini MSBuild.exe File opened for modification C:\Windows\assembly\Desktop.ini MSBuild.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly MSBuild.exe File created C:\Windows\assembly\Desktop.ini MSBuild.exe File opened for modification C:\Windows\assembly\Desktop.ini MSBuild.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 4988 MSBuild.exe 4988 MSBuild.exe 4988 MSBuild.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4988 MSBuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4988 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 4988 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 87 PID 2624 wrote to memory of 4988 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 87 PID 2624 wrote to memory of 4988 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 87 PID 2624 wrote to memory of 4988 2624 6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe"C:\Users\Admin\AppData\Local\Temp\6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\6fb8d9b8faf429fd1ac72fe9e8e2acb0N.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4988
-