Analysis
-
max time kernel
120s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
79534d06d99f1483c3d47515fb7fb150N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
79534d06d99f1483c3d47515fb7fb150N.exe
Resource
win10v2004-20240709-en
General
-
Target
79534d06d99f1483c3d47515fb7fb150N.exe
-
Size
1.8MB
-
MD5
79534d06d99f1483c3d47515fb7fb150
-
SHA1
246463a688603fe18a871eb003299a0553b6beb4
-
SHA256
e53c9ef16e478d900bdcfb2ee2bdc909601cb711085cf2a8ea563e56b7a669c7
-
SHA512
2ddddc81c2d0f527752be826a791db50a6715c5889c7965da953cfe7102b2860ed3409e6e239b67a835f5c7b3f3e37cfbce1aa4a23c7f7ec67d76876421a8e15
-
SSDEEP
49152:bVA4fBDGeLp63a3/cKgzR/iJdIwQZFJD68dGYWPbmnq0G2SImeGf0g+gS6ZI8u4k:bVA4fBDGeLp6K3/cKgzR/iJdIwQZFJD3
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firefox.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent.exe = "C:\\Users\\Admin\\AppData\\Roaming\\darkeye-nosttingspersistent.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
79534d06d99f1483c3d47515fb7fb150N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 79534d06d99f1483c3d47515fb7fb150N.exe -
Executes dropped EXE 3 IoCs
Processes:
Firefox.exeFirefox.exeFirefox.exepid process 2120 Firefox.exe 548 Firefox.exe 3136 Firefox.exe -
Processes:
resource yara_rule behavioral2/memory/548-34-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/548-36-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3136-37-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3136-43-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3136-44-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/548-31-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/548-49-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3136-50-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/548-51-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/548-55-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/548-62-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/548-73-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Updater 3 = "C:\\Users\\Admin\\AppData\\Roaming\\Firefox.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Firefox.exedescription pid process target process PID 2120 set thread context of 548 2120 Firefox.exe Firefox.exe PID 2120 set thread context of 3136 2120 Firefox.exe Firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exe79534d06d99f1483c3d47515fb7fb150N.exereg.exeFirefox.execmd.execmd.exeFirefox.exereg.exeFirefox.exereg.execmd.exereg.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79534d06d99f1483c3d47515fb7fb150N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Firefox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Firefox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Firefox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 3028 reg.exe 5020 reg.exe 1136 reg.exe 3872 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
Firefox.exeFirefox.exedescription pid process Token: 1 548 Firefox.exe Token: SeCreateTokenPrivilege 548 Firefox.exe Token: SeAssignPrimaryTokenPrivilege 548 Firefox.exe Token: SeLockMemoryPrivilege 548 Firefox.exe Token: SeIncreaseQuotaPrivilege 548 Firefox.exe Token: SeMachineAccountPrivilege 548 Firefox.exe Token: SeTcbPrivilege 548 Firefox.exe Token: SeSecurityPrivilege 548 Firefox.exe Token: SeTakeOwnershipPrivilege 548 Firefox.exe Token: SeLoadDriverPrivilege 548 Firefox.exe Token: SeSystemProfilePrivilege 548 Firefox.exe Token: SeSystemtimePrivilege 548 Firefox.exe Token: SeProfSingleProcessPrivilege 548 Firefox.exe Token: SeIncBasePriorityPrivilege 548 Firefox.exe Token: SeCreatePagefilePrivilege 548 Firefox.exe Token: SeCreatePermanentPrivilege 548 Firefox.exe Token: SeBackupPrivilege 548 Firefox.exe Token: SeRestorePrivilege 548 Firefox.exe Token: SeShutdownPrivilege 548 Firefox.exe Token: SeDebugPrivilege 548 Firefox.exe Token: SeAuditPrivilege 548 Firefox.exe Token: SeSystemEnvironmentPrivilege 548 Firefox.exe Token: SeChangeNotifyPrivilege 548 Firefox.exe Token: SeRemoteShutdownPrivilege 548 Firefox.exe Token: SeUndockPrivilege 548 Firefox.exe Token: SeSyncAgentPrivilege 548 Firefox.exe Token: SeEnableDelegationPrivilege 548 Firefox.exe Token: SeManageVolumePrivilege 548 Firefox.exe Token: SeImpersonatePrivilege 548 Firefox.exe Token: SeCreateGlobalPrivilege 548 Firefox.exe Token: 31 548 Firefox.exe Token: 32 548 Firefox.exe Token: 33 548 Firefox.exe Token: 34 548 Firefox.exe Token: 35 548 Firefox.exe Token: SeDebugPrivilege 3136 Firefox.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
79534d06d99f1483c3d47515fb7fb150N.exeFirefox.exeFirefox.exeFirefox.exepid process 3524 79534d06d99f1483c3d47515fb7fb150N.exe 2120 Firefox.exe 548 Firefox.exe 548 Firefox.exe 3136 Firefox.exe 548 Firefox.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
79534d06d99f1483c3d47515fb7fb150N.execmd.exeFirefox.exeFirefox.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3524 wrote to memory of 5096 3524 79534d06d99f1483c3d47515fb7fb150N.exe cmd.exe PID 3524 wrote to memory of 5096 3524 79534d06d99f1483c3d47515fb7fb150N.exe cmd.exe PID 3524 wrote to memory of 5096 3524 79534d06d99f1483c3d47515fb7fb150N.exe cmd.exe PID 5096 wrote to memory of 3096 5096 cmd.exe reg.exe PID 5096 wrote to memory of 3096 5096 cmd.exe reg.exe PID 5096 wrote to memory of 3096 5096 cmd.exe reg.exe PID 3524 wrote to memory of 2120 3524 79534d06d99f1483c3d47515fb7fb150N.exe Firefox.exe PID 3524 wrote to memory of 2120 3524 79534d06d99f1483c3d47515fb7fb150N.exe Firefox.exe PID 3524 wrote to memory of 2120 3524 79534d06d99f1483c3d47515fb7fb150N.exe Firefox.exe PID 2120 wrote to memory of 548 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 548 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 548 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 548 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 548 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 548 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 548 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 548 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 3136 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 3136 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 3136 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 3136 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 3136 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 3136 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 3136 2120 Firefox.exe Firefox.exe PID 2120 wrote to memory of 3136 2120 Firefox.exe Firefox.exe PID 548 wrote to memory of 5072 548 Firefox.exe cmd.exe PID 548 wrote to memory of 5072 548 Firefox.exe cmd.exe PID 548 wrote to memory of 5072 548 Firefox.exe cmd.exe PID 548 wrote to memory of 5080 548 Firefox.exe cmd.exe PID 548 wrote to memory of 5080 548 Firefox.exe cmd.exe PID 548 wrote to memory of 5080 548 Firefox.exe cmd.exe PID 548 wrote to memory of 2284 548 Firefox.exe cmd.exe PID 548 wrote to memory of 2284 548 Firefox.exe cmd.exe PID 548 wrote to memory of 2284 548 Firefox.exe cmd.exe PID 548 wrote to memory of 2976 548 Firefox.exe cmd.exe PID 548 wrote to memory of 2976 548 Firefox.exe cmd.exe PID 548 wrote to memory of 2976 548 Firefox.exe cmd.exe PID 5080 wrote to memory of 3028 5080 cmd.exe reg.exe PID 5080 wrote to memory of 3028 5080 cmd.exe reg.exe PID 5080 wrote to memory of 3028 5080 cmd.exe reg.exe PID 5072 wrote to memory of 5020 5072 cmd.exe reg.exe PID 5072 wrote to memory of 5020 5072 cmd.exe reg.exe PID 5072 wrote to memory of 5020 5072 cmd.exe reg.exe PID 2976 wrote to memory of 1136 2976 cmd.exe reg.exe PID 2976 wrote to memory of 1136 2976 cmd.exe reg.exe PID 2976 wrote to memory of 1136 2976 cmd.exe reg.exe PID 2284 wrote to memory of 3872 2284 cmd.exe reg.exe PID 2284 wrote to memory of 3872 2284 cmd.exe reg.exe PID 2284 wrote to memory of 3872 2284 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79534d06d99f1483c3d47515fb7fb150N.exe"C:\Users\Admin\AppData\Local\Temp\79534d06d99f1483c3d47515fb7fb150N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GQPhg.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Java Updater 3" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Firefox.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3096 -
C:\Users\Admin\AppData\Roaming\Firefox.exe"C:\Users\Admin\AppData\Roaming\Firefox.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\Firefox.exeC:\Users\Admin\AppData\Roaming\Firefox.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5020 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Firefox.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Firefox.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Firefox.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Firefox.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3028 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3872 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1136 -
C:\Users\Admin\AppData\Roaming\Firefox.exeC:\Users\Admin\AppData\Roaming\Firefox.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD5962bc493b87f298696ad6e3eed7c7937
SHA1985cc0c7e37e2465c4349abd528e120663ebd205
SHA256c167e2faa5307ac291ff833b8a1f5f802eaa028d1aba8d1ad342ca84c07bdb01
SHA5129dd2b755a404b74206b713ab17d2ddedacc48910e942dab71cf7e98d8d25322c24e32648f0881136e5425134aaccfbfd9bdc52ceb4519bd07e97c5564116f173
-
Filesize
1.8MB
MD5fd8232d665166b288cb329df0f82c416
SHA16d883b5ce8fc9996c90d134a32d434154e4fd085
SHA256dca7c96e4101359f2859362ef64d58d4b013a1b970ed38515821532545d10d5d
SHA512a8b3d9586dd29750ff6bdbd265cb2cfbeb263aae4ec049127b996cfb1a3d80aa9e0cac55257b0bc2ea3279e53206ec2c3631507ba88a179cbdfbdb24d2a694da