Analysis

  • max time kernel
    26s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 21:11

General

  • Target

    000778ee58e6277191be5749c37eea30N.exe

  • Size

    256KB

  • MD5

    000778ee58e6277191be5749c37eea30

  • SHA1

    240c427e327ddf16c11a62fd489792e6d42b4e8b

  • SHA256

    cf690c914df5ecb2f215c9410feaa98cab5f9cc82e25c788becafe14268d9f93

  • SHA512

    5089adeb644ea1ac5ecc902ae1e4c44e85bb7bc2f2a2e71ed6af0eb6baae0c535fbe5eee826ffcd2bb7c7a9c9946b6ab08e727189e125bb69e5e9611e02924c4

  • SSDEEP

    6144:4DLQxoyQ1LpnFyZ+dayL9rvolH8u3ZhGod:gQCyQ1LHk+zR7QHjGo

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops file in Drivers directory 1 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\000778ee58e6277191be5749c37eea30N.exe
    "C:\Users\Admin\AppData\Local\Temp\000778ee58e6277191be5749c37eea30N.exe"
    1⤵
    • Drops file in Drivers directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1688
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\yyyy.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2336
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies registry class
    PID:3496
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
    1⤵
      PID:3384
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4816
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1456

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133665883403074191.txt

      Filesize

      75KB

      MD5

      601fccc5c7d76a229a6082d351651d94

      SHA1

      0ddd4dec86ce55f1b4089fa7b20f35e2d1b1b1a3

      SHA256

      6953bb00d8c3d117191784a7e70bc8fa014c3b4cda5d48591219be22694e3eb1

      SHA512

      093ad0fd671b14ae3c0bd43272a8508ad2f877889ca460290dbfe946a66b1ef78ce7425e0d5850b37014c40676f3418a815fbb9fa8e55685ea20b8156015c8ab

    • C:\Users\Admin\AppData\Local\Temp\yyyy

      Filesize

      256KB

      MD5

      59a3425a51dfea8427601695524e920a

      SHA1

      4579c1fd70b6dfb13a9678324d474888e97212aa

      SHA256

      dd0444dbdd07801a7c667278adbc2c9f0df36a3facfa36a366a41097b295a380

      SHA512

      8ebf4f595dab604ef702740fffe7193e3da8f5bb1830154b772e8965f28336cbd51b9aedb11a918b201e0b1f4ebc119c4cc5cd651cf2bdd97f407f48c94d0cf3

    • C:\Users\Admin\AppData\Local\Temp\yyyy.bat

      Filesize

      337B

      MD5

      c83ca39b15b159123a8e77ec79509a84

      SHA1

      b7b855a6b0dd4318038f92a90042cc880b66c5be

      SHA256

      f88019c762e31a8a6c6c5d7472c6e94301aae23668dcc1921d021c0c03451c5a

      SHA512

      b76751fd27be499454bdce8ca813d21929a0aa57761d3efb1ee76ba2b81e1b29d5ec5dced026cc33942cff158c3d92cea6ea00f5350d1b650268422a460d760b

    • C:\Windows\System32\drivers\etc\hosts

      Filesize

      2KB

      MD5

      6f332dcaeeb548cceb98beb934ab3d55

      SHA1

      e48872682e514e95dcc14ff9bbdc6e0bef723fca

      SHA256

      7937ea22b6d3b09f8d41afef1371aaee906657aafce6678b0b449931a1a8c4c0

      SHA512

      e695693e246253fa969b57c20c4147009846d7848bc092c97aa830daf2f89e0c1a1850cb0c7e5715a95ebf19cdf58726eec3a9820f0b8820e495234ce22f2844

    • memory/1456-30-0x000002997E860000-0x000002997E880000-memory.dmp

      Filesize

      128KB

    • memory/1456-46-0x000002997EC40000-0x000002997EC60000-memory.dmp

      Filesize

      128KB

    • memory/1456-45-0x000002997E820000-0x000002997E840000-memory.dmp

      Filesize

      128KB

    • memory/1688-23-0x0000000004630000-0x0000000004631000-memory.dmp

      Filesize

      4KB

    • memory/3028-0-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/3028-1-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB

    • memory/3028-14-0x0000000000400000-0x000000000048C000-memory.dmp

      Filesize

      560KB