Analysis
-
max time kernel
76s -
max time network
79s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02/08/2024, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.exe
Resource
win10-20240404-en
General
-
Target
cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.exe
-
Size
1.7MB
-
MD5
e919f0567a75876f9ee34885cdea925a
-
SHA1
23cb9a9fc90a0de78173a6861e10867097a5005e
-
SHA256
b128232a0fac18dc4d5feaac53445a47b53b89cd87d49139f40d4f4e87721e7b
-
SHA512
b7f4b1e4f2c3ff1e3e6bec66f089a7e725a14b2cae88d68912dde191eddd282b5c0c9181fea98f74f2b7a269be198ba6600daa73a3afe2b5a39d9aac8230f978
-
SSDEEP
24576:a7FUDowAyrTVE3U5F/a0bQWwN9RU36Sh/SMhXzF58vMGIYTAy+S7kSJ:aBuZrEUc9j6pjIMGFTKakC
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe -
Executes dropped EXE 1 IoCs
pid Process 5044 cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.tmp -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3920 taskmgr.exe Token: SeSystemProfilePrivilege 3920 taskmgr.exe Token: SeCreateGlobalPrivilege 3920 taskmgr.exe Token: 33 3920 taskmgr.exe Token: SeIncBasePriorityPrivilege 3920 taskmgr.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 5044 cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.tmp 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe 3920 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4700 wrote to memory of 5044 4700 cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.exe 72 PID 4700 wrote to memory of 5044 4700 cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.exe 72 PID 4700 wrote to memory of 5044 4700 cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.exe"C:\Users\Admin\AppData\Local\Temp\cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\is-HEOLQ.tmp\cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.tmp"C:\Users\Admin\AppData\Local\Temp\is-HEOLQ.tmp\cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.tmp" /SL5="$600CA,837551,832512,C:\Users\Admin\AppData\Local\Temp\cyanogenmod-installer-1.0.0.0-installer_Mtd-CX1.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:5044
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3920
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD54167c79312b27c8002cbeea023fe8cb5
SHA1fda8a34c9eba906993a336d01557801a68ac6681
SHA256c3bf350627b842bed55e6a72ab53da15719b4f33c267a6a132cb99ff6afe3cd8
SHA5124815746e5e30cbef626228601f957d993752a3d45130feeda335690b7d21ed3d6d6a6dc0ad68a1d5ba584b05791053a4fc7e9ac7b64abd47feaa8d3b919353bb
-
Filesize
46KB
MD55fd73821f3f097d177009d88dfd33605
SHA11bacbbfe59727fa26ffa261fb8002f4b70a7e653
SHA256a6ecce54116936ca27d4be9797e32bf2f3cfc7e41519a23032992970fbd9d3ba
SHA5121769a6dfaa30aac5997f8d37f1df3ed4aab5bbee2abbcb30bde4230afed02e1ea9e81720b60f093a4c7fb15e22ee15a3a71ff7b84f052f6759640734af976e02
-
Filesize
3KB
MD530e44afb16319a2d48f33caefacbcd17
SHA172afa813f54c784d2337bdde37b3b19a10384b61
SHA2567c9050777e287cb29082381178f8aac0d59f7b2f55eb7acf21d6ed0fb9591eac
SHA51284d09bfbef9f29f10431f2a7fbd8a94fb0603e70eef3cc9f53ec68ba8f5ecd83113c7f2ea901123871c1872c180233980bdd8e6d110310bc40347ac1090560f5
-
Filesize
3.1MB
MD5d4a9383fda9f356a0d2edf77118b20be
SHA1ff1b4583b52f388f0fd0831b503abd9a85465529
SHA256c9f122cb7efba9528f5b9ec06f47dbc20919b694fc9ed5d8084f34fbeea7e297
SHA51230d9388db8d33be3f2e04375677d6c238d827c6a6aba362946a047631b74b45431e3ca3d82fad860ffdc06e4cb38bb4e98d1224c86da898416bf37c551e7454d
-
Filesize
2.0MB
MD5034bbdbe51110bd38885e0ad614a67d2
SHA1f68917c1d9a4c887c64d199643165ca4399899ed
SHA25688db4a55d8f8fb4e85baa066f71c3d9e70a49388ccc42ed46c6fbcb5d1e9d1fd
SHA51255711641feee41bcb1a57904cd20c10cd8beecb5ac3dc5bd5111b707fca2682c8c2bca64106dc6ef77a8e374fe72edc0bdec3353799c5d0afe45373d6173f23e