Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
8c984e1a71dde965ce148fd4d8d8ee80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8c984e1a71dde965ce148fd4d8d8ee80N.exe
Resource
win10v2004-20240802-en
General
-
Target
8c984e1a71dde965ce148fd4d8d8ee80N.exe
-
Size
84KB
-
MD5
8c984e1a71dde965ce148fd4d8d8ee80
-
SHA1
fad22a3467ec0919990b30ffc8ca9c38c5aa4b1a
-
SHA256
a8576d89bb3df2b6b4efe6337a4427adf16843765c3df11796890c06fcbb2a0d
-
SHA512
50f6623b87f01d406be27f75b3ff0fb9eb964562838e2accefd0779ac210167378c5b743cb4c2a4caecdca7aa9286e028de5ea223f404ba3a65c7573f9c4202e
-
SSDEEP
1536:1clIGFNMi+hJUneHoGTvvv4V9hqdhbtgS:+RMi+fUnCTvvv4V9hEhbCS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 8c984e1a71dde965ce148fd4d8d8ee80N.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 4 IoCs
pid Process 4500 lsass.exe 4328 lsass.exe 2720 lsass.exe 1036 lsass.exe -
resource yara_rule behavioral2/memory/4108-2-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4108-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4108-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4108-37-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4328-51-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4108-56-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4328-86-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audio Driver = "C:\\Users\\Admin\\AppData\\Roaming\\system\\lsass.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4608 set thread context of 4108 4608 8c984e1a71dde965ce148fd4d8d8ee80N.exe 88 PID 4500 set thread context of 4328 4500 lsass.exe 97 PID 4500 set thread context of 2720 4500 lsass.exe 98 PID 2720 set thread context of 1036 2720 lsass.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c984e1a71dde965ce148fd4d8d8ee80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c984e1a71dde965ce148fd4d8d8ee80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe Token: SeDebugPrivilege 4328 lsass.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4608 8c984e1a71dde965ce148fd4d8d8ee80N.exe 4108 8c984e1a71dde965ce148fd4d8d8ee80N.exe 4500 lsass.exe 4328 lsass.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4608 wrote to memory of 4108 4608 8c984e1a71dde965ce148fd4d8d8ee80N.exe 88 PID 4608 wrote to memory of 4108 4608 8c984e1a71dde965ce148fd4d8d8ee80N.exe 88 PID 4608 wrote to memory of 4108 4608 8c984e1a71dde965ce148fd4d8d8ee80N.exe 88 PID 4608 wrote to memory of 4108 4608 8c984e1a71dde965ce148fd4d8d8ee80N.exe 88 PID 4608 wrote to memory of 4108 4608 8c984e1a71dde965ce148fd4d8d8ee80N.exe 88 PID 4608 wrote to memory of 4108 4608 8c984e1a71dde965ce148fd4d8d8ee80N.exe 88 PID 4608 wrote to memory of 4108 4608 8c984e1a71dde965ce148fd4d8d8ee80N.exe 88 PID 4608 wrote to memory of 4108 4608 8c984e1a71dde965ce148fd4d8d8ee80N.exe 88 PID 4108 wrote to memory of 740 4108 8c984e1a71dde965ce148fd4d8d8ee80N.exe 89 PID 4108 wrote to memory of 740 4108 8c984e1a71dde965ce148fd4d8d8ee80N.exe 89 PID 4108 wrote to memory of 740 4108 8c984e1a71dde965ce148fd4d8d8ee80N.exe 89 PID 740 wrote to memory of 3556 740 cmd.exe 92 PID 740 wrote to memory of 3556 740 cmd.exe 92 PID 740 wrote to memory of 3556 740 cmd.exe 92 PID 4108 wrote to memory of 4500 4108 8c984e1a71dde965ce148fd4d8d8ee80N.exe 93 PID 4108 wrote to memory of 4500 4108 8c984e1a71dde965ce148fd4d8d8ee80N.exe 93 PID 4108 wrote to memory of 4500 4108 8c984e1a71dde965ce148fd4d8d8ee80N.exe 93 PID 4500 wrote to memory of 4328 4500 lsass.exe 97 PID 4500 wrote to memory of 4328 4500 lsass.exe 97 PID 4500 wrote to memory of 4328 4500 lsass.exe 97 PID 4500 wrote to memory of 4328 4500 lsass.exe 97 PID 4500 wrote to memory of 4328 4500 lsass.exe 97 PID 4500 wrote to memory of 4328 4500 lsass.exe 97 PID 4500 wrote to memory of 4328 4500 lsass.exe 97 PID 4500 wrote to memory of 4328 4500 lsass.exe 97 PID 4500 wrote to memory of 2720 4500 lsass.exe 98 PID 4500 wrote to memory of 2720 4500 lsass.exe 98 PID 4500 wrote to memory of 2720 4500 lsass.exe 98 PID 4500 wrote to memory of 2720 4500 lsass.exe 98 PID 4500 wrote to memory of 2720 4500 lsass.exe 98 PID 4500 wrote to memory of 2720 4500 lsass.exe 98 PID 4500 wrote to memory of 2720 4500 lsass.exe 98 PID 2720 wrote to memory of 1036 2720 lsass.exe 99 PID 2720 wrote to memory of 1036 2720 lsass.exe 99 PID 2720 wrote to memory of 1036 2720 lsass.exe 99 PID 2720 wrote to memory of 1036 2720 lsass.exe 99 PID 2720 wrote to memory of 1036 2720 lsass.exe 99 PID 2720 wrote to memory of 1036 2720 lsass.exe 99 PID 2720 wrote to memory of 1036 2720 lsass.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c984e1a71dde965ce148fd4d8d8ee80N.exe"C:\Users\Admin\AppData\Local\Temp\8c984e1a71dde965ce148fd4d8d8ee80N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\8c984e1a71dde965ce148fd4d8d8ee80N.exe"C:\Users\Admin\AppData\Local\Temp\8c984e1a71dde965ce148fd4d8d8ee80N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OBNVN.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Audio Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\system\lsass.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3556
-
-
-
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Roaming\system\lsass.exe"C:\Users\Admin\AppData\Roaming\system\lsass.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1036
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314B
MD517c840663a9011d5868ccc5550a4a495
SHA1800ebfaed48336b0f6df05304bab0009d0239e2b
SHA25644267062edc55d677a2cdc546ae00697dfcb1274959a5583b526c350ffe63a21
SHA512e9794dce1a18d12b915ca7046494b43a73427f389d08592b38ae934756abc0b77c4315f85c9ae63039ecad6f43117961098ccff6dee8781d36f3da33ca1d04c4
-
Filesize
146B
MD5c8cba0a9d4d5600b5f53c4c0681d1115
SHA10e5348e210ca70b2b0ffdc3ff7e6f611716df80c
SHA256ca2b63f6d7bf17480415ae93e115bf9f9699335e84e62719eefdbcc5a78bd2e1
SHA512a2ad6eb5ae2f6d57ca15363ac2f0c57ca3580474e94b9c010750948814cf4d5ffa0c3e7ef44634a3593da23f56011703ff220a3d7780f6f01785bf3b6676ced0
-
Filesize
84KB
MD598755f554285f0fe3e8bc4cc6e3d5592
SHA191cbaa2720955c477ba45492342429496736e5e1
SHA256cbe36653ff3e1ddf26e5fc5725314cdb5b602198817a0cfa72e62f505c448faa
SHA512b950e59d6b631785b1794b9e40d0c2ab6a8ae7cee857cc7e76f1ed9328c1d77c80c9201739feffd35f2e9ab0c712873dd76fa36d5877affd75ae61c0361e3d45