Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 13:06

General

  • Target

    ac4baaddcbc97d54ac19935a33953c40N.exe

  • Size

    803KB

  • MD5

    ac4baaddcbc97d54ac19935a33953c40

  • SHA1

    7975be41aa93aae49b68964c2e9d002e43508cae

  • SHA256

    91a4293069a3255aa4dc5e992914a6c8da11d9fa79f50017fa234c9a7189fc07

  • SHA512

    0d82a39491ebd1eb09405b1f2b4a02efacd0771350d9612359a5e87f3e26ab75beee57c0a4dccabe2b542ee6f2208362f3565d4fc8e59841afc3bac1208ce0fe

  • SSDEEP

    12288:PFUNDaT8XFrMlrJEeAXre7Q50jCWFLAbkETosibqg/di4CCL45W5:PFOaSol4re7Q50+FIETosibqg/di4r/

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac4baaddcbc97d54ac19935a33953c40N.exe
    "C:\Users\Admin\AppData\Local\Temp\ac4baaddcbc97d54ac19935a33953c40N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2492
    • \??\c:\users\admin\appdata\local\temp\ac4baaddcbc97d54ac19935a33953c40n.exe 
      c:\users\admin\appdata\local\temp\ac4baaddcbc97d54ac19935a33953c40n.exe 
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Windows\SysWOW64\netsh.exe
        netsh int tcp show supplemental
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:5012
      • C:\Windows\SYSTEM32\netsh.exe
        netsh int ip show interfaces
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:2472
      • C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
        PowerShell.exe Get-NetAdapterLso -Name '*'
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4592
      • C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
        PowerShell.exe Get-NetAdapterChecksumOffload '*'
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4960
      • C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
        PowerShell.exe Get-NetTCPSetting -SettingName internet
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3228
      • C:\Windows\SYSTEM32\netsh.exe
        netsh int tcp show global
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:3672
      • C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
        PowerShell.exe Get-NetOffloadGlobalSetting
        3⤵
        • Command and Scripting Interpreter: PowerShell
        PID:2320
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4252
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3804
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:364
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1216
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\PowerShell.exe.log

    Filesize

    3KB

    MD5

    661739d384d9dfd807a089721202900b

    SHA1

    5b2c5d6a7122b4ce849dc98e79a7713038feac55

    SHA256

    70c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf

    SHA512

    81b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    74bf150c6cd6428750ca51cae773465c

    SHA1

    ce58ffa3cfdbc55208dd790b445c976180b0c9a1

    SHA256

    90f99570f6fdf26e6d67470a06e2cef75acdda1be27d949a288733b48e8b3ca1

    SHA512

    42ddb923999851b4a030d3d261e01121657cb73673c69732f116f155053a0ad6392c42925ce7010e6a66f00a9b2e73e2aaa965c32c9dfcaee7b2246d891bbbb6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    64c0d14e2ba1e84b59d349717a430e67

    SHA1

    d43b54828c42a9a8a04cb7a66954a34de87a8833

    SHA256

    8db60ce678778f57d4e54fc58d3dc56ea48aca512452d72dd4e63f4de631997c

    SHA512

    b90f0546df85c520d324f5f0a3564442acda37d8f375b66bf42d389c085b3922a4ddbe6e847053a18d40507729f0d6ff6ffbba0a14d1cac1ba28f86b25f1a50f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    92885860b51a7c49b97252cb584360fc

    SHA1

    b021774cdf941088e7741cc67c278499d3a554af

    SHA256

    771c7c3beb2cc93098bc881cc52f296c0da132d4133f265476b5f72a99a00f29

    SHA512

    dab13e93044f61e246e9402403db22ec65d86581787c405fe4c8453b8864bfa5e9ea02149f1b5bc13bbf2a98e37b27af4eefea2adaa974afea5e1659b0fe4bb4

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iwjww1yv.cav.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\ac4baaddcbc97d54ac19935a33953c40n.exe 

    Filesize

    668KB

    MD5

    c665254f676817f92cb429af9ac9e5ff

    SHA1

    9ffd356e03afe5b3ff3d071052d4de69164159c1

    SHA256

    fe66dd246b41485f8317435364c9c435254ddbaee23962003d2301731d6e04a4

    SHA512

    7dc61e86dfc45d41bda3c703f109d9d2f2d9954ed51b21719c58d21d635543c38fc4422ad24caa1187e55713bd4411198ced03e66ee45379aac6c780b57d05d3

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    a4cb9610f3a58f5fbfb8dc42c69bfae0

    SHA1

    9b5816719881afd13c7d037f1931121a4faaef9a

    SHA256

    2df2e25c37dcd28f48db9f46c877402bbb47a378f889d76bd02f26c58dd926cf

    SHA512

    b94c9f848bec5953d25000ff50149715c17e02403e710eed13ab534d5bfa7c41e39a7f536813936444e0d286ff5e1b3cdf40194543363ffb0df04e9b943f7e47

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    53b7595eb646202dd0bc6084bc952fd0

    SHA1

    34d9900653729aa9a441b572fd5ed51194b64e7a

    SHA256

    341f1319eb0068d01e0dc8b682e4cdf48225e2d332d63098a95a4ef9fde8b340

    SHA512

    f8564df90f52e84b1d14e39bedc365acfa40ce641d904f9af07b6db3fa4d55b19c1d717ea59b0500cb5998481263d17f2deda78ef872874c012b2c3a6da6d0f5

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    195b023b28b0b794b23fa0e94355d3a3

    SHA1

    84858ef1d9550e56b90f08abc0952e3253b2121c

    SHA256

    811d60ba0c13821fb788671287944f71973aa6a57ce4671eb0013aac565b8312

    SHA512

    b4cfd9ed384e3cc908b787bd9714bfc21844948a7333183adae24fc5c65878238d705e64d08c10575e243652d658901e8c5b0e05515835514301b87d938602d9

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    3fa51dc5c8ae0909dd3dfc4cd2f11a51

    SHA1

    5920e0a893277897c36fcef8b26ca78445c67ded

    SHA256

    5f2835cf0956535dc70de65a9b25973dd95f7e8607c0f5cfb8a9325d18a2894b

    SHA512

    26cf7c8ce746800c348c3fd56ce58747c867adc5ffe323880565bff56d9d122e7518afdb5c1a01e249ab858e035b6626b341cf487b848c6bac92225be4821639

  • memory/364-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2492-48-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2492-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4252-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4252-13-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4592-58-0x000002043D890000-0x000002043D8B2000-memory.dmp

    Filesize

    136KB

  • memory/4596-45-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB