Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
d6b4d656a00fd7aae69fb558bb5dba30N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d6b4d656a00fd7aae69fb558bb5dba30N.exe
Resource
win10v2004-20240802-en
General
-
Target
d6b4d656a00fd7aae69fb558bb5dba30N.exe
-
Size
80KB
-
MD5
d6b4d656a00fd7aae69fb558bb5dba30
-
SHA1
587b128fa375a51082e249dd8ab6d7a64c59eecd
-
SHA256
ba4e9f1436254a4e3ee987d63fff0d137dc939d8575f1d5a2f7be7d8d3d86258
-
SHA512
35434db98d31164b4fdc7867798d75e4ca4b2546ede0b06350d65ab07c82f7290691889644d3cdb5c35114467a349378ff4a81bfa6f856d1e068618ecdb964f9
-
SSDEEP
768:eLxqBt1sJw5pVNUP1/kvtbWcpmCKXTak3QIXjLZJ2bXfqQKMq+gjTAfu/MB8QKp2:Bteq0QIXJJyXEv/MBK67lALNtnd1PBwN
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" umtuxean-ecixú±¬± -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\¯ñäæŒñäæŒñäæŒñäæŒùñäæ¬ñäæ¬ùñäæ¬ñäæ¬ùñäæŒñäæŒùñäæŒñäæŒñäæŒñäæŒñäæ¬ñä欩\‡ ¡¶„µ ¼ = "C:\\Windows\\system32\\iffeaxeam-afootú±¬±" umtuxean-ecixú±¬± Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\¯ñäæŒñäæŒñäæŒñäæŒùñäæ¬ñäæ¬ùñäæ¬ñäæ¬ùñäæŒñäæŒùñäæŒñäæŒñäæŒñäæŒñäæ¬ñä欩 umtuxean-ecixú±¬± Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\¯ñäæŒñäæŒñäæŒñäæŒùñäæ¬ñäæ¬ùñäæ¬ñäæ¬ùñäæŒñäæŒùñäæŒñäæŒñäæŒñäæŒñäæ¬ñä欩\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901 = "a" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\¯ñäæŒñäæŒñäæŒñäæŒùñäæ¬ñäæ¬ùñäæ¬ñäæ¬ùñäæŒñäæŒùñäæŒñäæŒñäæŒñäæŒñäæ¬ñä欩\§º§ µ¸¸±° = "1" umtuxean-ecixú±¬± -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe umtuxean-ecixú±¬± Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" umtuxean-ecixú±¬± Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\±¶¡³³±¦ = "C:\\Windows\\system32\\urkemamú±¬±" umtuxean-ecixú±¬± -
Executes dropped EXE 2 IoCs
pid Process 1700 umtuxean-ecixú±¬± 3948 umtuxean-ecixú±¬± -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" umtuxean-ecixú±¬± -
description ioc Process Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\±¶¡³³±¦ umtuxean-ecixú±¬± -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\umtuxean-ecixú±¬± d6b4d656a00fd7aae69fb558bb5dba30N.exe File opened for modification C:\Windows\SysWOW64\urkemamú±¬± umtuxean-ecixú±¬± File created C:\Windows\SysWOW64\iffeaxeam-afootú±¬± umtuxean-ecixú±¬± File created C:\Windows\SysWOW64\ofbotitú°¸¸ umtuxean-ecixú±¬± File opened for modification C:\Windows\SysWOW64\umtuxean-ecixú±¬± d6b4d656a00fd7aae69fb558bb5dba30N.exe File created C:\Windows\SysWOW64\urkemamú±¬± umtuxean-ecixú±¬± File opened for modification C:\Windows\SysWOW64\iffeaxeam-afootú±¬± umtuxean-ecixú±¬± File opened for modification C:\Windows\SysWOW64\ofbotitú°¸¸ umtuxean-ecixú±¬± File opened for modification C:\Windows\SysWOW64\umtuxean-ecixú±¬± umtuxean-ecixú±¬± -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umtuxean-ecixú±¬± Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6b4d656a00fd7aae69fb558bb5dba30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umtuxean-ecixú±¬± -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 3948 umtuxean-ecixú±¬± 3948 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± 1700 umtuxean-ecixú±¬± -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1700 2988 d6b4d656a00fd7aae69fb558bb5dba30N.exe 85 PID 2988 wrote to memory of 1700 2988 d6b4d656a00fd7aae69fb558bb5dba30N.exe 85 PID 2988 wrote to memory of 1700 2988 d6b4d656a00fd7aae69fb558bb5dba30N.exe 85 PID 1700 wrote to memory of 3948 1700 umtuxean-ecixú±¬± 86 PID 1700 wrote to memory of 3948 1700 umtuxean-ecixú±¬± 86 PID 1700 wrote to memory of 3948 1700 umtuxean-ecixú±¬± 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6b4d656a00fd7aae69fb558bb5dba30N.exe"C:\Users\Admin\AppData\Local\Temp\d6b4d656a00fd7aae69fb558bb5dba30N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\umtuxean-ecixú±¬±"C:\Windows\system32\umtuxean-ecixú±¬±"2⤵
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Windows security modification
- Indicator Removal: Clear Persistence
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\umtuxean-ecixú±¬±ùù¿çç¤3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5a094b29525b8337fadc3dbe713273108
SHA13c369e5e84fbd48e599ac72de8a8de16db9f2ad3
SHA2563b23e7bb1b9dbe58a91c81770415c0309ddf4192ccafb4a0f149dfcc3abc8c80
SHA512e1af413962169deed9bff8fd8bcaa84ccc51b0111c693c2f0ec02f9e0150ae38bd38b709e210a2636bb74b27fbc7a1172223025c304d6383683a0a44a738d9e7
-
Filesize
5KB
MD548c45e05569f9a5665d082fbdc116c14
SHA1e491ab1327b88312fc6d0535621b6de733c8efb5
SHA2567e916f847bb5de3e09b36bd527e09ed656df13296bdcd9924185bcccde7dbe4c
SHA512e1cc47e185831dc6c40372efc227f299964f262c641b790d31f0fe452a5bc70a4946c689913504c64790833c131d40c01fcd9ff3a148636be9f502959f7cc49c
-
Filesize
80KB
MD5d6b4d656a00fd7aae69fb558bb5dba30
SHA1587b128fa375a51082e249dd8ab6d7a64c59eecd
SHA256ba4e9f1436254a4e3ee987d63fff0d137dc939d8575f1d5a2f7be7d8d3d86258
SHA51235434db98d31164b4fdc7867798d75e4ca4b2546ede0b06350d65ab07c82f7290691889644d3cdb5c35114467a349378ff4a81bfa6f856d1e068618ecdb964f9
-
Filesize
83KB
MD526b2f6ad9f90f99835f3ebd8ab908a7b
SHA1643f2a7566a21130c89bff0b292d515fd93b5870
SHA256d3b7b7f272184d088bde258089d38ac5f6e3b9ab1f3fe53a6087266c9ad9d1ef
SHA512c3b07f7b8a11a8d2dab1ffcbacb4fcef58d3fe8e13e2fe029a89645f82ab3332cffd87b23fd70c7f7fec8fc8bd02c350b159223e7daae3ca02521a5334fd6870