Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 19:35
Static task
static1
Behavioral task
behavioral1
Sample
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe
Resource
win11-20240802-en
General
-
Target
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe
-
Size
3.2MB
-
MD5
ecf0a7dfe54de2c55c42b8c8c34f4a3f
-
SHA1
393d36cd7cf9536ebc8abe26c51553c57eb4e38c
-
SHA256
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676
-
SHA512
4e51da10f9c75b20776aba885c863d622b4eee8b1c023e909151ed893b1f78812b1aaa1c26c10a3050f8aaccfe148dd9bcc27100e27f9f34eedc5c581573c7db
-
SSDEEP
49152:3EF4FiPD6m4ivio49aPVYYZJbEU5Jn0KRYElP1Dn9S/FPc63qZ1sRrT:EairJ
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2180 created 3500 2180 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe 56 -
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1620-44-0x00000000067A0000-0x0000000006B9E000-memory.dmp loaderbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url SmartScreen Defender Windows.exe -
Executes dropped EXE 1 IoCs
pid Process 1620 SmartScreen Defender Windows.exe -
Loads dropped DLL 1 IoCs
pid Process 2180 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\smartScreen Defender Windows.exe" SmartScreen Defender Windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Defender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe" b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SmartScreen Defender Windows.exe -
Kills process with taskkill 1 IoCs
pid Process 4624 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4992 powershell.exe 4992 powershell.exe 4992 powershell.exe 1620 SmartScreen Defender Windows.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2180 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 2180 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4992 powershell.exe Token: SeDebugPrivilege 4624 taskkill.exe Token: SeDebugPrivilege 1620 SmartScreen Defender Windows.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4992 2180 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe 86 PID 2180 wrote to memory of 4992 2180 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe 86 PID 2180 wrote to memory of 700 2180 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe 88 PID 2180 wrote to memory of 700 2180 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe 88 PID 700 wrote to memory of 4624 700 cmd.exe 90 PID 700 wrote to memory of 4624 700 cmd.exe 90 PID 2180 wrote to memory of 5104 2180 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe 92 PID 2180 wrote to memory of 5104 2180 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe 92 PID 5104 wrote to memory of 2640 5104 csc.exe 94 PID 5104 wrote to memory of 2640 5104 csc.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe"C:\Users\Admin\AppData\Local\Temp\b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -encodedCommand RwBlAHQALQBQAHIAbwBjAGUAcwBzACAALQBOAGEAbQBlACAAJwBlAHgAcABsAG8AcgBlAHIAJwAgAHwAIABTAGUAbABlAGMAdAAtAE8AYgBqAGUAYwB0ACAALQBFAHgAcABhAG4AZABQAHIAbwBwAGUAcgB0AHkAIABJAGQA3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /IM "SmartScreen Defender Windows.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\system32\taskkill.exetaskkill /F /IM "SmartScreen Defender Windows.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:"C:\Users\Admin\AppData\Local\Temp\SmartScreen Defender Windows.exe" /target:winexe /platform:x86 "C:\Users\Admin\AppData\Local\Temp\mUgFnLy.tmp" "C:\Users\Admin\AppData\Local\Temp\rWxlfAf.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBC6A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC632F7368E06A4F03AAB594C6BE19713E.TMP"4⤵PID:2640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SmartScreen Defender Windows.exe"C:\Windows\System32\SmartScreen Defender Windows.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59ddf692b0959a7a8fc1f15f2160b08bf
SHA19ea90a0724b37a0fdcb0722446ca0184a2889a3e
SHA2563055e63643bfc9b4bf83ab189601695cddb23dfbf9f3381e07afa1e524f85c93
SHA5129547a9c33434c6dc3446b17dbc66f3af3b406ec2c17da6654b295150cfa676d248aa9105d0e26dfb6c1cba57d31e4ce90724d03bb70bf9d0579a9c946436c5bf
-
Filesize
5KB
MD54c84cb954daa1e92a1f9b15651be7456
SHA10b89e1fc670b2c4a88f17a60cbc38994aea0210c
SHA2562bd6537672fb689e48f531ef107e58c43e4f432a6038dd1fd238565d44f13c47
SHA512f1890fd6376846bd2fb94965a08b19799808e21a58f932f21706867e2a42addf6c0e6382a11108b910e73e75bb848d777621ef6142de0064137f3d8b50f2f816
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.9MB
MD547ccb0e28d73f695c5d5266ffbb300ec
SHA163e6167944df951ad2d279d0b64e37bf2f604c07
SHA25612d1bac765448db638adc8327de1101e5e2eb5829b8da7edd5b216a45c717eec
SHA5128219f5cfd7a6bf28b8880529240e0b49a2fd78c0c5227cf6471cbf153fd32b2664ae31396d4b6897c2686e5b7826b9f9dad434e82e7032c7a5aa3ee9b2771145
-
Filesize
1KB
MD50ca43bb14dfd260c186da0e08d4bc3ce
SHA13487e73968a1f021e5da09bdfbbef9fdf4d76fbe
SHA2560f97429a0a458a058c14b006da7cd6861e3a9b02a3c55ad2612a835c63ee345d
SHA512220ebd41cf44713e89d9f860cbe7da49275b276f7ab3c10c540d76f34474ea156e35c2b77624752ddec5ab58a06c4050f3de21ac5342e68e94bd10c108eb2852
-
Filesize
346B
MD5c5dbc6417d134e6aea5e58ad55bf33ba
SHA191699068965ac21ff6cf80edd18a3576c6aacc98
SHA256f96c695e5b61703ed2f4ef9bc3917023adf3bc30fad044ceea47fe9b9a8a3894
SHA512f0a6e724a8d53e35e04b5004d99ff466682881b63fd7f1ea348c3a7fe681d8bdaee090664570d0ab73c7dda87bf7d7c53eadb0284360f6b8e4943d8acd7860eb
-
Filesize
607B
MD59154be5d772ad1d5449465a279fde323
SHA14d56f8c6dc5d24bf34e456692eb215a7b12bc2f0
SHA256eb92b246dd427015cf6ea53c0394d5a9cae339d080dd25ebac05de646b9fa480
SHA5123bb62fe5a57172f3ff85c143dac99546eb0883cbd1dcaa9d557d019486dda3db89e4b9aa86218277feb1cc374aec686d448ea6dae079aca5e33d2659034db625