Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-08-2024 19:35
Static task
static1
Behavioral task
behavioral1
Sample
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe
Resource
win11-20240802-en
General
-
Target
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe
-
Size
3.2MB
-
MD5
ecf0a7dfe54de2c55c42b8c8c34f4a3f
-
SHA1
393d36cd7cf9536ebc8abe26c51553c57eb4e38c
-
SHA256
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676
-
SHA512
4e51da10f9c75b20776aba885c863d622b4eee8b1c023e909151ed893b1f78812b1aaa1c26c10a3050f8aaccfe148dd9bcc27100e27f9f34eedc5c581573c7db
-
SSDEEP
49152:3EF4FiPD6m4ivio49aPVYYZJbEU5Jn0KRYElP1Dn9S/FPc63qZ1sRrT:EairJ
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exedescription pid process target process PID 3552 created 3268 3552 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe Explorer.EXE -
LoaderBot executable 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2932-48-0x00000000068F0000-0x0000000006CEE000-memory.dmp loaderbot -
Drops startup file 1 IoCs
Processes:
SmartScreen Defender Windows.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url SmartScreen Defender Windows.exe -
Executes dropped EXE 1 IoCs
Processes:
SmartScreen Defender Windows.exepid process 2932 SmartScreen Defender Windows.exe -
Loads dropped DLL 1 IoCs
Processes:
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exepid process 3552 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exeSmartScreen Defender Windows.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Defender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe" b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe Set value (str) \REGISTRY\USER\S-1-5-21-242286936-336880687-2152680090-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\smartScreen Defender Windows.exe" SmartScreen Defender Windows.exe -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
SmartScreen Defender Windows.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SmartScreen Defender Windows.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1544 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeSmartScreen Defender Windows.exepid process 560 powershell.exe 560 powershell.exe 560 powershell.exe 2932 SmartScreen Defender Windows.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exepid process 3552 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
Processes:
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exepid process 3552 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exetaskkill.exeSmartScreen Defender Windows.exedescription pid process Token: SeDebugPrivilege 560 powershell.exe Token: SeDebugPrivilege 1544 taskkill.exe Token: SeDebugPrivilege 2932 SmartScreen Defender Windows.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.execmd.execsc.exedescription pid process target process PID 3552 wrote to memory of 560 3552 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe powershell.exe PID 3552 wrote to memory of 560 3552 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe powershell.exe PID 3552 wrote to memory of 4968 3552 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe cmd.exe PID 3552 wrote to memory of 4968 3552 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe cmd.exe PID 4968 wrote to memory of 1544 4968 cmd.exe taskkill.exe PID 4968 wrote to memory of 1544 4968 cmd.exe taskkill.exe PID 3552 wrote to memory of 3012 3552 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe csc.exe PID 3552 wrote to memory of 3012 3552 b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe csc.exe PID 3012 wrote to memory of 3520 3012 csc.exe cvtres.exe PID 3012 wrote to memory of 3520 3012 csc.exe cvtres.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe"C:\Users\Admin\AppData\Local\Temp\b1ccda9f7ba76b222d9387f6ee8cbbd3222af3dc3723a247c6e80cb0a5626676.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -encodedCommand RwBlAHQALQBQAHIAbwBjAGUAcwBzACAALQBOAGEAbQBlACAAJwBlAHgAcABsAG8AcgBlAHIAJwAgAHwAIABTAGUAbABlAGMAdAAtAE8AYgBqAGUAYwB0ACAALQBFAHgAcABhAG4AZABQAHIAbwBwAGUAcgB0AHkAIABJAGQA3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\SYSTEM32\cmd.execmd /C taskkill /F /IM "SmartScreen Defender Windows.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\system32\taskkill.exetaskkill /F /IM "SmartScreen Defender Windows.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:"C:\Users\Admin\AppData\Local\Temp\SmartScreen Defender Windows.exe" /target:winexe /platform:x86 "C:\Users\Admin\AppData\Local\Temp\mUgFnLy.tmp" "C:\Users\Admin\AppData\Local\Temp\rWxlfAf.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAC7C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFED26F5FCD444C9BA0A8A688949BE8A9.TMP"4⤵PID:3520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SmartScreen Defender Windows.exe"C:\Windows\System32\SmartScreen Defender Windows.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52142558d7fa251d04bbd8f06e916bea3
SHA1ca8aa7d287c376b7a02e10087018238feac3f5b2
SHA2567ce42fea9d4764b29a1d504097160b024a026d80490d2197ca2c95610a7fed68
SHA51244ffd636af6204fca4f696558e059895e94d72d6eaeda0837fb7cc6a2e8bcba02978f94fca76fad53545bd666fa874caed2a4523057f2c5a62faf6da1541255e
-
Filesize
5KB
MD5f64c000823f7aee4abcbc2b285dbd6c7
SHA1b63af12ccae95d49c93793fd493106b16df76c33
SHA256b8ec4d2b82e71093de4004831b486b0d122c5c8ea89c78cfb54c1a0c68428a2e
SHA512560fd32cc696f26bc74b2c032bd5b546423b2900cf736da44f35774816faa4968b4ae788292b40d3b3befe13d4ff046681822f987950d37c46f0216f125b5ce6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD59983a1154c41a5226112ecc8d0cece39
SHA148cfebe21bec4097ac0956d17302b205a1d5e490
SHA2566c10d7244997ea10ec016d7e4d32dba96107ba655794ce0bda44375a80d4f3aa
SHA5123a10518d574a9e81079553d3653f5ca629128232bc0b00f4beb49b9a8843994179c0dea7095c2b0b4399c9fc7a99795f9bb45193e608f3f8682821f2ae88f0e1
-
Filesize
1KB
MD50ca43bb14dfd260c186da0e08d4bc3ce
SHA13487e73968a1f021e5da09bdfbbef9fdf4d76fbe
SHA2560f97429a0a458a058c14b006da7cd6861e3a9b02a3c55ad2612a835c63ee345d
SHA512220ebd41cf44713e89d9f860cbe7da49275b276f7ab3c10c540d76f34474ea156e35c2b77624752ddec5ab58a06c4050f3de21ac5342e68e94bd10c108eb2852
-
Filesize
346B
MD5c5dbc6417d134e6aea5e58ad55bf33ba
SHA191699068965ac21ff6cf80edd18a3576c6aacc98
SHA256f96c695e5b61703ed2f4ef9bc3917023adf3bc30fad044ceea47fe9b9a8a3894
SHA512f0a6e724a8d53e35e04b5004d99ff466682881b63fd7f1ea348c3a7fe681d8bdaee090664570d0ab73c7dda87bf7d7c53eadb0284360f6b8e4943d8acd7860eb
-
Filesize
607B
MD59154be5d772ad1d5449465a279fde323
SHA14d56f8c6dc5d24bf34e456692eb215a7b12bc2f0
SHA256eb92b246dd427015cf6ea53c0394d5a9cae339d080dd25ebac05de646b9fa480
SHA5123bb62fe5a57172f3ff85c143dac99546eb0883cbd1dcaa9d557d019486dda3db89e4b9aa86218277feb1cc374aec686d448ea6dae079aca5e33d2659034db625