Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 00:18
Behavioral task
behavioral1
Sample
8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe
Resource
win10v2004-20240802-en
General
-
Target
8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe
-
Size
1.8MB
-
MD5
391fe889af6711d9faf1cbc0a85e44dc
-
SHA1
c8545a53ef950be2bb3b2b82859e908f527ce8cb
-
SHA256
8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f
-
SHA512
0c95007a9286912be5647d4bb5262d7fecd74ada11245ff08d70fadeaf37cd00401843913d3364d3b8f7bef85bd6a9958db81d3158c4372b58c0fb98c32580c9
-
SSDEEP
12288:BHTVhI8jdG+sV1p0x/k9fkQ3KypwkBPKxY9XZdFh29DNDupLdXUoWxOT8oSR:tV35QOk3KWNo34nOOTq
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt2.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Windows Updater.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Updater.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe -
Executes dropped EXE 3 IoCs
pid Process 988 winupdt2.exe 3168 winupdt2.exe 4520 winupdt2.exe -
resource yara_rule behavioral2/memory/4764-0-0x0000000000400000-0x00000000005CA000-memory.dmp upx behavioral2/files/0x0007000000023469-16.dat upx behavioral2/memory/4764-28-0x0000000000400000-0x00000000005CA000-memory.dmp upx behavioral2/memory/3168-31-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-36-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-34-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4520-40-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4520-45-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4520-43-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/988-50-0x0000000000400000-0x00000000005CA000-memory.dmp upx behavioral2/memory/3168-51-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4520-52-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3168-53-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-55-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-57-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-59-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-61-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-64-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-66-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-68-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-71-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3168-73-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdt = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt2.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 988 set thread context of 3168 988 winupdt2.exe 91 PID 988 set thread context of 4520 988 winupdt2.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4064 reg.exe 208 reg.exe 3440 reg.exe 2232 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 3168 winupdt2.exe Token: SeCreateTokenPrivilege 3168 winupdt2.exe Token: SeAssignPrimaryTokenPrivilege 3168 winupdt2.exe Token: SeLockMemoryPrivilege 3168 winupdt2.exe Token: SeIncreaseQuotaPrivilege 3168 winupdt2.exe Token: SeMachineAccountPrivilege 3168 winupdt2.exe Token: SeTcbPrivilege 3168 winupdt2.exe Token: SeSecurityPrivilege 3168 winupdt2.exe Token: SeTakeOwnershipPrivilege 3168 winupdt2.exe Token: SeLoadDriverPrivilege 3168 winupdt2.exe Token: SeSystemProfilePrivilege 3168 winupdt2.exe Token: SeSystemtimePrivilege 3168 winupdt2.exe Token: SeProfSingleProcessPrivilege 3168 winupdt2.exe Token: SeIncBasePriorityPrivilege 3168 winupdt2.exe Token: SeCreatePagefilePrivilege 3168 winupdt2.exe Token: SeCreatePermanentPrivilege 3168 winupdt2.exe Token: SeBackupPrivilege 3168 winupdt2.exe Token: SeRestorePrivilege 3168 winupdt2.exe Token: SeShutdownPrivilege 3168 winupdt2.exe Token: SeDebugPrivilege 3168 winupdt2.exe Token: SeAuditPrivilege 3168 winupdt2.exe Token: SeSystemEnvironmentPrivilege 3168 winupdt2.exe Token: SeChangeNotifyPrivilege 3168 winupdt2.exe Token: SeRemoteShutdownPrivilege 3168 winupdt2.exe Token: SeUndockPrivilege 3168 winupdt2.exe Token: SeSyncAgentPrivilege 3168 winupdt2.exe Token: SeEnableDelegationPrivilege 3168 winupdt2.exe Token: SeManageVolumePrivilege 3168 winupdt2.exe Token: SeImpersonatePrivilege 3168 winupdt2.exe Token: SeCreateGlobalPrivilege 3168 winupdt2.exe Token: 31 3168 winupdt2.exe Token: 32 3168 winupdt2.exe Token: 33 3168 winupdt2.exe Token: 34 3168 winupdt2.exe Token: 35 3168 winupdt2.exe Token: SeDebugPrivilege 4520 winupdt2.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4764 8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe 988 winupdt2.exe 3168 winupdt2.exe 3168 winupdt2.exe 4520 winupdt2.exe 3168 winupdt2.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 4764 wrote to memory of 448 4764 8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe 86 PID 4764 wrote to memory of 448 4764 8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe 86 PID 4764 wrote to memory of 448 4764 8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe 86 PID 448 wrote to memory of 4364 448 cmd.exe 89 PID 448 wrote to memory of 4364 448 cmd.exe 89 PID 448 wrote to memory of 4364 448 cmd.exe 89 PID 4764 wrote to memory of 988 4764 8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe 90 PID 4764 wrote to memory of 988 4764 8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe 90 PID 4764 wrote to memory of 988 4764 8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe 90 PID 988 wrote to memory of 3168 988 winupdt2.exe 91 PID 988 wrote to memory of 3168 988 winupdt2.exe 91 PID 988 wrote to memory of 3168 988 winupdt2.exe 91 PID 988 wrote to memory of 3168 988 winupdt2.exe 91 PID 988 wrote to memory of 3168 988 winupdt2.exe 91 PID 988 wrote to memory of 3168 988 winupdt2.exe 91 PID 988 wrote to memory of 3168 988 winupdt2.exe 91 PID 988 wrote to memory of 3168 988 winupdt2.exe 91 PID 988 wrote to memory of 4520 988 winupdt2.exe 92 PID 988 wrote to memory of 4520 988 winupdt2.exe 92 PID 988 wrote to memory of 4520 988 winupdt2.exe 92 PID 988 wrote to memory of 4520 988 winupdt2.exe 92 PID 988 wrote to memory of 4520 988 winupdt2.exe 92 PID 988 wrote to memory of 4520 988 winupdt2.exe 92 PID 988 wrote to memory of 4520 988 winupdt2.exe 92 PID 988 wrote to memory of 4520 988 winupdt2.exe 92 PID 3168 wrote to memory of 912 3168 winupdt2.exe 93 PID 3168 wrote to memory of 912 3168 winupdt2.exe 93 PID 3168 wrote to memory of 912 3168 winupdt2.exe 93 PID 3168 wrote to memory of 228 3168 winupdt2.exe 94 PID 3168 wrote to memory of 228 3168 winupdt2.exe 94 PID 3168 wrote to memory of 228 3168 winupdt2.exe 94 PID 3168 wrote to memory of 3380 3168 winupdt2.exe 95 PID 3168 wrote to memory of 3380 3168 winupdt2.exe 95 PID 3168 wrote to memory of 3380 3168 winupdt2.exe 95 PID 3168 wrote to memory of 1592 3168 winupdt2.exe 96 PID 3168 wrote to memory of 1592 3168 winupdt2.exe 96 PID 3168 wrote to memory of 1592 3168 winupdt2.exe 96 PID 3380 wrote to memory of 3440 3380 cmd.exe 101 PID 3380 wrote to memory of 3440 3380 cmd.exe 101 PID 3380 wrote to memory of 3440 3380 cmd.exe 101 PID 228 wrote to memory of 2232 228 cmd.exe 102 PID 228 wrote to memory of 2232 228 cmd.exe 102 PID 228 wrote to memory of 2232 228 cmd.exe 102 PID 912 wrote to memory of 4064 912 cmd.exe 103 PID 912 wrote to memory of 4064 912 cmd.exe 103 PID 912 wrote to memory of 4064 912 cmd.exe 103 PID 1592 wrote to memory of 208 1592 cmd.exe 104 PID 1592 wrote to memory of 208 1592 cmd.exe 104 PID 1592 wrote to memory of 208 1592 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe"C:\Users\Admin\AppData\Local\Temp\8806c904bcfd4a553d45ca8d901b0c64f2979520e627c8eca03c47f16cb63e2f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KJESn.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinUpdt" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4364
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2232
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:208
-
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4520
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD549bb161b07149b1bda99901c71d98b1f
SHA1e5e3b389c09d551bd8f3a4cf71ee30e566fdf6e2
SHA256734c4f48449a118dbdfbbe4971ecf112b26b2b45d1889678c01dea98eb5767d8
SHA512da09a2af9b7f9528916ab719ed97ee8b61179bba92016eaed64b3e7d6bf08646801aeeb0eb332bdde175eb64b48106f7cf2fe2bf01ea6128753e4ce1d48707be
-
Filesize
1.8MB
MD5cf14a101c8e0ffd8844f60a6965d798a
SHA14095818b79f4e1f6272939059ada76479978e6ce
SHA256222cfe6453df02cf00d7099402207981957fa005e938ea238c23f42f9e26d6c1
SHA5125c462e83d84194978a5821035161f3bace1cc2abfb4043524bb3e51ee927d63809887d75b5161ad1490d0c98ee91185dd01f2a9ab34ecace18a9cfdcae7020b7