Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 01:39
Behavioral task
behavioral1
Sample
8d3bcdfa175392c779861c036db2a480N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d3bcdfa175392c779861c036db2a480N.exe
Resource
win10v2004-20240802-en
General
-
Target
8d3bcdfa175392c779861c036db2a480N.exe
-
Size
1.7MB
-
MD5
8d3bcdfa175392c779861c036db2a480
-
SHA1
b87bf256eb02b3f9d222f0ede72edd629591e45f
-
SHA256
d1b66c0335019a71f63c28a6523add574129507bfd8221837813baecb8dc2e06
-
SHA512
366a7d5692368b505b101539ef366e4fc574417a55edce11948f3918cbdd2a7dd365a415cb9adfe459d62b10dca50e349a8185732bee7d2bbaa550272856005d
-
SSDEEP
12288:Y6sg9q8utL6R91NNaUfViptH0D9wvT1xkZTWbq6Pknm2N5kv7Z62J5ugQ8cY47O2:YyG6RGjv7biFpVUW
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\local.exe = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt3.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 8d3bcdfa175392c779861c036db2a480N.exe -
Executes dropped EXE 3 IoCs
pid Process 1428 winupdt3.exe 2220 winupdt3.exe 3420 winupdt3.exe -
resource yara_rule behavioral2/memory/3992-0-0x0000000000400000-0x00000000005B6000-memory.dmp upx behavioral2/files/0x000a000000023422-16.dat upx behavioral2/memory/3992-30-0x0000000000400000-0x00000000005B6000-memory.dmp upx behavioral2/memory/2220-36-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-34-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-31-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3420-43-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3420-45-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3420-40-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1428-50-0x0000000000400000-0x00000000005B6000-memory.dmp upx behavioral2/memory/2220-51-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3420-52-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2220-53-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-55-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-58-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-60-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-62-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-65-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-67-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-71-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-74-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2220-76-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdt = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt3.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1428 set thread context of 2220 1428 winupdt3.exe 92 PID 1428 set thread context of 3420 1428 winupdt3.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d3bcdfa175392c779861c036db2a480N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3036 reg.exe 3960 reg.exe 2300 reg.exe 2248 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2220 winupdt3.exe Token: SeCreateTokenPrivilege 2220 winupdt3.exe Token: SeAssignPrimaryTokenPrivilege 2220 winupdt3.exe Token: SeLockMemoryPrivilege 2220 winupdt3.exe Token: SeIncreaseQuotaPrivilege 2220 winupdt3.exe Token: SeMachineAccountPrivilege 2220 winupdt3.exe Token: SeTcbPrivilege 2220 winupdt3.exe Token: SeSecurityPrivilege 2220 winupdt3.exe Token: SeTakeOwnershipPrivilege 2220 winupdt3.exe Token: SeLoadDriverPrivilege 2220 winupdt3.exe Token: SeSystemProfilePrivilege 2220 winupdt3.exe Token: SeSystemtimePrivilege 2220 winupdt3.exe Token: SeProfSingleProcessPrivilege 2220 winupdt3.exe Token: SeIncBasePriorityPrivilege 2220 winupdt3.exe Token: SeCreatePagefilePrivilege 2220 winupdt3.exe Token: SeCreatePermanentPrivilege 2220 winupdt3.exe Token: SeBackupPrivilege 2220 winupdt3.exe Token: SeRestorePrivilege 2220 winupdt3.exe Token: SeShutdownPrivilege 2220 winupdt3.exe Token: SeDebugPrivilege 2220 winupdt3.exe Token: SeAuditPrivilege 2220 winupdt3.exe Token: SeSystemEnvironmentPrivilege 2220 winupdt3.exe Token: SeChangeNotifyPrivilege 2220 winupdt3.exe Token: SeRemoteShutdownPrivilege 2220 winupdt3.exe Token: SeUndockPrivilege 2220 winupdt3.exe Token: SeSyncAgentPrivilege 2220 winupdt3.exe Token: SeEnableDelegationPrivilege 2220 winupdt3.exe Token: SeManageVolumePrivilege 2220 winupdt3.exe Token: SeImpersonatePrivilege 2220 winupdt3.exe Token: SeCreateGlobalPrivilege 2220 winupdt3.exe Token: 31 2220 winupdt3.exe Token: 32 2220 winupdt3.exe Token: 33 2220 winupdt3.exe Token: 34 2220 winupdt3.exe Token: 35 2220 winupdt3.exe Token: SeDebugPrivilege 3420 winupdt3.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3992 8d3bcdfa175392c779861c036db2a480N.exe 1428 winupdt3.exe 2220 winupdt3.exe 2220 winupdt3.exe 3420 winupdt3.exe 2220 winupdt3.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3992 wrote to memory of 2384 3992 8d3bcdfa175392c779861c036db2a480N.exe 87 PID 3992 wrote to memory of 2384 3992 8d3bcdfa175392c779861c036db2a480N.exe 87 PID 3992 wrote to memory of 2384 3992 8d3bcdfa175392c779861c036db2a480N.exe 87 PID 2384 wrote to memory of 1916 2384 cmd.exe 90 PID 2384 wrote to memory of 1916 2384 cmd.exe 90 PID 2384 wrote to memory of 1916 2384 cmd.exe 90 PID 3992 wrote to memory of 1428 3992 8d3bcdfa175392c779861c036db2a480N.exe 91 PID 3992 wrote to memory of 1428 3992 8d3bcdfa175392c779861c036db2a480N.exe 91 PID 3992 wrote to memory of 1428 3992 8d3bcdfa175392c779861c036db2a480N.exe 91 PID 1428 wrote to memory of 2220 1428 winupdt3.exe 92 PID 1428 wrote to memory of 2220 1428 winupdt3.exe 92 PID 1428 wrote to memory of 2220 1428 winupdt3.exe 92 PID 1428 wrote to memory of 2220 1428 winupdt3.exe 92 PID 1428 wrote to memory of 2220 1428 winupdt3.exe 92 PID 1428 wrote to memory of 2220 1428 winupdt3.exe 92 PID 1428 wrote to memory of 2220 1428 winupdt3.exe 92 PID 1428 wrote to memory of 2220 1428 winupdt3.exe 92 PID 1428 wrote to memory of 3420 1428 winupdt3.exe 93 PID 1428 wrote to memory of 3420 1428 winupdt3.exe 93 PID 1428 wrote to memory of 3420 1428 winupdt3.exe 93 PID 1428 wrote to memory of 3420 1428 winupdt3.exe 93 PID 1428 wrote to memory of 3420 1428 winupdt3.exe 93 PID 1428 wrote to memory of 3420 1428 winupdt3.exe 93 PID 1428 wrote to memory of 3420 1428 winupdt3.exe 93 PID 1428 wrote to memory of 3420 1428 winupdt3.exe 93 PID 2220 wrote to memory of 448 2220 winupdt3.exe 94 PID 2220 wrote to memory of 448 2220 winupdt3.exe 94 PID 2220 wrote to memory of 448 2220 winupdt3.exe 94 PID 2220 wrote to memory of 4968 2220 winupdt3.exe 95 PID 2220 wrote to memory of 4968 2220 winupdt3.exe 95 PID 2220 wrote to memory of 4968 2220 winupdt3.exe 95 PID 2220 wrote to memory of 3676 2220 winupdt3.exe 96 PID 2220 wrote to memory of 3676 2220 winupdt3.exe 96 PID 2220 wrote to memory of 3676 2220 winupdt3.exe 96 PID 2220 wrote to memory of 1464 2220 winupdt3.exe 97 PID 2220 wrote to memory of 1464 2220 winupdt3.exe 97 PID 2220 wrote to memory of 1464 2220 winupdt3.exe 97 PID 3676 wrote to memory of 3036 3676 cmd.exe 103 PID 3676 wrote to memory of 3036 3676 cmd.exe 103 PID 3676 wrote to memory of 3036 3676 cmd.exe 103 PID 4968 wrote to memory of 3960 4968 cmd.exe 104 PID 4968 wrote to memory of 3960 4968 cmd.exe 104 PID 4968 wrote to memory of 3960 4968 cmd.exe 104 PID 1464 wrote to memory of 2248 1464 cmd.exe 105 PID 1464 wrote to memory of 2248 1464 cmd.exe 105 PID 1464 wrote to memory of 2248 1464 cmd.exe 105 PID 448 wrote to memory of 2300 448 cmd.exe 106 PID 448 wrote to memory of 2300 448 cmd.exe 106 PID 448 wrote to memory of 2300 448 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d3bcdfa175392c779861c036db2a480N.exe"C:\Users\Admin\AppData\Local\Temp\8d3bcdfa175392c779861c036db2a480N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QAyKh.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinUpdt" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1916
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\local.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\local.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2248
-
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3420
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5deba559edd7e3c8dcc3e27362ac41cde
SHA1a5688d69bc779c836262874f344de154ae7e7219
SHA25649f5709cc8357f7e406ae904f54d82d476094e2e93dc93308147d8ed9a175a90
SHA5129296532fd85f48b49802be12a8581453f84274cada2433d082d5901bd86c57c86bdcc4bd4420d2f6014d1e964f0b1234eb0d34bd23ffad22c9ae02f615847fbd
-
Filesize
1.7MB
MD5993224dc4aec8c6fc9cce1a5fd137bc1
SHA14740e15414ea01b2e7262aca12385802e7476789
SHA2562f43dc048e7cbef8c9e9e3e6a147eeb653aca021b12b0f4b5d0904ce418ddab6
SHA51233ff99765fcd0244d83576e3b53520dcc08fa9357abb414ebc538e9992f038444502e8143f0a41095475a3e7a77aea60903e20b189de7336ac27529baf585571