Analysis
-
max time kernel
120s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
8f51f2ce93433514f87cdb4ed20b8560N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8f51f2ce93433514f87cdb4ed20b8560N.exe
Resource
win10v2004-20240802-en
General
-
Target
8f51f2ce93433514f87cdb4ed20b8560N.exe
-
Size
348KB
-
MD5
8f51f2ce93433514f87cdb4ed20b8560
-
SHA1
f79ad4c224b9dbdf3809aedc7ec9d1bcccca228e
-
SHA256
54f49a6c62fc8ae5897c3f08c0ed3ad5eb231c5c6621a566aac12e05abea8b36
-
SHA512
198aedb95ff337da125568ad890d617a22b0fbe5ddd70008f4ec57503bf03b4c43719cd422a1966113cb9ec75a9ee1d7c2bf689c807b1ca079922596469fd1fc
-
SSDEEP
6144:ybpFMByWEhy9vBpHLnU+r/f79MzNtukvSodidiHlFE:y9y2hqbLnZr/5MJt5qZi/E
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation 8f51f2ce93433514f87cdb4ed20b8560N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent5 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\D2BH68~1.EXE" backgroundTaskHost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira backgroundTaskHost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast backgroundTaskHost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod backgroundTaskHost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2064 set thread context of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4576 2064 WerFault.exe 86 1908 2064 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backgroundTaskHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f51f2ce93433514f87cdb4ed20b8560N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe 1260 backgroundTaskHost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1260 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 99 PID 2064 wrote to memory of 1800 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 100 PID 2064 wrote to memory of 1800 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 100 PID 2064 wrote to memory of 1800 2064 8f51f2ce93433514f87cdb4ed20b8560N.exe 100 PID 1800 wrote to memory of 216 1800 cmd.exe 105 PID 1800 wrote to memory of 216 1800 cmd.exe 105 PID 1800 wrote to memory of 216 1800 cmd.exe 105 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 216 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f51f2ce93433514f87cdb4ed20b8560N.exe"C:\Users\Admin\AppData\Local\Temp\8f51f2ce93433514f87cdb4ed20b8560N.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\backgroundTaskHost.exe"backgroundTaskHost.exe"2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\wuh7CAB.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\8f51f2ce93433514f87cdb4ed20b8560N.exe""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\8f51f2ce93433514f87cdb4ed20b8560N.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 17922⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 15722⤵
- Program crash
PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2064 -ip 20641⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2064 -ip 20641⤵PID:3608
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD5779ccfcabba9c335abb4bcd1cd7a459e
SHA11f997866ead83561764f4ee3b252f7ee03efd74d
SHA2566426674f7546479b2f05a6aa7792699f1415e38aa4e220cfbeffff7685b359d7
SHA512a44a7499f4aa81d55052f0e4baf536b2234b1bf1882186845d30bdaf54295089b56b987b515baa56d8ba94c6608b12dd3fb10574954e46d1ecb718b9764135e9
-
Filesize
29B
MD51d129e71d0de4ba3782a6d94c0b2e3c8
SHA1517cfc2ef812b7408e7a5f5a25bfb16f026709f5
SHA256019a5a204d95745c0b0aa55a1685f0c1d53ecb13bb09eb428ad463bb5f7fe4fb
SHA512d2f9ef378141111d187f274a042973bc8dd28887892db010259ac3c3b6d88326f3f7c62908de14417e123885fe8e103bd0365590d48e7e923b5de91390a65b6f
-
Filesize
53B
MD59f16d40e0104af15c183890db51a613a
SHA10e1548e5c6f64df5d08d3403e9ecb7abdd26577f
SHA256dc8e2f1c6ad1edf468dde9341ab62bc4721c91c7cb47ae40977d5e969360af17
SHA512f3b909ed91047744f54cfc2481765addec44bc9db922b2d660c4d304743fdac02f624aebf52b0452127007ff4b3f028a45b0b3ccc1d140bc6cbacec55d226b86