Analysis

  • max time kernel
    39s
  • max time network
    43s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 09:55

Errors

Reason
Machine shutdown

General

  • Target

    Soundpad.exe

  • Size

    11.6MB

  • MD5

    ecdde99f36da416560e91f7c9f97b390

  • SHA1

    7957c54b11b2318e897b673bcc6aeafc92ac39c8

  • SHA256

    0b6f4d707649f9913257c50692f86f79b7e942ea0eef2eaa30b53702a63621c7

  • SHA512

    9ad6b5085cc12593c5c8dd094743d4e73b0693487f04f89705eb1ea09f057f4b5e1f4b2d03bd3b79b38074590c7bd75acd5484f878e1627a43549ebb3b38dcf5

  • SSDEEP

    196608:8qELu/h0xDDF4ppftCyh+DdaIuqFkKz/1xqh0T0Q:87a/h0JF4ppsyh+DyQ

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Drops file in Program Files directory 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Soundpad.exe
    "C:\Users\Admin\AppData\Local\Temp\Soundpad.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Users\Admin\AppData\Local\Temp\SoundpadService.exe
      "C:\Users\Admin\AppData\Local\Temp\SoundpadService.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4632
    • C:\Windows\System32\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Windows\system32\UniteFx1.8.0.dll"
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:1836
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4f0 0x464
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:3592
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa390a855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\speech\Microsoft\Speech\Files\UserLexicons\SP_1B4B5D0E47BE49E4A1B13C74EDB05ADA.dat

    Filesize

    940B

    MD5

    1fecfb347130a64b374d069da2648911

    SHA1

    2033faadb9f38817ad2d193b4ae5a570bb3af35d

    SHA256

    16c04f2f0c200b2f30d0a95b6c5a2aeb123e605b0673c7054fe89a3bea7d93c6

    SHA512

    cfa782c7e99a39b1e252dfa04a2a011f6c354d380806f53ed5e3f787e03b0bb4f716bc5721065425e426c7775da5a64fff9c397b6f5ad984293ac1e45f4c5357

  • C:\Windows\system32\UniteFx1.8.0.dll

    Filesize

    584KB

    MD5

    232182083ec6ddf266b81811c1d26a3a

    SHA1

    ef8c258977752887a0e5d9688fccaf74cb53201d

    SHA256

    b7b8218f1c386cb5a703023b6f1871809dcb9a1cb981c7dc6538a4d4fd08272a

    SHA512

    e299e0bcfa46e21a718e5eb61b9b3f273ad8c4f5fcd4aa291045b43b62456e4893b37be76e14802ed011532ac914f42b00096d07b117e784f9f195b1380f70ad