Analysis

  • max time kernel
    106s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 20:21

General

  • Target

    695c1108e4cf5772d8665466a95bfb60N.exe

  • Size

    1.6MB

  • MD5

    695c1108e4cf5772d8665466a95bfb60

  • SHA1

    4c8e91f9e899f56829d9d602404f49584a2c2804

  • SHA256

    16914ad8762def9dc356d2ba9c481c875c3dab7bcf4706a9d418e57b6eca3ae1

  • SHA512

    a70fa909c8c8f8d1606716e8fd6d8f9c873d76c01eb3b31ea81c072671f0080087b7694602f3b20448c4340d3c8a94ae5ed8f5191d3fbec27f63e0e8c5a35eda

  • SSDEEP

    49152:qWg8wUmZOzqiavjDUJO/WH89ctcO0ljbbQnIQGotBKq48TJCHEGU42sn6:ZiUmZOzqiavjDUM/WH89y8bboGO

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\695c1108e4cf5772d8665466a95bfb60N.exe
    "C:\Users\Admin\AppData\Local\Temp\695c1108e4cf5772d8665466a95bfb60N.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1592
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2444
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
    1⤵
      PID:3668
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
      1⤵
        PID:3664

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe

        Filesize

        1.6MB

        MD5

        695c1108e4cf5772d8665466a95bfb60

        SHA1

        4c8e91f9e899f56829d9d602404f49584a2c2804

        SHA256

        16914ad8762def9dc356d2ba9c481c875c3dab7bcf4706a9d418e57b6eca3ae1

        SHA512

        a70fa909c8c8f8d1606716e8fd6d8f9c873d76c01eb3b31ea81c072671f0080087b7694602f3b20448c4340d3c8a94ae5ed8f5191d3fbec27f63e0e8c5a35eda