Analysis
-
max time kernel
132s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
6be4dd9af27712f5ef6dc7d684e5ea07fa675b8cbed3094612a6696a40c664ce.msc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6be4dd9af27712f5ef6dc7d684e5ea07fa675b8cbed3094612a6696a40c664ce.msc
Resource
win10v2004-20240802-en
General
-
Target
6be4dd9af27712f5ef6dc7d684e5ea07fa675b8cbed3094612a6696a40c664ce.msc
-
Size
145KB
-
MD5
8ccc4ccb2d53f699bca2cfc801b300b5
-
SHA1
a4c2f1d0dbd7509d57f9782e54d52df2abf04d0c
-
SHA256
6be4dd9af27712f5ef6dc7d684e5ea07fa675b8cbed3094612a6696a40c664ce
-
SHA512
454a093c5b0389f28a52ba74612e3c2f34b64ebdc785c9770e8aa40cd2e817713df5eb1649fcc1a4d9e79d1b3dc1ef9a95ef9bfe7c04378ed91e03a719da85dd
-
SSDEEP
768:NJMIylU8qr4apIIW5+o6Zr3WSjtJdD7BnBHyNyJh:n5saII4EmOJvWwh
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2052 musicx.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch mmc.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" mmc.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\IESettingSync mmc.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" mmc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1444 mmc.exe Token: SeIncBasePriorityPrivilege 1444 mmc.exe Token: 33 1444 mmc.exe Token: SeIncBasePriorityPrivilege 1444 mmc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1444 mmc.exe 1444 mmc.exe 1444 mmc.exe 1444 mmc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2052 1444 mmc.exe 89 PID 1444 wrote to memory of 2052 1444 mmc.exe 89
Processes
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe "C:\Users\Admin\AppData\Local\Temp\6be4dd9af27712f5ef6dc7d684e5ea07fa675b8cbed3094612a6696a40c664ce.msc"1⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Public\Music\musicx.exe"C:\Users\Public\Music\musicx.exe"2⤵
- Executes dropped EXE
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD53597d9e93852fddb92e0a0cf0452bb61
SHA1d25c62a57ac3000244741bda129f483f2347efa6
SHA2566e6cb0729cb902420739148ae23bf1c7959bc8ea2bf6b6277c5c0de45aa77df6
SHA5125af245a68516698f0bcb63829f1c3abe429a06e94755ab50a29f51914b39e4719a901d2174550b691d5b0fdf1e23ca921714a2c5b2739925ef902766e4ab10d0
-
Filesize
638B
MD5e6227dbf734df3563d5bbd3e23c7c6bc
SHA15b73b0559d1f6324dc7e6769d5c1431f69f82278
SHA256159d13989d0ae44fddb7b1d4c331f1040d187693f16daa138c651f2cc9b7f6d3
SHA5124b8338d5a8a904dc67775ced0e32b187ea9c9c925e6ffaa9d81f23a78b03e2fc7557d7c0078193f3b61117a93dfda40258f2f722b6f79bd47aff7116e81960ac