Analysis

  • max time kernel
    119s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2024, 06:31

General

  • Target

    0634e3a32482f4f87a3255a68340df30N.exe

  • Size

    523KB

  • MD5

    0634e3a32482f4f87a3255a68340df30

  • SHA1

    a8e9b13760ae2bed99ea7361b937ba42fe829d56

  • SHA256

    30014d270738947c823941ac9f8241dcf90c19c8b949cff088594fef51186dda

  • SHA512

    5b15f24d8d8fee3d385c5b2845fd4ce152f116928794a1bfc941c4a51859654fcc67572d2306514cbf03b439e67858268d90066249588c07ff792d152d4e89e8

  • SSDEEP

    12288:nLPkCDt1EG2XVekhdeTmWd72OzE0j6IXlr3ddFYSjDP:nLPkQ1bqA+W0OzLXldYSjDP

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\0634e3a32482f4f87a3255a68340df30N.exe
      "C:\Users\Admin\AppData\Local\Temp\0634e3a32482f4f87a3255a68340df30N.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4036
      • C:\Users\Admin\AppData\Roaming\esenunch\ddodPING.exe
        "C:\Users\Admin\AppData\Roaming\esenunch"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Users\Admin\AppData\Local\Temp\~8F6F.tmp
          3516 536072 860 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 604
        3⤵
        • Program crash
        PID:572
  • C:\Windows\SysWOW64\cmdkedit.exe
    C:\Windows\SysWOW64\cmdkedit.exe -s
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:4728
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4036 -ip 4036
    1⤵
      PID:2332

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\~8F6F.tmp

            Filesize

            8KB

            MD5

            aac3165ece2959f39ff98334618d10d9

            SHA1

            020a191bfdc70c1fbd3bf74cd7479258bd197f51

            SHA256

            96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974

            SHA512

            9eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf

          • C:\Users\Admin\AppData\Roaming\esenunch\ddodPING.exe

            Filesize

            523KB

            MD5

            996744b744f99b64fd65e9948db898c7

            SHA1

            163de5b51daf2a1ec08be42443aa3c93067c6423

            SHA256

            ce4587f47dc09ba65d1dfe4813a0bc04520d7e5aea8b4a2e9f9868deb5f9645b

            SHA512

            f844883417ada01a54f593afb08a4c1cefb3d9e4afac3b86247a699f63a77b9290edc643cb2ae76698268e4e56d6b4126cc4c12b0ccf8bf1ed2cd525df5ce6c6

          • memory/860-32-0x0000000000400000-0x000000000048C000-memory.dmp

            Filesize

            560KB

          • memory/860-12-0x0000000000A70000-0x0000000000AFC000-memory.dmp

            Filesize

            560KB

          • memory/860-6-0x0000000000400000-0x000000000048C000-memory.dmp

            Filesize

            560KB

          • memory/860-14-0x00000000005E0000-0x00000000005E6000-memory.dmp

            Filesize

            24KB

          • memory/3516-30-0x00000000083D0000-0x00000000083DD000-memory.dmp

            Filesize

            52KB

          • memory/3516-29-0x0000000002DB0000-0x0000000002DB6000-memory.dmp

            Filesize

            24KB

          • memory/3516-19-0x0000000009090000-0x0000000009122000-memory.dmp

            Filesize

            584KB

          • memory/3516-28-0x0000000009090000-0x0000000009122000-memory.dmp

            Filesize

            584KB

          • memory/4036-0-0x0000000000150000-0x00000000001DC000-memory.dmp

            Filesize

            560KB

          • memory/4036-1-0x0000000000BF0000-0x0000000000C7C000-memory.dmp

            Filesize

            560KB

          • memory/4036-34-0x0000000000BF0000-0x0000000000C7C000-memory.dmp

            Filesize

            560KB

          • memory/4036-33-0x0000000000150000-0x00000000001DC000-memory.dmp

            Filesize

            560KB

          • memory/4728-27-0x0000000001250000-0x0000000001256000-memory.dmp

            Filesize

            24KB

          • memory/4728-31-0x00000000012E0000-0x00000000012E6000-memory.dmp

            Filesize

            24KB

          • memory/4728-18-0x0000000001250000-0x0000000001256000-memory.dmp

            Filesize

            24KB

          • memory/4728-15-0x0000000000C00000-0x0000000000C8C000-memory.dmp

            Filesize

            560KB

          • memory/4728-13-0x0000000000150000-0x00000000001DC000-memory.dmp

            Filesize

            560KB

          • memory/4728-35-0x0000000000C00000-0x0000000000C8C000-memory.dmp

            Filesize

            560KB

          • memory/4728-36-0x0000000001250000-0x0000000001256000-memory.dmp

            Filesize

            24KB