Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
Resource
win10v2004-20240802-en
General
-
Target
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
-
Size
1.2MB
-
MD5
562cb5dcba0e691bf01ab2c020c0837e
-
SHA1
3ca5eb915edcce7da20a7b6046055cb11333647e
-
SHA256
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52
-
SHA512
130e921e7bd869c6367a4fe664a5fe9df6432ff5ca3519d9fe4d378b52f4675b89ec9312a02ea8246868326d9c0c65703a45e289478afc7f26ce1ce6310077a9
-
SSDEEP
24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8awSX4F1d5Y/j20uMjwr4b:oTvC/MTQYxsWR7aw6yYpw4
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3372 set thread context of 2668 3372 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 86 PID 2668 set thread context of 3436 2668 svchost.exe 56 PID 2668 set thread context of 3180 2668 svchost.exe 100 PID 3180 set thread context of 3436 3180 msiexec.exe 56 PID 3180 set thread context of 5072 3180 msiexec.exe 101 -
Program crash 1 IoCs
pid pid_target Process procid_target 2788 3372 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3372 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 2668 svchost.exe 3436 Explorer.EXE 3436 Explorer.EXE 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe 3180 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3372 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 3372 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3372 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 3372 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3436 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2668 3372 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 86 PID 3372 wrote to memory of 2668 3372 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 86 PID 3372 wrote to memory of 2668 3372 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 86 PID 3372 wrote to memory of 2668 3372 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 86 PID 3436 wrote to memory of 3180 3436 Explorer.EXE 100 PID 3436 wrote to memory of 3180 3436 Explorer.EXE 100 PID 3436 wrote to memory of 3180 3436 Explorer.EXE 100 PID 3180 wrote to memory of 5072 3180 msiexec.exe 101 PID 3180 wrote to memory of 5072 3180 msiexec.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 7203⤵
- Program crash
PID:2788
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:5072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 3372 -ip 33721⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD5a1fb5c2c967aa8558c7d23183f7afd9c
SHA146a77e92eade977bbf0ec71afb2bc2a413e2af3b
SHA256acc62b73f9afc1ffa76dfd1823bb3b6e2257ef8058cf8e7daf733fd584ed9ef2
SHA51204e2a1888d8751774ecaf2d0a55bc92acac79e0212771355d8da9c7d6644a72a574d1686cc065900d04c08edc22b29560fcfac7d2f9b5698544b65b3424b03ec