Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:23
Static task
static1
Behavioral task
behavioral1
Sample
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
Resource
win10v2004-20240802-en
General
-
Target
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe
-
Size
1.2MB
-
MD5
562cb5dcba0e691bf01ab2c020c0837e
-
SHA1
3ca5eb915edcce7da20a7b6046055cb11333647e
-
SHA256
4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52
-
SHA512
130e921e7bd869c6367a4fe664a5fe9df6432ff5ca3519d9fe4d378b52f4675b89ec9312a02ea8246868326d9c0c65703a45e289478afc7f26ce1ce6310077a9
-
SSDEEP
24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8awSX4F1d5Y/j20uMjwr4b:oTvC/MTQYxsWR7aw6yYpw4
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3748 set thread context of 3752 3748 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 88 PID 3752 set thread context of 3460 3752 svchost.exe 55 PID 3752 set thread context of 1536 3752 svchost.exe 102 PID 1536 set thread context of 3460 1536 msiexec.exe 55 PID 1536 set thread context of 952 1536 msiexec.exe 103 -
Program crash 1 IoCs
pid pid_target Process procid_target 1228 3748 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe -
description ioc Process Key created \Registry\User\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 3752 svchost.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3748 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 3752 svchost.exe 3460 Explorer.EXE 3460 Explorer.EXE 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe 1536 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3748 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 3748 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3748 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 3748 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3460 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3748 wrote to memory of 3752 3748 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 88 PID 3748 wrote to memory of 3752 3748 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 88 PID 3748 wrote to memory of 3752 3748 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 88 PID 3748 wrote to memory of 3752 3748 4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe 88 PID 3460 wrote to memory of 1536 3460 Explorer.EXE 102 PID 3460 wrote to memory of 1536 3460 Explorer.EXE 102 PID 3460 wrote to memory of 1536 3460 Explorer.EXE 102 PID 1536 wrote to memory of 952 1536 msiexec.exe 103 PID 1536 wrote to memory of 952 1536 msiexec.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\4399aa607bbc0faabced85f15b59b4d01a50d79da07f8d6bc825e358ad417e52.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 7243⤵
- Program crash
PID:1228
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3748 -ip 37481⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD5a1fb5c2c967aa8558c7d23183f7afd9c
SHA146a77e92eade977bbf0ec71afb2bc2a413e2af3b
SHA256acc62b73f9afc1ffa76dfd1823bb3b6e2257ef8058cf8e7daf733fd584ed9ef2
SHA51204e2a1888d8751774ecaf2d0a55bc92acac79e0212771355d8da9c7d6644a72a574d1686cc065900d04c08edc22b29560fcfac7d2f9b5698544b65b3424b03ec