Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 21:30
Behavioral task
behavioral1
Sample
518548d37f49897194571d1e56511000N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
518548d37f49897194571d1e56511000N.exe
Resource
win10v2004-20240802-en
General
-
Target
518548d37f49897194571d1e56511000N.exe
-
Size
1.4MB
-
MD5
518548d37f49897194571d1e56511000
-
SHA1
6fe78cac017c2916b1b1f3dcfc7c8d72fc600c7b
-
SHA256
62311ea1206451ac35e34583806552f51c1bf749cddce7dd34d690a661575501
-
SHA512
707f610d18ad2980965bcee0ab2632e428f131c2b23cba1e1031e45a20587a53c2ccd82e51876641a1286cfc2a162d7494e7045c9399a11d5613b7a79978fcaa
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81ko:ATU7AAmw4gxeOw46fUbNecd
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
resource yara_rule behavioral2/memory/1060-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/1060-11-0x0000000000400000-0x0000000000446000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 518548d37f49897194571d1e56511000N.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1060 set thread context of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 456 set thread context of 1332 456 518548d37f49897194571d1e56511000N.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 518548d37f49897194571d1e56511000N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 518548d37f49897194571d1e56511000N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 518548d37f49897194571d1e56511000N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1060 518548d37f49897194571d1e56511000N.exe 1060 518548d37f49897194571d1e56511000N.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1060 518548d37f49897194571d1e56511000N.exe 1060 518548d37f49897194571d1e56511000N.exe 1332 518548d37f49897194571d1e56511000N.exe 1332 518548d37f49897194571d1e56511000N.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1752 1060 518548d37f49897194571d1e56511000N.exe 86 PID 1060 wrote to memory of 1752 1060 518548d37f49897194571d1e56511000N.exe 86 PID 1060 wrote to memory of 1752 1060 518548d37f49897194571d1e56511000N.exe 86 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 1060 wrote to memory of 456 1060 518548d37f49897194571d1e56511000N.exe 90 PID 456 wrote to memory of 1332 456 518548d37f49897194571d1e56511000N.exe 101 PID 456 wrote to memory of 1332 456 518548d37f49897194571d1e56511000N.exe 101 PID 456 wrote to memory of 1332 456 518548d37f49897194571d1e56511000N.exe 101 PID 456 wrote to memory of 1332 456 518548d37f49897194571d1e56511000N.exe 101 PID 456 wrote to memory of 1332 456 518548d37f49897194571d1e56511000N.exe 101 PID 456 wrote to memory of 1332 456 518548d37f49897194571d1e56511000N.exe 101 PID 456 wrote to memory of 1332 456 518548d37f49897194571d1e56511000N.exe 101 PID 456 wrote to memory of 1332 456 518548d37f49897194571d1e56511000N.exe 101 PID 456 wrote to memory of 3812 456 518548d37f49897194571d1e56511000N.exe 102 PID 456 wrote to memory of 3812 456 518548d37f49897194571d1e56511000N.exe 102 PID 456 wrote to memory of 3812 456 518548d37f49897194571d1e56511000N.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\518548d37f49897194571d1e56511000N.exe"C:\Users\Admin\AppData\Local\Temp\518548d37f49897194571d1e56511000N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\518548d37f49897194571d1e56511000N.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\518548d37f49897194571d1e56511000N.exeC:\Users\Admin\AppData\Local\Temp\518548d37f49897194571d1e56511000N.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\518548d37f49897194571d1e56511000N.exeC:\Users\Admin\AppData\Local\Temp\518548d37f49897194571d1e56511000N.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1332
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:3812
-
-