Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
a6b09975818a47faf45c10fbba6addd0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a6b09975818a47faf45c10fbba6addd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a6b09975818a47faf45c10fbba6addd0N.exe
-
Size
3.2MB
-
MD5
a6b09975818a47faf45c10fbba6addd0
-
SHA1
49af3b6eb77a37bebfb7fcd26f7727de187c7ab4
-
SHA256
d5fac96ab929354283ac04357a822d41a7e84fbb97664d0711a269a16e491378
-
SHA512
dce3a7c0ff51f785753456ea2d0a39dc30cfd7a19e1ca8f180f8e5e8e875a58d214205fb87ab4b50742d5b6ca5ac15e03b88b3ec26c9b53fc3eac5f1e3296656
-
SSDEEP
49152:Bdx56xYcIcuHcKAH2IgGXikE2I6wdD1weda4NVk4adt:Bd6x/IcuHcKAHfnEqwdDioa4NYt
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4832 wmpscfgs.exe 5592 wmpscfgs.exe 3600 wmpscfgs.exe 3968 wmpscfgs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\users\\admin\\appdata\\local\\temp\\\\wmpscfgs.exe" a6b09975818a47faf45c10fbba6addd0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\users\\admin\\appdata\\local\\temp\\\\wmpscfgs.exe" wmpscfgs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 48 IoCs
pid Process 3556 a6b09975818a47faf45c10fbba6addd0N.exe 4832 wmpscfgs.exe 4832 wmpscfgs.exe 5592 wmpscfgs.exe 5592 wmpscfgs.exe 4832 wmpscfgs.exe 3600 wmpscfgs.exe 3968 wmpscfgs.exe 5592 wmpscfgs.exe 4832 wmpscfgs.exe 3968 wmpscfgs.exe 3600 wmpscfgs.exe 5592 wmpscfgs.exe 4832 wmpscfgs.exe 3968 wmpscfgs.exe 3600 wmpscfgs.exe 5592 wmpscfgs.exe 4832 wmpscfgs.exe 3968 wmpscfgs.exe 3600 wmpscfgs.exe 5592 wmpscfgs.exe 4832 wmpscfgs.exe 3968 wmpscfgs.exe 3600 wmpscfgs.exe 5592 wmpscfgs.exe 4832 wmpscfgs.exe 3968 wmpscfgs.exe 3600 wmpscfgs.exe 5592 wmpscfgs.exe 4832 wmpscfgs.exe 3968 wmpscfgs.exe 3600 wmpscfgs.exe 5592 wmpscfgs.exe 4832 wmpscfgs.exe 3968 wmpscfgs.exe 3600 wmpscfgs.exe 5592 wmpscfgs.exe 4832 wmpscfgs.exe 3968 wmpscfgs.exe 3600 wmpscfgs.exe 5592 wmpscfgs.exe 3968 wmpscfgs.exe 4832 wmpscfgs.exe 3600 wmpscfgs.exe 5592 wmpscfgs.exe 3968 wmpscfgs.exe 4832 wmpscfgs.exe 3600 wmpscfgs.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created \??\c:\program files (x86)\adobe\acrotray.exe a6b09975818a47faf45c10fbba6addd0N.exe File created \??\c:\program files (x86)\internet explorer\wmpscfgs.exe a6b09975818a47faf45c10fbba6addd0N.exe File created C:\Program Files (x86)\265312.dat wmpscfgs.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray .exe wmpscfgs.exe File opened for modification \??\c:\program files (x86)\adobe\acrotray.exe wmpscfgs.exe File created \??\c:\program files (x86)\adobe\acrotray .exe a6b09975818a47faf45c10fbba6addd0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6b09975818a47faf45c10fbba6addd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpscfgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpscfgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpscfgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpscfgs.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074472bebe7af3a46942426e1e277b42a00000000020000000000106600000001000020000000da4d3eec9ec1580f6d8875de61b4d9415fd8702e76466c88eff10b6bb35a1ab5000000000e8000000002000020000000ec2f059830abdc9d95dffd49443447dca87bf83bc617d7426ab6a02d9d8aedf520000000aaf95a266c49ff98c169707f4da90df2cd2090a761687217886c98c53815452b40000000c6c9b863c5acb38a2b7b0b2d9509bb723bf6ea01e2d0f7d312c67c65f37d3ede61b93527550a0c6a92563cf7b6a76158bdd2f776789f5eaa696dc88bd0528e76 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31130247" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31130247" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2501843071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20cff3978702db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a3ec978702db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C0B58DC9-6E7A-11EF-9912-762C928CCA03} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000074472bebe7af3a46942426e1e277b42a00000000020000000000106600000001000020000000e440fa82d537280c807590e49e071901c24e28f0a359364705fa655ff983f379000000000e80000000020000200000004d0a443cfdae4f10d5ea01a7ce000aa9c311dc78fe63131450e1022ee289a71320000000ecf0eb5ee68638ba9ccb3c3526de66ad56857aea975874f9cc52f7f35d7be04b40000000fe6c50e17e7838f6f7eef8eec1fb85da4a878b3a499d7bc4620b331cb70d2fecb0109a4e95978472680c8c7d80cf0da81c01357010e9168261873276ac185d41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2501843071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3556 a6b09975818a47faf45c10fbba6addd0N.exe 3556 a6b09975818a47faf45c10fbba6addd0N.exe 5592 wmpscfgs.exe 5592 wmpscfgs.exe 5592 wmpscfgs.exe 5592 wmpscfgs.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3556 a6b09975818a47faf45c10fbba6addd0N.exe Token: SeDebugPrivilege 5592 wmpscfgs.exe Token: SeDebugPrivilege 4832 wmpscfgs.exe Token: SeDebugPrivilege 3600 wmpscfgs.exe Token: SeDebugPrivilege 3968 wmpscfgs.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5048 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3556 a6b09975818a47faf45c10fbba6addd0N.exe 4832 wmpscfgs.exe 5592 wmpscfgs.exe 3600 wmpscfgs.exe 3968 wmpscfgs.exe 5048 iexplore.exe 5048 iexplore.exe 4784 IEXPLORE.EXE 4784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3556 wrote to memory of 4832 3556 a6b09975818a47faf45c10fbba6addd0N.exe 86 PID 3556 wrote to memory of 4832 3556 a6b09975818a47faf45c10fbba6addd0N.exe 86 PID 3556 wrote to memory of 4832 3556 a6b09975818a47faf45c10fbba6addd0N.exe 86 PID 3556 wrote to memory of 5592 3556 a6b09975818a47faf45c10fbba6addd0N.exe 87 PID 3556 wrote to memory of 5592 3556 a6b09975818a47faf45c10fbba6addd0N.exe 87 PID 3556 wrote to memory of 5592 3556 a6b09975818a47faf45c10fbba6addd0N.exe 87 PID 5592 wrote to memory of 3600 5592 wmpscfgs.exe 95 PID 5592 wrote to memory of 3600 5592 wmpscfgs.exe 95 PID 5592 wrote to memory of 3600 5592 wmpscfgs.exe 95 PID 5592 wrote to memory of 3968 5592 wmpscfgs.exe 96 PID 5592 wrote to memory of 3968 5592 wmpscfgs.exe 96 PID 5592 wrote to memory of 3968 5592 wmpscfgs.exe 96 PID 5048 wrote to memory of 4784 5048 iexplore.exe 99 PID 5048 wrote to memory of 4784 5048 iexplore.exe 99 PID 5048 wrote to memory of 4784 5048 iexplore.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6b09975818a47faf45c10fbba6addd0N.exe"C:\Users\Admin\AppData\Local\Temp\a6b09975818a47faf45c10fbba6addd0N.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3556 -
\??\c:\users\admin\appdata\local\temp\wmpscfgs.exec:\users\admin\appdata\local\temp\\wmpscfgs.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4832
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5592 -
\??\c:\users\admin\appdata\local\temp\wmpscfgs.exec:\users\admin\appdata\local\temp\\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3600
-
-
C:\Program Files (x86)\Internet Explorer\wmpscfgs.exeC:\Program Files (x86)\Internet Explorer\wmpscfgs.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3968
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:1696
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5048 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD566043ad9cafa838a8143a54ff570ca7a
SHA19f21dd402de2d45f61e64c177e64983f5663bf25
SHA2563b69a754eeec192bd661f967b746613a9687471525e1bc9650cefc6a41ccc742
SHA5123271f91de6e469233bb42a711eeaab1c6decc00864d1f3cee649f4d88d5dafeb508adce04871924238efa5a4b14aa25cc248b269cc4e6f547656fe53c8060532
-
Filesize
3.2MB
MD566a51de296ebe8bc524cbd7cd39323a5
SHA1c2ca55e8b7be8ab0860375a69d80141b9c755d70
SHA2561a60ae1803787cbc31605a29c848ac64f770da4e58482e6885dadda5bb643a1d
SHA512197f47ecf227397302ca64d00f5c22922fbcf4f4293f467ba8a69b387582fa64379cb24f476488d117486efa9b518aea4d2bd0f9299fb827a1b259a8cc08cbd8
-
Filesize
3.3MB
MD53b96395b5df64e3bba09923ff49940b4
SHA17947b2cfc611018a11eebe90e5a53471735f82c0
SHA256efb329f917129a7d4548f150f46b91a47a553dfa2d34f1722bd849145d572537
SHA512e00c03da8a208c6cf8707418be34d85528745b588dd1f44bc3dde4aa44bb6c889fa93d263f8e46cb85e65c6335250b6ae3ff83d4b3d139db661cabcb80aa909b