Analysis
-
max time kernel
1s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-09-2024 08:17
General
-
Target
21.exe
-
Size
54KB
-
MD5
ebefee9de7d429fe00593a1f6203cd6a
-
SHA1
4bed4b7f9d15e5f4cfe6b8e61f7bca865b7ce641
-
SHA256
8abb47ca7c0c4871c28b89aa0e75493e5eb01e403272888c11fef9e53d633ffe
-
SHA512
dee06c0ec0dc0a9be293f5916e39cac62fd78293a9c5b645f3a94c315d8c324276cb52ebd12c9236c160ad28ede02c6b96e8b40eaef63675395b0822960483ad
-
SSDEEP
768:4EyjLgnDw5oEC+WOill+du3tOWxZtrDm9qPcQ4qWto9iP22WIps6qceX5VykiKoG:2LgDwjC+WOE+Q9FZtrDGHUuUIjgps4v
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 21.exe -
Deletes itself 1 IoCs
pid Process 4916 rundll32.exe -
Loads dropped DLL 7 IoCs
pid Process 3316 rundll32.exe 4916 rundll32.exe 4044 rundll32.exe 3316 rundll32.exe 3316 rundll32.exe 4044 rundll32.exe 4044 rundll32.exe -
resource yara_rule behavioral1/memory/1860-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1860-8-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\whhfd028.ocx 21.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Common Files\whh02053.ocx 21.exe File opened for modification C:\Program Files\Common Files\whh02053.ocx 21.exe File created C:\Program Files\Common Files\0E57A43Fce.dll 21.exe File opened for modification C:\Program Files\Common Files\0E57A43Fce.dll 21.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4916 rundll32.exe 4916 rundll32.exe 4916 rundll32.exe 4916 rundll32.exe 4916 rundll32.exe 4916 rundll32.exe 4916 rundll32.exe 4916 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 3316 rundll32.exe 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3316 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1860 wrote to memory of 4044 1860 21.exe 80 PID 1860 wrote to memory of 4044 1860 21.exe 80 PID 1860 wrote to memory of 4044 1860 21.exe 80 PID 1860 wrote to memory of 3316 1860 21.exe 81 PID 1860 wrote to memory of 3316 1860 21.exe 81 PID 1860 wrote to memory of 3316 1860 21.exe 81 PID 1860 wrote to memory of 4916 1860 21.exe 82 PID 1860 wrote to memory of 4916 1860 21.exe 82 PID 1860 wrote to memory of 4916 1860 21.exe 82 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 21.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21.exe"C:\Users\Admin\AppData\Local\Temp\21.exe"1⤵
- UAC bypass
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\whhfd028.ocx" InstallSvr02⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4044
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Program Files\Common Files\0E57A43Fce.dll" InstallSvr32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Program Files\Common Files\whh02053.ocx" InstallSvr1 C:\Users\Admin\AppData\Local\Temp\21.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD56fb92d25078bfff1c215229067b5beaa
SHA13d9a6f564f492b30981359bbcee5f9e02536e3be
SHA2565ce7c2eb8860f172dd5b68cd94307b6665f6785b207d936577bbaab196b61f33
SHA5129cf0b61f7e618df406104685158cf877ca892e7847a3c2efed3ea4a2fb08384cc0bc492cb1ea366d1b181f79a6014fe7b95ba7ed2c15744317187be080f77b24
-
Filesize
62KB
MD517912e2f2e631f4c7d452206ab354d70
SHA10d7535148d0ff1219c8ccb9418a7ed43a16f83ac
SHA256cc7c8faec19adbed2ada843c83202276aa13aadde78983d0ff6140b9cab5e5e9
SHA51240cfd922ca2da71e33a1f715fc04563f18cd19dc44ddf0fce2142cd581c6481931525bf0fdcdc7c4a57307c5270a83f4ab76c9175986dfa6be6323efe776710f
-
Filesize
11KB
MD56b51354fb017488210e58687462ee83e
SHA1d3623503867948285e9d4741f058d693decd1c17
SHA2565707e445eeca460f2e7f320d5c99eaf7840fd94632638d48e65d66a66a4ba715
SHA512ddcbdbd7728899eaa93d3773e600b79248e1af266a27721e6018c28430482ceb1116779416bb04983f5a8730b2a981f08db32e405a6da635500a9b2a78701406