Analysis
-
max time kernel
118s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 10:57
Behavioral task
behavioral1
Sample
e68080a8c07c4208564f25bfb993cc20N.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
e68080a8c07c4208564f25bfb993cc20N.exe
-
Size
160KB
-
MD5
e68080a8c07c4208564f25bfb993cc20
-
SHA1
d4da661a6154213deb413654f7b24ee78314cb21
-
SHA256
b1c2c0cbfb0d08c60e070067145d8da49db21cce22d186cf92c6f0607587a125
-
SHA512
13cfb37eaef30f83b36cd6195319ab423a0da0a0d3340aef31cd551a20f82f365597c1658457f62d3c40c49a3b8457da162fa91ad4f889c6fc146f61007880e9
-
SSDEEP
1536:IEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:LY+4MiIkLZJNAQ9J6v
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2880-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\17DEF94D = "C:\\Users\\Admin\\AppData\\Roaming\\17DEF94D\\bin.exe" winver.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1220 3288 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e68080a8c07c4208564f25bfb993cc20N.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3288 winver.exe 3288 winver.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3608 Explorer.EXE Token: SeCreatePagefilePrivilege 3608 Explorer.EXE Token: SeShutdownPrivilege 3608 Explorer.EXE Token: SeCreatePagefilePrivilege 3608 Explorer.EXE Token: SeShutdownPrivilege 3608 Explorer.EXE Token: SeCreatePagefilePrivilege 3608 Explorer.EXE Token: SeShutdownPrivilege 3608 Explorer.EXE Token: SeCreatePagefilePrivilege 3608 Explorer.EXE Token: SeShutdownPrivilege 3608 Explorer.EXE Token: SeCreatePagefilePrivilege 3608 Explorer.EXE Token: SeShutdownPrivilege 3608 Explorer.EXE Token: SeCreatePagefilePrivilege 3608 Explorer.EXE Token: SeShutdownPrivilege 3608 Explorer.EXE Token: SeCreatePagefilePrivilege 3608 Explorer.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3288 winver.exe 3608 Explorer.EXE 3608 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3608 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2880 wrote to memory of 3288 2880 e68080a8c07c4208564f25bfb993cc20N.exe 84 PID 2880 wrote to memory of 3288 2880 e68080a8c07c4208564f25bfb993cc20N.exe 84 PID 2880 wrote to memory of 3288 2880 e68080a8c07c4208564f25bfb993cc20N.exe 84 PID 2880 wrote to memory of 3288 2880 e68080a8c07c4208564f25bfb993cc20N.exe 84 PID 3288 wrote to memory of 3608 3288 winver.exe 56 PID 3288 wrote to memory of 2628 3288 winver.exe 44
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2628
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\e68080a8c07c4208564f25bfb993cc20N.exe"C:\Users\Admin\AppData\Local\Temp\e68080a8c07c4208564f25bfb993cc20N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 3524⤵
- Program crash
PID:1220
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3288 -ip 32881⤵PID:964