Analysis
-
max time kernel
119s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 18:39
Behavioral task
behavioral1
Sample
c1d5297ee8735c4393639b686d6b6270N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1d5297ee8735c4393639b686d6b6270N.exe
Resource
win10v2004-20240802-en
General
-
Target
c1d5297ee8735c4393639b686d6b6270N.exe
-
Size
1.8MB
-
MD5
c1d5297ee8735c4393639b686d6b6270
-
SHA1
7aa5bbfa7b73a4fda0d63ce4fb4cc36e699f7bba
-
SHA256
30bb5bb7e51d28d6a352acdb6fb1b6be88ffe2d781d0041f785af9c2cdf5cc0f
-
SHA512
d470ecc45fc7613370e7d554265764e0afedc4f09c59dbeb42d410edca72cfccd02c4e7cdcd95660bcb9ac2eee1f6c7311bd90805ae6b9a9691e027f1162d71e
-
SSDEEP
49152:qVA4fBDGeLp63a3/cKgzR/iJdIwQZFJD68dGYWPbmnq0G2SImeGf0g+gS6ZI8u43:qVA4fBDGeLp6K3/cKgzR/iJdIwQZFJDA
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent.exe = "C:\\Users\\Admin\\AppData\\Roaming\\darkeye-nosttingspersistent.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Firefox.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation c1d5297ee8735c4393639b686d6b6270N.exe -
Executes dropped EXE 3 IoCs
pid Process 3152 Firefox.exe 3760 Firefox.exe 1104 Firefox.exe -
resource yara_rule behavioral2/memory/2000-0-0x0000000000400000-0x00000000005DB000-memory.dmp upx behavioral2/files/0x000a0000000234c6-16.dat upx behavioral2/memory/2000-29-0x0000000000400000-0x00000000005DB000-memory.dmp upx behavioral2/memory/3760-35-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3760-34-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3760-31-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1104-38-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1104-44-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1104-42-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3152-49-0x0000000000400000-0x00000000005DB000-memory.dmp upx behavioral2/memory/3760-50-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3760-51-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1104-52-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3760-55-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3760-58-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3760-60-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Updater 3 = "C:\\Users\\Admin\\AppData\\Roaming\\Firefox.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3152 set thread context of 3760 3152 Firefox.exe 91 PID 3152 set thread context of 1104 3152 Firefox.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Firefox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Firefox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1d5297ee8735c4393639b686d6b6270N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Firefox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1948 reg.exe 3556 reg.exe 976 reg.exe 3112 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 3760 Firefox.exe Token: SeCreateTokenPrivilege 3760 Firefox.exe Token: SeAssignPrimaryTokenPrivilege 3760 Firefox.exe Token: SeLockMemoryPrivilege 3760 Firefox.exe Token: SeIncreaseQuotaPrivilege 3760 Firefox.exe Token: SeMachineAccountPrivilege 3760 Firefox.exe Token: SeTcbPrivilege 3760 Firefox.exe Token: SeSecurityPrivilege 3760 Firefox.exe Token: SeTakeOwnershipPrivilege 3760 Firefox.exe Token: SeLoadDriverPrivilege 3760 Firefox.exe Token: SeSystemProfilePrivilege 3760 Firefox.exe Token: SeSystemtimePrivilege 3760 Firefox.exe Token: SeProfSingleProcessPrivilege 3760 Firefox.exe Token: SeIncBasePriorityPrivilege 3760 Firefox.exe Token: SeCreatePagefilePrivilege 3760 Firefox.exe Token: SeCreatePermanentPrivilege 3760 Firefox.exe Token: SeBackupPrivilege 3760 Firefox.exe Token: SeRestorePrivilege 3760 Firefox.exe Token: SeShutdownPrivilege 3760 Firefox.exe Token: SeDebugPrivilege 3760 Firefox.exe Token: SeAuditPrivilege 3760 Firefox.exe Token: SeSystemEnvironmentPrivilege 3760 Firefox.exe Token: SeChangeNotifyPrivilege 3760 Firefox.exe Token: SeRemoteShutdownPrivilege 3760 Firefox.exe Token: SeUndockPrivilege 3760 Firefox.exe Token: SeSyncAgentPrivilege 3760 Firefox.exe Token: SeEnableDelegationPrivilege 3760 Firefox.exe Token: SeManageVolumePrivilege 3760 Firefox.exe Token: SeImpersonatePrivilege 3760 Firefox.exe Token: SeCreateGlobalPrivilege 3760 Firefox.exe Token: 31 3760 Firefox.exe Token: 32 3760 Firefox.exe Token: 33 3760 Firefox.exe Token: 34 3760 Firefox.exe Token: 35 3760 Firefox.exe Token: SeDebugPrivilege 1104 Firefox.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 c1d5297ee8735c4393639b686d6b6270N.exe 3152 Firefox.exe 3760 Firefox.exe 3760 Firefox.exe 1104 Firefox.exe 3760 Firefox.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2532 2000 c1d5297ee8735c4393639b686d6b6270N.exe 86 PID 2000 wrote to memory of 2532 2000 c1d5297ee8735c4393639b686d6b6270N.exe 86 PID 2000 wrote to memory of 2532 2000 c1d5297ee8735c4393639b686d6b6270N.exe 86 PID 2532 wrote to memory of 3808 2532 cmd.exe 89 PID 2532 wrote to memory of 3808 2532 cmd.exe 89 PID 2532 wrote to memory of 3808 2532 cmd.exe 89 PID 2000 wrote to memory of 3152 2000 c1d5297ee8735c4393639b686d6b6270N.exe 90 PID 2000 wrote to memory of 3152 2000 c1d5297ee8735c4393639b686d6b6270N.exe 90 PID 2000 wrote to memory of 3152 2000 c1d5297ee8735c4393639b686d6b6270N.exe 90 PID 3152 wrote to memory of 3760 3152 Firefox.exe 91 PID 3152 wrote to memory of 3760 3152 Firefox.exe 91 PID 3152 wrote to memory of 3760 3152 Firefox.exe 91 PID 3152 wrote to memory of 3760 3152 Firefox.exe 91 PID 3152 wrote to memory of 3760 3152 Firefox.exe 91 PID 3152 wrote to memory of 3760 3152 Firefox.exe 91 PID 3152 wrote to memory of 3760 3152 Firefox.exe 91 PID 3152 wrote to memory of 3760 3152 Firefox.exe 91 PID 3152 wrote to memory of 1104 3152 Firefox.exe 92 PID 3152 wrote to memory of 1104 3152 Firefox.exe 92 PID 3152 wrote to memory of 1104 3152 Firefox.exe 92 PID 3152 wrote to memory of 1104 3152 Firefox.exe 92 PID 3152 wrote to memory of 1104 3152 Firefox.exe 92 PID 3152 wrote to memory of 1104 3152 Firefox.exe 92 PID 3152 wrote to memory of 1104 3152 Firefox.exe 92 PID 3152 wrote to memory of 1104 3152 Firefox.exe 92 PID 3760 wrote to memory of 1932 3760 Firefox.exe 93 PID 3760 wrote to memory of 1932 3760 Firefox.exe 93 PID 3760 wrote to memory of 1932 3760 Firefox.exe 93 PID 3760 wrote to memory of 840 3760 Firefox.exe 95 PID 3760 wrote to memory of 840 3760 Firefox.exe 95 PID 3760 wrote to memory of 840 3760 Firefox.exe 95 PID 3760 wrote to memory of 4160 3760 Firefox.exe 96 PID 3760 wrote to memory of 4160 3760 Firefox.exe 96 PID 3760 wrote to memory of 4160 3760 Firefox.exe 96 PID 3760 wrote to memory of 532 3760 Firefox.exe 97 PID 3760 wrote to memory of 532 3760 Firefox.exe 97 PID 3760 wrote to memory of 532 3760 Firefox.exe 97 PID 840 wrote to memory of 3556 840 cmd.exe 101 PID 840 wrote to memory of 3556 840 cmd.exe 101 PID 840 wrote to memory of 3556 840 cmd.exe 101 PID 532 wrote to memory of 1948 532 cmd.exe 102 PID 532 wrote to memory of 1948 532 cmd.exe 102 PID 532 wrote to memory of 1948 532 cmd.exe 102 PID 4160 wrote to memory of 976 4160 cmd.exe 103 PID 4160 wrote to memory of 976 4160 cmd.exe 103 PID 4160 wrote to memory of 976 4160 cmd.exe 103 PID 1932 wrote to memory of 3112 1932 cmd.exe 104 PID 1932 wrote to memory of 3112 1932 cmd.exe 104 PID 1932 wrote to memory of 3112 1932 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1d5297ee8735c4393639b686d6b6270N.exe"C:\Users\Admin\AppData\Local\Temp\c1d5297ee8735c4393639b686d6b6270N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\orMHG.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Java Updater 3" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Firefox.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3808
-
-
-
C:\Users\Admin\AppData\Roaming\Firefox.exe"C:\Users\Admin\AppData\Roaming\Firefox.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Roaming\Firefox.exeC:\Users\Admin\AppData\Roaming\Firefox.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Firefox.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Firefox.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Firefox.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Firefox.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:976
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1948
-
-
-
-
C:\Users\Admin\AppData\Roaming\Firefox.exeC:\Users\Admin\AppData\Roaming\Firefox.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1104
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD5962bc493b87f298696ad6e3eed7c7937
SHA1985cc0c7e37e2465c4349abd528e120663ebd205
SHA256c167e2faa5307ac291ff833b8a1f5f802eaa028d1aba8d1ad342ca84c07bdb01
SHA5129dd2b755a404b74206b713ab17d2ddedacc48910e942dab71cf7e98d8d25322c24e32648f0881136e5425134aaccfbfd9bdc52ceb4519bd07e97c5564116f173
-
Filesize
1.8MB
MD5b199943fa8cb7989daba3393d199dc28
SHA1b7d5db5a2a630db00c9e88939e7adc69c8ebc458
SHA256640161a39aa53c679ed358e433439cc3d1ea9e39e02dcfb4b11588b6c554f23d
SHA5125592672961db379fe826a894f6a386131ed999180121f241d19c23299fc77b0d7c477272d566cb025c38270e49fd10ddce75e60cd6e42f902a850cef43867756