Analysis

  • max time kernel
    118s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 20:35

General

  • Target

    0a6044d74688986491f21d842878d610N.exe

  • Size

    89KB

  • MD5

    0a6044d74688986491f21d842878d610

  • SHA1

    6882c7b0930884261f54c47303a294f1c8f0b69d

  • SHA256

    e7c24c87e807e70c6e22982368b3caf8e1a0877730c856f3d5d3fc70a4a10967

  • SHA512

    428807a2d43ee09f5526bbd7b98daadd2f3b78ed0e30a54ff528abe0996fc9814a2d656447646831f4cbed5e0a3b1de50f32126c25862dad7c8ef2b32eb42eda

  • SSDEEP

    768:Qvw9816vhKQLroS4/wQRNrfrunMxVFA3b7glL:YEGh0oSl2unMxVS3Hg9

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a6044d74688986491f21d842878d610N.exe
    "C:\Users\Admin\AppData\Local\Temp\0a6044d74688986491f21d842878d610N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Windows\{5E457E3F-E539-461b-AF53-8226B895A663}.exe
      C:\Windows\{5E457E3F-E539-461b-AF53-8226B895A663}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Windows\{097BE697-DB04-481f-9D44-AC5C24371261}.exe
        C:\Windows\{097BE697-DB04-481f-9D44-AC5C24371261}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3480
        • C:\Windows\{10F6E51C-A9B8-405a-A85B-45169CE1A2B9}.exe
          C:\Windows\{10F6E51C-A9B8-405a-A85B-45169CE1A2B9}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4460
          • C:\Windows\{E833FD90-EB0F-4e3d-9007-B94D631950E3}.exe
            C:\Windows\{E833FD90-EB0F-4e3d-9007-B94D631950E3}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2952
            • C:\Windows\{D0417038-B87D-4ca1-85C4-13833815E7BF}.exe
              C:\Windows\{D0417038-B87D-4ca1-85C4-13833815E7BF}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2732
              • C:\Windows\{DC7B22FA-2E2D-4d3b-BE01-B5A83E53C568}.exe
                C:\Windows\{DC7B22FA-2E2D-4d3b-BE01-B5A83E53C568}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2832
                • C:\Windows\{3035BF0C-92BD-41d7-AAEC-721D1EB5092F}.exe
                  C:\Windows\{3035BF0C-92BD-41d7-AAEC-721D1EB5092F}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:436
                  • C:\Windows\{58274D39-3C8A-4506-A2B5-910DB6F2BBBB}.exe
                    C:\Windows\{58274D39-3C8A-4506-A2B5-910DB6F2BBBB}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:776
                    • C:\Windows\{F92BE920-AD2D-4d52-B1FE-06B9A5CCF21A}.exe
                      C:\Windows\{F92BE920-AD2D-4d52-B1FE-06B9A5CCF21A}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4768
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{58274~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1496
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{3035B~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:648
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{DC7B2~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4244
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{D0417~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2060
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{E833F~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3196
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{10F6E~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1072
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{097BE~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4788
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{5E457~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4672
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\0A6044~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{097BE697-DB04-481f-9D44-AC5C24371261}.exe

    Filesize

    89KB

    MD5

    08a9979087fc8e0a75457746d65a53aa

    SHA1

    206e9018c390adc52ad20888d392720c6887eaa2

    SHA256

    7e2072f5ef5f86a387dac807187c079213583776640e37c50af693f03a6f0768

    SHA512

    13cf4f9f9596a56080dc4ab92ff2e8afae526dc7732c690aad289c53a46873bdb07c74a85b9e04f8c3a87e2ecbf2bf2b7d0d76a172d861fdc1e65f24af8675fd

  • C:\Windows\{10F6E51C-A9B8-405a-A85B-45169CE1A2B9}.exe

    Filesize

    89KB

    MD5

    fdf4ba1d8164e23ea94116ea104c02d3

    SHA1

    e9e59e4e6a30c08ee0ff8077a933f5b21fe3e2d7

    SHA256

    12f01e25f7f5fbd018ecef33e61c88c79da84ec00f0f2e169fc2c8af84e573b1

    SHA512

    66695bdca2b82812a087fb1b5ec99b42ec38597937bdc0fd5145db1f749ff124d009d5bae91d9cd0814cbf5fa8c4f55c6c6dfb57f6a83cdf48d4712c14b30195

  • C:\Windows\{3035BF0C-92BD-41d7-AAEC-721D1EB5092F}.exe

    Filesize

    89KB

    MD5

    51ff1988101d8f367799efec46bb3ea5

    SHA1

    91c512bd0b1291da81fbb3bf857369c25143ef63

    SHA256

    938f665f5971aefc05d969cc480ef4000ede5859ea3760b020ff57db30f70605

    SHA512

    14706c0696abca4e33e9effd8a83636bf4ec8272b2cc57627ab3e90769414a47b972d1715dadb536b8fbb4c716d600bbad5cbc61bd727cc33bfb89e0578664fa

  • C:\Windows\{58274D39-3C8A-4506-A2B5-910DB6F2BBBB}.exe

    Filesize

    89KB

    MD5

    e08222bdc1d4b23b6a187e4fd354347f

    SHA1

    d9ef0170bc8f9069d52d137e7ffdc3c50624e3d6

    SHA256

    49c30d58762d9aa9ff6e3a170546c7fcd88c919c72f9ccb40afed467bd52ca54

    SHA512

    3ae6b1686b2aac3d97ffb8ec562031b5c94d8e3135dfa935948eddae4bd91dee8cf31e1eb2ace8726830907d3fc403fc9a112a5b0b385382c3f0b5f63a720228

  • C:\Windows\{5E457E3F-E539-461b-AF53-8226B895A663}.exe

    Filesize

    89KB

    MD5

    8dc4ced9917b6fab56cf682d0d35cb6e

    SHA1

    4a44c7f9db4ecb39533cfc2ce0e95eb470dca1ba

    SHA256

    f6514fc1ce84925b266ef1bb0eff0ff5005b0ed1a98bd79c689913e72f6d5ebb

    SHA512

    21ababa4b6b2a44ff269d9ab86e0fab7fe46cc9345f97d66dd2326c6482592260c7d19caa77584f7dc7b55432d4caeca97a314899adfbe648eb1e9f3764ce3fc

  • C:\Windows\{D0417038-B87D-4ca1-85C4-13833815E7BF}.exe

    Filesize

    89KB

    MD5

    ec0afb914df3fe8b9cc253dfd8604844

    SHA1

    29c43e49ffdad82cdc39ca53620a8deae6b4e4c7

    SHA256

    20da094d5b544f6f8d89648025c4ce99ac5dae77487e38b3357634a630b50945

    SHA512

    e5d42463432e6dd5d68010ffd1b2c7c6cacc45470eab7df8b092c695f32fa1f3bdbefd63e09f22e14d04f360327cba36a5fa0ad938a16fdb337847979008ce8a

  • C:\Windows\{DC7B22FA-2E2D-4d3b-BE01-B5A83E53C568}.exe

    Filesize

    89KB

    MD5

    7319819f3d6ca1e959446b545a0fe4e2

    SHA1

    77a660464ddd3f83c76889c4de3927f0f25e5fc5

    SHA256

    4ce12d8e88a5ca36d66e58cd268de443e52239db1d522f644a7087c4795019a4

    SHA512

    fbdc931da4ca352f9ec21f95cb7dcaf34184ec7844fbfc13860e27732ef7d301a8134d40a2914faf02ae705f813c0ffce4b76cf5ebb7a91bf318eccc72583a1a

  • C:\Windows\{E833FD90-EB0F-4e3d-9007-B94D631950E3}.exe

    Filesize

    89KB

    MD5

    acfe87696daaf3fae0dad416a886f2d2

    SHA1

    8575d01e8c5f84be9bc8c8fa0b31e2e2608511b0

    SHA256

    9973be25ac5c6ec16a3f7e097e3130e13c096282d0d4668c705afbf0b7f7ae5a

    SHA512

    5b03ec6cca41725422897eb35ac2edc794bfe49b9cad0153d87ba60b87b1d73a3cb73372a3255dd15f9a7b24c1470436b1cc67c6efae16be2008b0b1b0cba2cc

  • C:\Windows\{F92BE920-AD2D-4d52-B1FE-06B9A5CCF21A}.exe

    Filesize

    89KB

    MD5

    67b5475269ee702565d62488ddc8867f

    SHA1

    80820ac2462cf09d15ad348e81fe18caafcc74e3

    SHA256

    ffc0f1306bfe0fbcbfb78f03301ce0c0f0eb076ee873fdd11e4e27bc457a11eb

    SHA512

    9366807ef9e98cc75effc259e33f5e6d33fce26388f06252d27d771877e83a167125f2e4577ed94e319683c06e332041cc9f0195e32705a6e9dbc9d53729eb83