Analysis

  • max time kernel
    149s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 19:22

General

  • Target

    16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe

  • Size

    91KB

  • MD5

    5adfa797cd97ee2f3924b87c460bfd00

  • SHA1

    850e5aef7b17b918f87c1550fc91a667af059f79

  • SHA256

    16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121

  • SHA512

    99c63e4901cac34986608b05872f266f419a7b327d659e4e19f086f0413f32b99a99523964c62cb66b0923e64d46aaefe080cc0af9c165cc647531abcdc4743e

  • SSDEEP

    768:5vw9816uhKiroX4/wQNNrfrunMxVFA3b7t:lEGkmoXlCunMxVS3Ht

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe
    "C:\Users\Admin\AppData\Local\Temp\16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Windows\{1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe
      C:\Windows\{1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3580
      • C:\Windows\{4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe
        C:\Windows\{4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Windows\{C0A8382B-2B64-4692-858F-38FCAE82A732}.exe
          C:\Windows\{C0A8382B-2B64-4692-858F-38FCAE82A732}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:756
          • C:\Windows\{0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe
            C:\Windows\{0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3056
            • C:\Windows\{6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe
              C:\Windows\{6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4832
              • C:\Windows\{75635B13-0D58-4ffe-9FDA-7DF188021238}.exe
                C:\Windows\{75635B13-0D58-4ffe-9FDA-7DF188021238}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3428
                • C:\Windows\{762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe
                  C:\Windows\{762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:824
                  • C:\Windows\{7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe
                    C:\Windows\{7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1152
                    • C:\Windows\{9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe
                      C:\Windows\{9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4960
                      • C:\Windows\{64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe
                        C:\Windows\{64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1420
                        • C:\Windows\{BF58D879-5839-493a-8FC3-B55310A98F83}.exe
                          C:\Windows\{BF58D879-5839-493a-8FC3-B55310A98F83}.exe
                          12⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4652
                          • C:\Windows\{6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B}.exe
                            C:\Windows\{6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B}.exe
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:4760
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BF58D~1.EXE > nul
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:3468
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{64D48~1.EXE > nul
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:2960
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{9BA86~1.EXE > nul
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:3920
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{7F3D0~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:4916
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{762FD~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:1880
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{75635~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1800
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{6BC3B~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2584
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{0353B~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3172
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{C0A83~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2900
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{4B138~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:404
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{1A106~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3572
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\16549F~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4156

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\{0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe

          Filesize

          91KB

          MD5

          20740f9b6a11dfcfa3a4e91b0919b283

          SHA1

          7aa75dbcfaad21d81bc6a33132fc4c8421498b05

          SHA256

          aa4d20cdd8230ea04ad402a64a0af9352afed5bb206567d42fa8c25a7e047bcb

          SHA512

          2746fed853a08112a0e84e3edd81af6c27d1a50ab38640f397efd16d2c327334048b4435608576ad7a21a03d76c13e17a38f7517293de1198818e6c8cdbd7cb2

        • C:\Windows\{1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe

          Filesize

          91KB

          MD5

          d5a93174ffad58f5454b7beebb668c15

          SHA1

          a8400460fa5684c1d1bb8a442c9b8f0fa5874e10

          SHA256

          2b7643ae3320907e1b91a2574cba78d7f19c241eee086a9ae3747656adfc02dc

          SHA512

          ccd0e55477b14e868931ae566bd2cef2963b87c5289cda62cd6e49908afbc21fc45254a8c9b74cee46e211e0808da90d4a63fdfd9315cf9293dbab1ced96e17b

        • C:\Windows\{4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe

          Filesize

          91KB

          MD5

          c27b49034f6859fbeee0c5c333153569

          SHA1

          7aef1815303928c79bbbb96651cbfa2ea330f02d

          SHA256

          16735f569ee6016c0b685e5f5386972859040e74af6a839ee93ba07dc602d923

          SHA512

          9a4607a3b7aa1962b8adae0a898b36d7f60077dc3b3c79ffff035e22ee491362a64275772c8321cad13fa04764b10077916085c68a76a090df9c10f40115768f

        • C:\Windows\{64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe

          Filesize

          91KB

          MD5

          62c8b1e8e4c00f92d0cadef083e1c64e

          SHA1

          aa60b9f8f6a07d6f150122e9327a1d9541a29af6

          SHA256

          4969af3cb3323f9eb3584bf12553962c9da219fe0d1ff23bbd6ac8867afc4ad8

          SHA512

          0fddf931aefe8a75aff6c26568e1c9d70fd0c13242137b8d7ec68696623cfbcd0700d603dc097a351e700aff8d56327b1827b8fa88c016f28e45bcaab18b805d

        • C:\Windows\{6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B}.exe

          Filesize

          91KB

          MD5

          e6544dc804b7a411f3ae0be28e5dc0f0

          SHA1

          0dd4a0d630fdbb22ecf3217ef685b8b4cb3d53c6

          SHA256

          34c19648d2ab9ff0ac92dd81d5a9266c4e997eea8e005555c9fc82d200636f18

          SHA512

          be925c3cfd317901b6f59105cfe3166ab78a35b9c0faa1b8932a25d894da1ff74bf602a1eddf43b159382cdba179de70f8f66e8f3acca0df50c0552ed15922d1

        • C:\Windows\{6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe

          Filesize

          91KB

          MD5

          ab62dab8b8cb9e78930afa88b81c600c

          SHA1

          ae21c39932b52e18978542e131b597e39345832f

          SHA256

          ad1ec6ee11acadfcb865933c31af427a454046b500451d2d27952f1f42eee359

          SHA512

          c16ade45f8daa36419f3ab790da6ac6bdab5b7f2f554f12cde30bd2f82e9cd52d318ad886f157cc90e8337f180f413071fe0529d9fccfd245334429f6062c579

        • C:\Windows\{75635B13-0D58-4ffe-9FDA-7DF188021238}.exe

          Filesize

          91KB

          MD5

          884716cdbe34211a3d770a18c0743e47

          SHA1

          533641af050de454977e522282f2c8cd96503fc7

          SHA256

          e1571408839a3f3badaf49a7faba832ffbca334ffff140b960085cad0f6649dd

          SHA512

          74a6b6f0cd52304f26df9176a953418499beedb4669b0eb5a497fca87d3f79f0c1b61f9e847c63ceb22858b1ed5d6402af30e6be113f8a4080483266bc0b7b3d

        • C:\Windows\{762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe

          Filesize

          91KB

          MD5

          e325e85e33953cdd4c25c68ad6b3d890

          SHA1

          12ac6dc67351ff6bbf6492a714d07a0edae19aee

          SHA256

          2fbdcbb2b1f879fd5b434371b0033beff5a83bbbfb36c673d8fbc64b576df030

          SHA512

          2a9dea126b05077e87a56d9d1e74092a0d2879cfd3b1e112672e3534750ce8a18e5f825a0176a2bd5a992930a354f0141bf1ddc881d8c4446b83d2fe05b53e99

        • C:\Windows\{7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe

          Filesize

          91KB

          MD5

          cd9a90a2429b7d707fe7c7a17a3b8816

          SHA1

          7b7dd438f8860e83532a2ff63be5e925720f4192

          SHA256

          f65b231a5cce6a2fec4bef54bcbd15e98eeb51aad50ccf47c75aaf140af30cd2

          SHA512

          01230f6b0c76d25b289b40699941aae00ec0a63e68c34d682904aac53d03def009fbdc78e0365a691d22126036c90eee0236ad72402faff78e1f67427ff285d4

        • C:\Windows\{9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe

          Filesize

          91KB

          MD5

          18c4e2e246665c17893408d0fec6e4c3

          SHA1

          59b82fde931491fb3d60a872885287c2bca11117

          SHA256

          2814dbb1b1eedc87974b4a8d47c691d1e8030ce5a4268b65740f77c1b84b2641

          SHA512

          6a1b9a9788221b681df4ca03dae86b67b99b9a95351fb9dbe7d24d70e22424faca55007e296317eae752f2a1104e3b12a11f7eec72c0b457e20ad1029cbb43b5

        • C:\Windows\{BF58D879-5839-493a-8FC3-B55310A98F83}.exe

          Filesize

          91KB

          MD5

          d6600f974315c50fb1ecba6e7fa6b11c

          SHA1

          e6b56148f02ffefce11b057f7bb8222e491fb1ef

          SHA256

          c8bbcd4435b89e1318f4ecc783f097885ebc14772034edf2fdd45916fdb5d1e2

          SHA512

          240136218f566ff571134dd9fb84f1e9ecc3827ba1534d5bf3839ee60ad4d93399331bb84f1af64ddf1b6c3d9fabec9b612e19d392a6530278772bbf273f239b

        • C:\Windows\{C0A8382B-2B64-4692-858F-38FCAE82A732}.exe

          Filesize

          91KB

          MD5

          d44fea045037472f1513d5e5f7d004da

          SHA1

          00f16cc12219ccbca4808fb887f32a910164b031

          SHA256

          205c571f097265aaca4642840fe5dd41ef248994c437eadc9744075a1ed245e4

          SHA512

          5b656961b3548d65cd4c2e76b7dc7cbad3bcd9e7db46f67dc087c90ca75e195b67c57c5919b6e6d8603dfb06ac94d15f9a43f6a80b8feb3a0355d5af1797d74e

        • memory/756-19-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/756-24-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/824-48-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1152-53-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1172-14-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1172-18-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1172-13-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1420-64-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1420-60-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/3056-25-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/3056-30-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/3428-42-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/3428-38-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/3580-11-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/3580-5-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/4652-70-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/4652-65-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/4760-72-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/4792-7-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/4792-0-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/4792-1-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/4832-31-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/4832-37-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/4960-59-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/4960-54-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB