Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
8824a0b912b42dc9ebd18c8e85a89680N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8824a0b912b42dc9ebd18c8e85a89680N.exe
Resource
win10v2004-20240802-en
General
-
Target
8824a0b912b42dc9ebd18c8e85a89680N.exe
-
Size
118KB
-
MD5
8824a0b912b42dc9ebd18c8e85a89680
-
SHA1
e2e2a1f22c2091274eb43975ce71d7c50152080d
-
SHA256
a46641ab890221831f8a21441d6d96c2b116ee95066c3ae99711c4ce89e54b19
-
SHA512
8223503f19e96bdc0c91054004bb3a86bb2fa3b56b8d9c9ab3e6c890d3a88d956373753dde760c2003c22e08b1fc5e18f5fbed0d81f3ffa6fa47f87eeb7d3440
-
SSDEEP
3072:EagwS1Ut+KNPJI1F3Md55keTZwcM2I38QXyT:vUGPJKF3Md55ZTZwz38QXS
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 14 324 rundll32.exe 22 324 rundll32.exe 23 324 rundll32.exe 41 324 rundll32.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000a0000000233d4-10.dat acprotect -
Deletes itself 1 IoCs
pid Process 2104 muqmzchgt.exe -
Executes dropped EXE 1 IoCs
pid Process 2104 muqmzchgt.exe -
Loads dropped DLL 1 IoCs
pid Process 324 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EvtMgr = "c:\\windows\\SysWOW64\\rundll32.exe \"c:\\upwup\\xyhgw.ygx\",LoadXML" rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: rundll32.exe File opened (read-only) \??\k: rundll32.exe File opened (read-only) \??\m: rundll32.exe File opened (read-only) \??\r: rundll32.exe File opened (read-only) \??\v: rundll32.exe File opened (read-only) \??\g: rundll32.exe File opened (read-only) \??\h: rundll32.exe File opened (read-only) \??\o: rundll32.exe File opened (read-only) \??\p: rundll32.exe File opened (read-only) \??\t: rundll32.exe File opened (read-only) \??\a: rundll32.exe File opened (read-only) \??\b: rundll32.exe File opened (read-only) \??\e: rundll32.exe File opened (read-only) \??\j: rundll32.exe File opened (read-only) \??\u: rundll32.exe File opened (read-only) \??\z: rundll32.exe File opened (read-only) \??\y: rundll32.exe File opened (read-only) \??\l: rundll32.exe File opened (read-only) \??\n: rundll32.exe File opened (read-only) \??\q: rundll32.exe File opened (read-only) \??\s: rundll32.exe File opened (read-only) \??\w: rundll32.exe File opened (read-only) \??\x: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8824a0b912b42dc9ebd18c8e85a89680N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language muqmzchgt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4940 cmd.exe 4432 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Kills process with taskkill 1 IoCs
pid Process 2140 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4432 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe 324 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 324 rundll32.exe Token: SeDebugPrivilege 2140 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2568 8824a0b912b42dc9ebd18c8e85a89680N.exe 2104 muqmzchgt.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2568 wrote to memory of 4940 2568 8824a0b912b42dc9ebd18c8e85a89680N.exe 85 PID 2568 wrote to memory of 4940 2568 8824a0b912b42dc9ebd18c8e85a89680N.exe 85 PID 2568 wrote to memory of 4940 2568 8824a0b912b42dc9ebd18c8e85a89680N.exe 85 PID 4940 wrote to memory of 4432 4940 cmd.exe 87 PID 4940 wrote to memory of 4432 4940 cmd.exe 87 PID 4940 wrote to memory of 4432 4940 cmd.exe 87 PID 4940 wrote to memory of 2104 4940 cmd.exe 89 PID 4940 wrote to memory of 2104 4940 cmd.exe 89 PID 4940 wrote to memory of 2104 4940 cmd.exe 89 PID 2104 wrote to memory of 324 2104 muqmzchgt.exe 90 PID 2104 wrote to memory of 324 2104 muqmzchgt.exe 90 PID 2104 wrote to memory of 324 2104 muqmzchgt.exe 90 PID 324 wrote to memory of 2140 324 rundll32.exe 92 PID 324 wrote to memory of 2140 324 rundll32.exe 92 PID 324 wrote to memory of 2140 324 rundll32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\8824a0b912b42dc9ebd18c8e85a89680N.exe"C:\Users\Admin\AppData\Local\Temp\8824a0b912b42dc9ebd18c8e85a89680N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\muqmzchgt.exe "C:\Users\Admin\AppData\Local\Temp\8824a0b912b42dc9ebd18c8e85a89680N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\muqmzchgt.exeC:\Users\Admin\AppData\Local\Temp\\muqmzchgt.exe "C:\Users\Admin\AppData\Local\Temp\8824a0b912b42dc9ebd18c8e85a89680N.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.exe "c:\upwup\xyhgw.ygx",LoadXML C:\Users\Admin\AppData\Local\Temp\muqmzchgt.exe4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
\??\c:\windows\SysWOW64\taskkill.exetaskkill /f /im attrib.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5b71c1f3a123eef257424066c431a234c
SHA12d8b50677017364aeba3470b517a3f3ba2935a13
SHA2561a2ee067f462f39a2826b36c6955cf25e731476199f96e2105a2cf19ee521e18
SHA51250c3fdded9f06eea0b7f8d562431bffc878a091cdd1851f8161c0722569b810021ebea71b8deb29da3e74dc2bbb0f74027158b5070d8b8d9a990b86aaa460467
-
Filesize
68KB
MD5230bd5cd04a5f8ea04af339783d1bf58
SHA1803b2400b5e2146853dca3908e58f96bd554f1e0
SHA2567590edd94bd18449a3432a0054cf3e6ed53f8bd01202e1706f82f83056c0f029
SHA5129500742bc2798e94e78ae24736b51c5294e4aecce5c1e3b77151fdf04fc7ac0da8eda8be5a6a9c5cc44308eb2ea6c40902f6b4ab1d0997ece103e83a97ab0729