Analysis
-
max time kernel
21s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
df20ca57c8eb53090fa730f7c4f0af90N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df20ca57c8eb53090fa730f7c4f0af90N.exe
Resource
win10v2004-20240802-en
General
-
Target
df20ca57c8eb53090fa730f7c4f0af90N.exe
-
Size
814KB
-
MD5
df20ca57c8eb53090fa730f7c4f0af90
-
SHA1
a1c6fa2e4f12b077a07ac03c67c551f325f2398d
-
SHA256
d9fb1b7e71358e78db856d1e848c640b4879f989f0bec3d70f3be0a74a9c5552
-
SHA512
94e9be1f656710d4f7327c49a51bb234189379db92c7c20012f08e7670a17e0a4c05d7e78db33e89d871062821ebacd3ee6e8f8f81636149843cc32ec22c1824
-
SSDEEP
24576:mRmJkcoQricOIQxiZY1iaoRpP5lCI6BeNCa:jJZoQrbTFZY1iao/5rse4a
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run df20ca57c8eb53090fa730f7c4f0af90N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\bs_stealth = "C:\\Users\\Admin\\AppData\\Roaming\\bs_stealth.exe" df20ca57c8eb53090fa730f7c4f0af90N.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run df20ca57c8eb53090fa730f7c4f0af90N.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\bs_stealth = "C:\\Users\\Admin\\AppData\\Roaming\\bs_stealth.exe" df20ca57c8eb53090fa730f7c4f0af90N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bs_stealth = "C:\\Users\\Admin\\AppData\\Roaming\\bs_stealth.exe" df20ca57c8eb53090fa730f7c4f0af90N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4512 set thread context of 4000 4512 df20ca57c8eb53090fa730f7c4f0af90N.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df20ca57c8eb53090fa730f7c4f0af90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df20ca57c8eb53090fa730f7c4f0af90N.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4000 df20ca57c8eb53090fa730f7c4f0af90N.exe Token: 33 3156 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3156 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4000 df20ca57c8eb53090fa730f7c4f0af90N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4512 wrote to memory of 4000 4512 df20ca57c8eb53090fa730f7c4f0af90N.exe 85 PID 4512 wrote to memory of 4000 4512 df20ca57c8eb53090fa730f7c4f0af90N.exe 85 PID 4512 wrote to memory of 4000 4512 df20ca57c8eb53090fa730f7c4f0af90N.exe 85 PID 4512 wrote to memory of 4000 4512 df20ca57c8eb53090fa730f7c4f0af90N.exe 85 PID 4512 wrote to memory of 4000 4512 df20ca57c8eb53090fa730f7c4f0af90N.exe 85 PID 4512 wrote to memory of 4000 4512 df20ca57c8eb53090fa730f7c4f0af90N.exe 85 PID 4512 wrote to memory of 4000 4512 df20ca57c8eb53090fa730f7c4f0af90N.exe 85 PID 4512 wrote to memory of 4000 4512 df20ca57c8eb53090fa730f7c4f0af90N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\df20ca57c8eb53090fa730f7c4f0af90N.exe"C:\Users\Admin\AppData\Local\Temp\df20ca57c8eb53090fa730f7c4f0af90N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\df20ca57c8eb53090fa730f7c4f0af90N.exe"C:\Users\Admin\AppData\Local\Temp\df20ca57c8eb53090fa730f7c4f0af90N.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4000
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x304 0x3841⤵
- Suspicious use of AdjustPrivilegeToken
PID:3156