Analysis
-
max time kernel
111s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe
Resource
win10v2004-20240802-en
General
-
Target
e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe
-
Size
3.0MB
-
MD5
6686cfc1e54c222aaebb740445aade20
-
SHA1
e021aa9730147cb596d320e890d611a8bb8f7f5f
-
SHA256
e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5
-
SHA512
ad2dfb6a457b6c58e415f58743f2ab918c412ede0c70126cde56c1c2d566471f8a26b3186c8b7c3198bed342a0125eff9bf90362996d1d180b6c3267b408be23
-
SSDEEP
49152:B+ZBawcbuRhRRphn+ZBawcbuRhRRphgfxx33333U333R/EO:2xx33333U333R/EO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation LocalwsBNDGTKsa.exe -
Executes dropped EXE 2 IoCs
pid Process 3404 LocalwsBNDGTKsa.exe 116 New Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Client.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings LocalwsBNDGTKsa.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings New Client.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4588 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4588 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4896 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4896 AUDIODG.EXE Token: 33 4588 vlc.exe Token: SeIncBasePriorityPrivilege 4588 vlc.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe 4588 vlc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4588 vlc.exe 4588 vlc.exe 3524 OpenWith.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3404 5068 e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe 82 PID 5068 wrote to memory of 3404 5068 e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe 82 PID 5068 wrote to memory of 4588 5068 e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe 83 PID 5068 wrote to memory of 4588 5068 e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe 83 PID 3404 wrote to memory of 4500 3404 LocalwsBNDGTKsa.exe 84 PID 3404 wrote to memory of 4500 3404 LocalwsBNDGTKsa.exe 84 PID 3404 wrote to memory of 116 3404 LocalwsBNDGTKsa.exe 85 PID 3404 wrote to memory of 116 3404 LocalwsBNDGTKsa.exe 85 PID 3404 wrote to memory of 116 3404 LocalwsBNDGTKsa.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe"C:\Users\Admin\AppData\Local\Temp\e133598986814885d4fbcaa714b4374e282519d89134c05a84f8b9e12d558ad5N.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\LocalwsBNDGTKsa.exe"C:\Users\Admin\AppData\LocalwsBNDGTKsa.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\cfAUzMzm.webm"3⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\New Client.exe"C:\Users\Admin\AppData\Local\Temp\New Client.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:116
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\LocalkyFJdfVSIY..mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4588
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2cc 0x41c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD572dcbd7d55a57e29652bc58848dd3e7e
SHA1ef89f80d7677b5fb6a93c53c26a3bb515f746ec5
SHA25651f65f413ac8faff2e9612bac975c3f3647355de902c370da0379be4e5d2a7a5
SHA5125537486738f5a6fa78e927f89f42de51c457e9143bef19c75eadbaeaeb450b395de60f4d17f005854f9eaacfd602a9a5d1cd536a67194f763e2e3a7f10517c28
-
Filesize
854KB
MD5d9f461ff253aad8d7683997fc65d3877
SHA1b05ac4846aff44a2d7859fdbfe870e3e9515ba04
SHA25615f297e1bfb3ee212f476ef405e7da9ea37ccd289c7e67ac8cb7fd7c113c50fc
SHA51206f3c022fd9b4323d6ce30632c0a9b1126720084438e78682557f43de91ddbf4a308b5c3cda4cc9c92f6145d650c9e5bab7343b8fb8698def118ec387b89b2bc
-
Filesize
1.3MB
MD5f9896bfa0340efc69aa84ef32e53bf80
SHA14ace5edf26daf72f6fa54372c558d838f5916f8a
SHA256b9ff8c78b466daabf8bd306903156a0ff3abead54c62bee33d3f9995c5c86348
SHA51228550a8149589ddbf136963cd20233d77b530258af48ed0e0e84168e31d7159bfbdc01728b96126ac668f1fb5fda903f12afe9db516af9bd1486202820343633