Analysis
-
max time kernel
140s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 01:05
Behavioral task
behavioral1
Sample
afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe
Resource
win10v2004-20240802-en
General
-
Target
afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe
-
Size
34KB
-
MD5
a871569f23965886ada3170e754c9bb0
-
SHA1
617ac3c3fe11516be01de4551b9e23274eb0fd30
-
SHA256
afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e
-
SHA512
a36feaa08ee6eb4f808ad39883e19db96a345b820982fb763bcf0a5c21371553ba3bb541a8381a4a16d6d271b02a9c9d6b1c1e976fcea771f4a7ca050759902f
-
SSDEEP
768:LXBetSsydNreP5O36AIh0ktNGn262GbdBKfoz1LM1TcrtP5JtJ:rBet4ARO9I+ktcn2sdvzlM1TcrtP5TJ
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\userun32 = "c:\\windows\\userun32.exe" afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\internat = "c:\\windows\\internat.exe" afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\internat\ImagePath = "c:\\windows\\internat.exe" afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe -
resource yara_rule behavioral2/memory/2156-0-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2156-1-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x000800000002345b-10.dat upx behavioral2/memory/2156-18-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/2156-19-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\internat = "c:\\windows\\internat.exe" afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\internat = "c:\\windows\\internat.exe" afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass32 = "c:\\windows\\lsass32.exe" afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\r: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\q: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\j: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\i: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\h: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\e: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\y: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\x: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\u: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\t: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\k: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\s: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\p: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\l: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\g: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\w: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\v: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\o: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\n: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened (read-only) \??\m: afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\regedit.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification \??\c:\windows\userun32.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened for modification \??\c:\windows\calc.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened for modification \??\c:\windows\regedit2.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened for modification \??\c:\windows\lsass32.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File created \??\c:\windows\userun32.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File created \??\c:\windows\calc.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File created \??\c:\windows\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\msoffice.scr afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File created \??\c:\windows\Start Menu\Programs\Startup\msoffice.scr afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened for modification \??\c:\windows\mui\modem.sys afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File created \??\c:\windows\internat.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File created \??\c:\windows\regedit2.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File opened for modification \??\c:\windows\internat.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe File created \??\c:\windows\lsass32.exe afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6ABE4A8-C73A-305A-BFEF-E4FA2BC9D8A9} afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6ABE4A8-C73A-305A-BFEF-E4FA2BC9D8A9}\ThisEXE = "c:\\users\\admin\\appdata\\local\\temp\\afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe" afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6ABE4A8-C73A-305A-BFEF-E4FA2BC9D8A9}\VerProg = "113" afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe"C:\Users\Admin\AppData\Local\Temp\afa9dd688b958bd13c42cca8bad013c5e14c1ce1136cb031d4e464057a90506e.exe"1⤵
- Adds policy Run key to start application
- Sets service image path in registry
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5a0afc3138d27c2d531ebe76f86b0014a
SHA16fb48a2a4cd76b338a9094efa54224fe2f0eb635
SHA256466f5b59696c0ce9c25ead75b3da6032d3ccb231d62c7a7394043c11a223646b
SHA512ed1352d03e3b62e3f3d4555d207fb709099a6df52d9ae1692a22db710cf5a360d90670cbb63b177c17fdf02fa12c76dbd2d791782b268a66d4c4320ba9aebbd5