Analysis

  • max time kernel
    115s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 07:02

General

  • Target

    ec63af30d0ee34b1cbe9c92ca208d0d185ca6d9f3690d0fc20bd3747c0db48f9N.exe

  • Size

    94KB

  • MD5

    15dfb86a772b6fcaf01b71c67335a2a0

  • SHA1

    76182bd65644bc7bea39d6da9dd45ca5f69f0e63

  • SHA256

    ec63af30d0ee34b1cbe9c92ca208d0d185ca6d9f3690d0fc20bd3747c0db48f9

  • SHA512

    21a75adc84b7f9138141022c85b1880553c1cbbc725187aa9dfb77ad58af3b05a390d6ec4160042e0d6bb003965226c83a71eef64185d6606119d49a7857eef8

  • SSDEEP

    1536:o1qcQC5RtxcAra9RD4EFWR7sUMr4zqripZVVm0HpR:i35Rt6ka9REEFMgr4znu0JR

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 4 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec63af30d0ee34b1cbe9c92ca208d0d185ca6d9f3690d0fc20bd3747c0db48f9N.exe
    "C:\Users\Admin\AppData\Local\Temp\ec63af30d0ee34b1cbe9c92ca208d0d185ca6d9f3690d0fc20bd3747c0db48f9N.exe"
    1⤵
    • Modifies firewall policy service
    • Adds policy Run key to start application
    • Sets service image path in registry
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:4112
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3036,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:8
    1⤵
      PID:2316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\msrpc.exe

      Filesize

      95KB

      MD5

      bd5e743cfc6332bc689c36308b844eac

      SHA1

      5f50df0cbc93bc154700d440cf3e6e4b46cc69e7

      SHA256

      548c3a894a1c63f872c0b59de5ce3570e00a31545304843d98370af03a9c1be3

      SHA512

      8321395a063c5d63697d240d856e740497dbe091d9079d500bc0e849ba102d25f1ded43dc00610066cf13bbf01bd058f61bdbde69f0d0a4fca45e61a1eedbb50

    • memory/4112-0-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/4112-17-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/4112-18-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/4112-19-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/4112-20-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/4112-21-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/4112-22-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB