Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 01:09
Behavioral task
behavioral1
Sample
8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe
Resource
win7-20240903-en
General
-
Target
8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe
-
Size
2.0MB
-
MD5
a5cf2917d81abb059c3f25ac3a6e7c5d
-
SHA1
978f32dcbe7191f3f4b06abf67335f2f75a5161e
-
SHA256
8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10
-
SHA512
a10c088c8aeef4991bb5877b0c402247bd4549525341d46f572012d0a17e15a87380486fe1a24c60931df2792245046e5835cecde20e4f6c5c973784cb3ea9c8
-
SSDEEP
6144:Bl51orRJXlDixHkUXe35rGcEOkCybEaQRXr9HNdvOasDaUhOVlBKN0eet4u55iok:fqXUHkUXe39sOkx2LIaqhOVl0N0ee8D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4772 8f62950 -
Unexpected DNS network traffic destination 14 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 114.114.114.114 -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\81B9B36F9ABC4DA631A4713EE66FAEC6_3AF0FDC80EA858911339035786739FF3 8f62950 File created C:\Windows\SysWOW64\8f62950 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 8f62950 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies 8f62950 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData 8f62950 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66F835E41EC6A985EB9271E4A70169D7_CF44E3C99F7F4AC558EEB35244F7E046 8f62950 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content 8f62950 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\81B9B36F9ABC4DA631A4713EE66FAEC6_3AF0FDC80EA858911339035786739FF3 8f62950 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE 8f62950 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 8f62950 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft 8f62950 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache 8f62950 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66F835E41EC6A985EB9271E4A70169D7_CF44E3C99F7F4AC558EEB35244F7E046 8f62950 -
resource yara_rule behavioral2/memory/3660-0-0x0000000000550000-0x00000000005D9000-memory.dmp upx behavioral2/files/0x000800000002342c-2.dat upx behavioral2/memory/4772-3-0x0000000000080000-0x0000000000109000-memory.dmp upx behavioral2/memory/3660-16-0x0000000000550000-0x00000000005D9000-memory.dmp upx behavioral2/memory/4772-18-0x0000000000080000-0x0000000000109000-memory.dmp upx behavioral2/memory/4772-20-0x0000000000080000-0x0000000000109000-memory.dmp upx behavioral2/memory/3660-35-0x0000000000550000-0x00000000005D9000-memory.dmp upx behavioral2/memory/4772-36-0x0000000000080000-0x0000000000109000-memory.dmp upx behavioral2/memory/3660-37-0x0000000000550000-0x00000000005D9000-memory.dmp upx behavioral2/memory/4772-38-0x0000000000080000-0x0000000000109000-memory.dmp upx behavioral2/memory/3660-47-0x0000000000550000-0x00000000005D9000-memory.dmp upx behavioral2/memory/3660-48-0x0000000000550000-0x00000000005D9000-memory.dmp upx behavioral2/memory/3660-49-0x0000000000550000-0x00000000005D9000-memory.dmp upx behavioral2/memory/3660-55-0x0000000000550000-0x00000000005D9000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\51b2c8 8f62950 File opened for modification C:\Windows\3ea918 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f62950 -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 8f62950 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 8f62950 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 8f62950 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 8f62950 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 8f62950 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 8f62950 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing 8f62950 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 8f62950 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 8f62950 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4772 8f62950 4772 8f62950 4772 8f62950 4772 8f62950 4772 8f62950 4772 8f62950 4772 8f62950 4772 8f62950 3660 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe 3660 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe 3660 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe 3660 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe 3660 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe 3660 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3660 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe Token: SeTcbPrivilege 3660 8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe Token: SeDebugPrivilege 4772 8f62950 Token: SeTcbPrivilege 4772 8f62950
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe"C:\Users\Admin\AppData\Local\Temp\8d941a926cdbf70894e8e9b606bf172b00852758e579e196ac23d864e7319a10.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
C:\Windows\Syswow64\8f62950C:\Windows\Syswow64\8f629501⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD58a4e83bafb039bd82cb5a99545d2dbc2
SHA142794344ce75302f20aad4e7728f0fdbffc749c6
SHA2566f16841edd2b5c19b85dfa9b5c6c906b894a15f406ac082e2d585868de0d2420
SHA512f1ef487ab258f6a52896f459afc061c3d7a9bdeb95f652bb06d2298885867d178ec4c99bd618543b4a3875dbe3a335b7b3ac625e1a2d1b0543d1e687bb5065cf