Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe
Resource
win10v2004-20240802-en
General
-
Target
b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe
-
Size
191KB
-
MD5
fe77d628901694a44391928b9eaa5ef0
-
SHA1
434e9891c36d767e90d9f004c18e9a0fe4c1de52
-
SHA256
b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9
-
SHA512
81ebb218f7e980c60a4e7f572d609c6aae9f124609c7ff8b1b18e8d925503e3de992e1a7eddec863dcf73416eea31a2ae90906e12fb56c8890296703385fc9c2
-
SSDEEP
3072:I82162ffD2O2U9PGAZRc8SDdw0Gd3gbPD2gGm8IRZjB2tC0r5Lvet++6Qqwkv4rb:I8G6ufD7pPbc7pn8QbPDVZ3RD+C0la6B
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe:*:Enabled:Print Spooler" b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe -
Executes dropped EXE 1 IoCs
pid Process 3576 spooler.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Print Spooler = "C:\\Users\\Admin\\AppData\\Roaming\\spooler.exe" b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spooler.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3576 spooler.exe 3576 spooler.exe 3576 spooler.exe 3576 spooler.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3864 wrote to memory of 3524 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 56 PID 3864 wrote to memory of 3524 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 56 PID 3864 wrote to memory of 3524 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 56 PID 3864 wrote to memory of 2564 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 44 PID 3864 wrote to memory of 2564 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 44 PID 3864 wrote to memory of 2564 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 44 PID 3864 wrote to memory of 2588 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 45 PID 3864 wrote to memory of 2588 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 45 PID 3864 wrote to memory of 2588 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 45 PID 3864 wrote to memory of 2788 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 47 PID 3864 wrote to memory of 2788 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 47 PID 3864 wrote to memory of 2788 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 47 PID 3864 wrote to memory of 3524 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 56 PID 3864 wrote to memory of 3524 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 56 PID 3864 wrote to memory of 3524 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 56 PID 3864 wrote to memory of 3672 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 57 PID 3864 wrote to memory of 3672 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 57 PID 3864 wrote to memory of 3672 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 57 PID 3864 wrote to memory of 3848 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 58 PID 3864 wrote to memory of 3848 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 58 PID 3864 wrote to memory of 3848 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 58 PID 3864 wrote to memory of 3940 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 59 PID 3864 wrote to memory of 3940 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 59 PID 3864 wrote to memory of 3940 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 59 PID 3864 wrote to memory of 4004 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 60 PID 3864 wrote to memory of 4004 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 60 PID 3864 wrote to memory of 4004 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 60 PID 3864 wrote to memory of 4088 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 61 PID 3864 wrote to memory of 4088 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 61 PID 3864 wrote to memory of 4088 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 61 PID 3864 wrote to memory of 3700 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 62 PID 3864 wrote to memory of 3700 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 62 PID 3864 wrote to memory of 3700 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 62 PID 3864 wrote to memory of 2688 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 75 PID 3864 wrote to memory of 2688 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 75 PID 3864 wrote to memory of 2688 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 75 PID 3864 wrote to memory of 3220 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 76 PID 3864 wrote to memory of 3220 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 76 PID 3864 wrote to memory of 3220 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 76 PID 3864 wrote to memory of 3576 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 82 PID 3864 wrote to memory of 3576 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 82 PID 3864 wrote to memory of 3576 3864 b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe 82 PID 3576 wrote to memory of 3524 3576 spooler.exe 56 PID 3576 wrote to memory of 3524 3576 spooler.exe 56 PID 3576 wrote to memory of 3524 3576 spooler.exe 56 PID 3576 wrote to memory of 2564 3576 spooler.exe 44 PID 3576 wrote to memory of 2564 3576 spooler.exe 44 PID 3576 wrote to memory of 2564 3576 spooler.exe 44 PID 3576 wrote to memory of 2588 3576 spooler.exe 45 PID 3576 wrote to memory of 2588 3576 spooler.exe 45 PID 3576 wrote to memory of 2588 3576 spooler.exe 45 PID 3576 wrote to memory of 2788 3576 spooler.exe 47 PID 3576 wrote to memory of 2788 3576 spooler.exe 47 PID 3576 wrote to memory of 2788 3576 spooler.exe 47 PID 3576 wrote to memory of 3524 3576 spooler.exe 56 PID 3576 wrote to memory of 3524 3576 spooler.exe 56 PID 3576 wrote to memory of 3524 3576 spooler.exe 56 PID 3576 wrote to memory of 3672 3576 spooler.exe 57 PID 3576 wrote to memory of 3672 3576 spooler.exe 57 PID 3576 wrote to memory of 3672 3576 spooler.exe 57 PID 3576 wrote to memory of 3848 3576 spooler.exe 58 PID 3576 wrote to memory of 3848 3576 spooler.exe 58 PID 3576 wrote to memory of 3848 3576 spooler.exe 58 PID 3576 wrote to memory of 3940 3576 spooler.exe 59
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2588
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2788
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe"C:\Users\Admin\AppData\Local\Temp\b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9N.exe"2⤵
- Modifies firewall policy service
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Roaming\spooler.exe"C:\Users\Admin\AppData\Roaming\spooler.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3576
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3672
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3848
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3940
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4004
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4088
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3700
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2688
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3220
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191KB
MD5fe77d628901694a44391928b9eaa5ef0
SHA1434e9891c36d767e90d9f004c18e9a0fe4c1de52
SHA256b9fea94be4dc076112d393ae7aa81e9e254b38e1c1c12f852d853355179b89a9
SHA51281ebb218f7e980c60a4e7f572d609c6aae9f124609c7ff8b1b18e8d925503e3de992e1a7eddec863dcf73416eea31a2ae90906e12fb56c8890296703385fc9c2