Analysis
-
max time kernel
120s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 08:18
Behavioral task
behavioral1
Sample
8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe
Resource
win7-20240729-en
General
-
Target
8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe
-
Size
729KB
-
MD5
0274d0c3fba041672ba08a50d8da8c70
-
SHA1
0e1863c7389bc22caab98503000b6c4ac46360ca
-
SHA256
8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3
-
SHA512
8d84078b678714bbdb92932d7abda82a50eee86caae74fb7f1e435f4907e06e20d8bb60d71dc244a434afe4dea057eecc14ce8302e2d234d1df54569a6d6fae1
-
SSDEEP
12288:8Db/rbpa6Fddy43eiUMSYjlpXS6zVFqsEVDVj+ek1PxXHqyq+Sb2zQnmvvoe:8bbpa6FXyiUea6zNEVDV6eAxXKyq3aVV
Malware Config
Signatures
-
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\State = "146944" 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe -
Executes dropped EXE 1 IoCs
pid Process 452 clientbarviow.exe -
Loads dropped DLL 1 IoCs
pid Process 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe -
resource yara_rule behavioral2/files/0x00070000000234ee-16.dat vmprotect behavioral2/memory/2024-17-0x0000000010000000-0x0000000010008000-memory.dmp vmprotect behavioral2/memory/2024-21-0x0000000010000000-0x0000000010008000-memory.dmp vmprotect -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\cfghw.tmp 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe -
resource yara_rule behavioral2/memory/2024-0-0x0000000000400000-0x00000000005C0000-memory.dmp upx behavioral2/memory/2024-15-0x0000000000400000-0x00000000005C0000-memory.dmp upx behavioral2/memory/2024-30-0x0000000000400000-0x00000000005C0000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clientbarviow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\IESettingSync 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe 452 clientbarviow.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSystemtimePrivilege 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe Token: SeSystemtimePrivilege 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe Token: SeSystemtimePrivilege 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe Token: SeSystemtimePrivilege 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2024 wrote to memory of 452 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe 82 PID 2024 wrote to memory of 452 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe 82 PID 2024 wrote to memory of 452 2024 8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe 82 PID 452 wrote to memory of 324 452 clientbarviow.exe 83 PID 452 wrote to memory of 324 452 clientbarviow.exe 83 PID 452 wrote to memory of 324 452 clientbarviow.exe 83 PID 324 wrote to memory of 4572 324 net.exe 85 PID 324 wrote to memory of 4572 324 net.exe 85 PID 324 wrote to memory of 4572 324 net.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe"C:\Users\Admin\AppData\Local\Temp\8c074a50a582d89401af738650761c1335110124b29c7e507e459319a2f17fc3N.exe"1⤵
- Manipulates Digital Signatures
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\windows\temp\clientbarviow.exec:\windows\temp\clientbarviow.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:4572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD57e9c40b02c42cd151bb63e019ca4c798
SHA13eedef98d5846e548ccd842a965e14cdfcaf9c45
SHA2567f6953343d87820f5a22c04e51fe5c652acfb8c459f808e85dbdf5e35e45893d
SHA5120aad3a89ed48551c7b7065bb6e40350ed3e8c8f0bd6976b321daa4c4fa35086a3b29d8ca58ea038156ce5f00e76d6640f99f752d044688a8ab501a6e8391659b
-
Filesize
6KB
MD53b6ce9bf02eb7b7842d46e59c9950054
SHA1466879d445e04eb7c7158e41eb17a5bfde94c8ec
SHA256bdb80af9d49bd41dee5f7d7a28c86257663331795a2a154e104a65cf0c22f9af
SHA512d4aced2272c43e906639cf439d1be5afbab539afa1b265c7e38aab4e548179badc9cf346f99a85ff5ce1b00d68ceb373307af408ee53bfee810bfb3806f4ab50
-
Filesize
16KB
MD5dc496987d75b5e592112605a2dbd8532
SHA1758513f98b8765aa17219c5c4a9afd177dee2832
SHA256e07e564b08899a594905bd503090321754df7c1c01acedc91bc3853c41c716dd
SHA512f2949ab15b83f7448619e7b6adead063bd2d1a616249f3bc22c200133303b49d8541b53418ae993770070cd9576abf34237d21f8441b693c8d35c6107066d7f8