Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe
Resource
win10v2004-20241007-en
General
-
Target
dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe
-
Size
229KB
-
MD5
54f3c499071167f9889b0e75f9ce7050
-
SHA1
c5379e57ef22282d0211f5a248c2a65e4f9f5a0c
-
SHA256
dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cf
-
SHA512
f66f5338084bebd80f96239e243ef65be072a7e41023c0f2e459e673a64a9dba83a0e38f5b9f02c9737a9f758843821306848ccd0f08b5d1e10c8a72fe93c6d7
-
SSDEEP
6144:jv2FOjUf9CYGuztMAToAQjgb3hAgwD6EQp2NzTB/+E1JT2HVU/nI+wNwp:qFOwEYGKnQj8bnEQaN1OU/nI+wNwp
Malware Config
Extracted
xehook
2.1.5 Stable
https://t.me/+w897k5UK_jIyNDgy
-
id
374
-
token
xehook374778380619291
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exepid Process 2292 dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exedescription pid Process procid_target PID 2292 set thread context of 2512 2292 dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exeMSBuild.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid Process Token: SeDebugPrivilege 2512 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exedescription pid Process procid_target PID 2292 wrote to memory of 2512 2292 dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe 86 PID 2292 wrote to memory of 2512 2292 dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe 86 PID 2292 wrote to memory of 2512 2292 dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe 86 PID 2292 wrote to memory of 2512 2292 dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe 86 PID 2292 wrote to memory of 2512 2292 dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe 86 PID 2292 wrote to memory of 2512 2292 dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe 86 PID 2292 wrote to memory of 2512 2292 dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe 86 PID 2292 wrote to memory of 2512 2292 dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe"C:\Users\Admin\AppData\Local\Temp\dce468e184c4d8413bad29aaf43f80fd4afee549e943c38d835fca9ffc7ee4cfN.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD54467c8234956f1e5172dab4684a7bc0d
SHA13f5d026f428b8ce6f5b59516a5bdaf70caa19a1a
SHA25600ef1ee4a787b9082a9f467dcf18b7962c1a6fc31ac9bf2d2e1abe4ede461d35
SHA512bf407425bf3a97938292504b2e550a3b7654ad11c955733eeb89020caab4a6f11eaac4760901a20fc1632527783284136f985adc30726c25955012bd7c53120f