Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 09:27
Behavioral task
behavioral1
Sample
aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe
Resource
win7-20240903-en
General
-
Target
aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe
-
Size
986KB
-
MD5
22a2278fc97db1a510ef9a2fbf5d7e90
-
SHA1
6c180bb95fb3bd856bd941ec6e9096058ba5536b
-
SHA256
aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5
-
SHA512
9810975b5816c8fdb6e218efc09f92b06e795d01cb33fb323b414441b3235eb3c4a174eea514490c5aeb7f6ba10eb238631caf81f7bad3e98b4fd89a92929c58
-
SSDEEP
24576:CAEENIq8XwyVPQclDq/+WnpITZ4ATlZfHeuAEx3qs:CAEsw722WnI3PeuAWt
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\x32\\upd.exe" aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe -
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile upd.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" upd.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" upd.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" upd.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" upd.exe -
Disables Task Manager via registry modification
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate upd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 upd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\x32\\upd.exe" aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\x32\upd.exe aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe File opened for modification C:\Windows\x32\upd.exe aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe File opened for modification C:\Windows\x32\ aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3156 2420 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2472 PING.EXE -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier upd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier upd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 upd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString upd.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier upd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2472 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeSecurityPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeTakeOwnershipPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeLoadDriverPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeSystemProfilePrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeSystemtimePrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeProfSingleProcessPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeIncBasePriorityPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeCreatePagefilePrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeBackupPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeRestorePrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeShutdownPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeDebugPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeSystemEnvironmentPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeChangeNotifyPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeRemoteShutdownPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeUndockPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeManageVolumePrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeImpersonatePrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeCreateGlobalPrivilege 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: 33 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: 34 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: 35 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: 36 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe Token: SeIncreaseQuotaPrivilege 2420 upd.exe Token: SeSecurityPrivilege 2420 upd.exe Token: SeTakeOwnershipPrivilege 2420 upd.exe Token: SeLoadDriverPrivilege 2420 upd.exe Token: SeSystemProfilePrivilege 2420 upd.exe Token: SeSystemtimePrivilege 2420 upd.exe Token: SeProfSingleProcessPrivilege 2420 upd.exe Token: SeIncBasePriorityPrivilege 2420 upd.exe Token: SeCreatePagefilePrivilege 2420 upd.exe Token: SeBackupPrivilege 2420 upd.exe Token: SeRestorePrivilege 2420 upd.exe Token: SeShutdownPrivilege 2420 upd.exe Token: SeDebugPrivilege 2420 upd.exe Token: SeSystemEnvironmentPrivilege 2420 upd.exe Token: SeChangeNotifyPrivilege 2420 upd.exe Token: SeRemoteShutdownPrivilege 2420 upd.exe Token: SeUndockPrivilege 2420 upd.exe Token: SeManageVolumePrivilege 2420 upd.exe Token: SeImpersonatePrivilege 2420 upd.exe Token: SeCreateGlobalPrivilege 2420 upd.exe Token: 33 2420 upd.exe Token: 34 2420 upd.exe Token: 35 2420 upd.exe Token: 36 2420 upd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 436 wrote to memory of 2420 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe 86 PID 436 wrote to memory of 2420 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe 86 PID 436 wrote to memory of 2420 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe 86 PID 436 wrote to memory of 5032 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe 87 PID 436 wrote to memory of 5032 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe 87 PID 436 wrote to memory of 5032 436 aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe 87 PID 5032 wrote to memory of 2472 5032 cmd.exe 91 PID 5032 wrote to memory of 2472 5032 cmd.exe 91 PID 5032 wrote to memory of 2472 5032 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe"C:\Users\Admin\AppData\Local\Temp\aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies security service
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\x32\upd.exe"C:\Windows\x32\upd.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 6883⤵
- Program crash
PID:3156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_dcsc_.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2420 -ip 24201⤵PID:2708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD5473cf59101857d250d38fa73cdfeb27c
SHA1d33d674c92974e04766cc221378ab1b019f8bff8
SHA2564d1261de7866d1d9048b4da9f283f256c692d739d0cd7d1e24a1bf4cf43282b0
SHA512851a93900fac7d764e41975dfc8242f698861046649530bd105bf76e4313f8de338f99e8231572695e87a3d5537be944aeeaca2cf488cac49c4dd95c04924078
-
Filesize
986KB
MD522a2278fc97db1a510ef9a2fbf5d7e90
SHA16c180bb95fb3bd856bd941ec6e9096058ba5536b
SHA256aea5d3574ce30782d8079cb72ba9d7c7d63e3ef0c7d9f9356297b27b923143d5
SHA5129810975b5816c8fdb6e218efc09f92b06e795d01cb33fb323b414441b3235eb3c4a174eea514490c5aeb7f6ba10eb238631caf81f7bad3e98b4fd89a92929c58