Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe
Resource
win10v2004-20241007-en
General
-
Target
d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe
-
Size
172KB
-
MD5
836f47db0811046178129bbe3097aa7d
-
SHA1
a63d6916c8e663e80f76c51b389a3c7cec60d49c
-
SHA256
d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280
-
SHA512
3f1c1ab2b2f12ed6ee11ebfb983c4a52e96e9598310dc6bb706795442082a5037a4b79d15912bf52e3ac0062483bee6ba0d1446177f142a7888a2343b4029bae
-
SSDEEP
3072:d14mOxrKFNZYhrgtRFuV2DDbuiTf3hPsOraS87FYqjTZbn4TGh:dnYWYhrgtRo6DSiTf3hPswa1TZjxh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent5 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\DDH8DB~1.EXE" backgroundTaskHost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira backgroundTaskHost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast backgroundTaskHost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod backgroundTaskHost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3028 set thread context of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backgroundTaskHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe 1360 backgroundTaskHost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 3028 wrote to memory of 1360 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 85 PID 1360 wrote to memory of 3028 1360 backgroundTaskHost.exe 82 PID 1360 wrote to memory of 3028 1360 backgroundTaskHost.exe 82 PID 1360 wrote to memory of 3028 1360 backgroundTaskHost.exe 82 PID 1360 wrote to memory of 3028 1360 backgroundTaskHost.exe 82 PID 1360 wrote to memory of 3028 1360 backgroundTaskHost.exe 82 PID 1360 wrote to memory of 3028 1360 backgroundTaskHost.exe 82 PID 1360 wrote to memory of 3028 1360 backgroundTaskHost.exe 82 PID 3028 wrote to memory of 1492 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 87 PID 3028 wrote to memory of 1492 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 87 PID 3028 wrote to memory of 1492 3028 d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe 87 PID 1492 wrote to memory of 1972 1492 cmd.exe 91 PID 1492 wrote to memory of 1972 1492 cmd.exe 91 PID 1492 wrote to memory of 1972 1492 cmd.exe 91 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1972 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe"C:\Users\Admin\AppData\Local\Temp\d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\backgroundTaskHost.exe"backgroundTaskHost.exe"2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\cjkA29E.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\d9ad0ed4bc5a64761993e5742b7f80a6b98a3eb13866d830eefe527d56b7b280.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1972
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD53cf5abe2c8aff957ba1e86c7fefecdcc
SHA1dbec05259aecfc73695ddcddc0705497995db1d5
SHA25698119cbdcfe616afaf68b23cbb3b05d282008e9ecf67fb6dc9814196bf1c745c
SHA51282505c65250a1d388c1a457fddc6dde80ef141dae91987e1dfd6b9de06b8d8f848675afd6bdf0d6e94a21909e06e8cfe62a3f1fd93405f2578e264774bac32e9
-
Filesize
29B
MD5ab20df5255f7c137ebfe6b7b0ac85f47
SHA1d7810d1fbcc9786ce781f560f9b1cd1c7dc0cb41
SHA256f6c6e167293e2a21eff85c78df2f9bf7e139981cfa1b377d20285f4c8ed09132
SHA51211541a90b6b6c1af561c5df6a0176b7e372e0766ac57770422f1d50df201bd39cfe2e6feec0e37c6aa54f2a2b46b57f61e4dae0f569b4c1648058a76a0163b23
-
Filesize
59B
MD581be4344ed82df2fdc8cc2a7bedc1ddd
SHA1c5d43e904fff300b5b575f3f989b3b6d13386a58
SHA25621b302506d6dbf0a02eeb254a194cb2f7c64b2a24b22a2322f6edcfa57ed06b1
SHA5128b19b40a68a237659713d9277e168de944d67e8dd5ff6e686a126edd6f0c38b9750e613d824bb24e1dda76b46d06488d0aa8f2f04fa9139ade57a6602d486fd3