Analysis

  • max time kernel
    118s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 13:00

General

  • Target

    fcf90875dc813123658e39b06171a128465bf91dad3beff7eaa6574628397ddcN.exe

  • Size

    90KB

  • MD5

    59c3a2ba46fbef9e82930522b8dbbc00

  • SHA1

    ffbc4a498e2cf5669714c3e9aebbdce954914a19

  • SHA256

    fcf90875dc813123658e39b06171a128465bf91dad3beff7eaa6574628397ddc

  • SHA512

    b056776e5ac9b763a9046d118f54b7759b0a34a71dd585659727848ae57d7ba181935c2023e598e6b7293e3d19ab1db9cb6ea6644ed5e1d86e1516cc9768511d

  • SSDEEP

    768:Qvw9816vhKQLrolk4/wQRNrfrunMxVFA3b7glws:YEGh0oGl2unMxVS3Hgz

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcf90875dc813123658e39b06171a128465bf91dad3beff7eaa6574628397ddcN.exe
    "C:\Users\Admin\AppData\Local\Temp\fcf90875dc813123658e39b06171a128465bf91dad3beff7eaa6574628397ddcN.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Windows\{9B4FCE4D-5B1A-45c8-9D82-8FEC211A091B}.exe
      C:\Windows\{9B4FCE4D-5B1A-45c8-9D82-8FEC211A091B}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Windows\{A7308CD9-76BD-43b9-B645-F322DB95C6CE}.exe
        C:\Windows\{A7308CD9-76BD-43b9-B645-F322DB95C6CE}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3712
        • C:\Windows\{AF7F4EF0-F747-4687-ACC0-685CDEC2675B}.exe
          C:\Windows\{AF7F4EF0-F747-4687-ACC0-685CDEC2675B}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Windows\{24DE75D4-E27A-4012-8A95-1CE7C5338FED}.exe
            C:\Windows\{24DE75D4-E27A-4012-8A95-1CE7C5338FED}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:872
            • C:\Windows\{7B5137FE-F750-4ba5-8E1D-484430644F8C}.exe
              C:\Windows\{7B5137FE-F750-4ba5-8E1D-484430644F8C}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1384
              • C:\Windows\{3ACDC998-3841-4ba6-920F-FB0C2CF983A8}.exe
                C:\Windows\{3ACDC998-3841-4ba6-920F-FB0C2CF983A8}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2820
                • C:\Windows\{38F1CA60-F6F3-4aa8-B210-CC132F7FFE6C}.exe
                  C:\Windows\{38F1CA60-F6F3-4aa8-B210-CC132F7FFE6C}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:372
                  • C:\Windows\{DC2D9F7D-F87A-4cf8-842B-1F243A191988}.exe
                    C:\Windows\{DC2D9F7D-F87A-4cf8-842B-1F243A191988}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2752
                    • C:\Windows\{AA2E8C80-21CC-4154-ACF3-D8D4BDC8AAB7}.exe
                      C:\Windows\{AA2E8C80-21CC-4154-ACF3-D8D4BDC8AAB7}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4176
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{DC2D9~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:4180
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{38F1C~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:2292
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{3ACDC~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2164
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{7B513~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4188
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{24DE7~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1996
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{AF7F4~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:928
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{A7308~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4512
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{9B4FC~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2424
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\FCF908~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{24DE75D4-E27A-4012-8A95-1CE7C5338FED}.exe

    Filesize

    90KB

    MD5

    41c43aed49d10470fde63e9df1b7c843

    SHA1

    cbaffaa8d69e0a96b2cb432854ec706d9112d585

    SHA256

    09962737e872debf22269a413004448f8fa45ae5068ddb7e13eb5069e56ac5d8

    SHA512

    6afb963d79d9e8e971ee2f75598f75fe2af0a00e2417d2d4ad652e9788d182d29d41f06f76953202f41fdb93eef4c2cc451aa4db0bb76ca3cfe551ed8d14c4fe

  • C:\Windows\{38F1CA60-F6F3-4aa8-B210-CC132F7FFE6C}.exe

    Filesize

    90KB

    MD5

    f482f4221067dfa130942ff78c4b0d6e

    SHA1

    59e5476c92156e80969f49407bb8aa8fc04808de

    SHA256

    cf2a50a6e3eb62a41a1d69055ddcebdd6f7a181560a4f0f5eaecfff755ba7d2c

    SHA512

    59c594f94bf26230b95066bc75aeef0f2365e057505b9bf25b09ae742e2a8056ebd9e08b6cf2e4daaa247e54376f651a261fb12da8e1c835a98fd421d19971f9

  • C:\Windows\{3ACDC998-3841-4ba6-920F-FB0C2CF983A8}.exe

    Filesize

    90KB

    MD5

    c747d71f213caf54261db40c5bb95a3b

    SHA1

    21a1ff64a495985ed07b7d85483b26bcaf94e854

    SHA256

    e7b0cb1fb803cc71898cc437aa69fbb54ec92be45b15cc73c9c54e94f6c1ff96

    SHA512

    1bdeb8952029b750ca3ec551b09d7f135e92b933c1e6844dd98edb7759457d71f684199ebae25add23025e7c7557839922e4b55e26efd19c83b0f57122b58206

  • C:\Windows\{7B5137FE-F750-4ba5-8E1D-484430644F8C}.exe

    Filesize

    90KB

    MD5

    76a27b8b51954baac9a2a8fc497c0b43

    SHA1

    882337d2025a8983b64a503604445781df5a0115

    SHA256

    923b0b50b1b90009bd598135e04e5fefb0585dffbcea282008e4530daff380e8

    SHA512

    9c1c58d23750e706960b272d121c58a012c5cec97c1ea1e0a0ed1db83be5112180f9029f62cf865fd55969b28c027cf1950076b4f954abf5d1b5cea0e86a564d

  • C:\Windows\{9B4FCE4D-5B1A-45c8-9D82-8FEC211A091B}.exe

    Filesize

    90KB

    MD5

    81c58f14a9650e4dbda4a04ebb82d377

    SHA1

    f349efa529a313830e3d9a1c64a022a3cb34afa3

    SHA256

    fb4c62d1c65f722ea3932af42eeea045ebf64a51fa4e9bee60abbebafb6e967f

    SHA512

    3620674a54b1bce77c9c16460a33ce54a0673808ba03a13931df0e7fd685585404e05ca48635f290b0675b83f40499195357019d12cba737c0c54442c5f041ea

  • C:\Windows\{A7308CD9-76BD-43b9-B645-F322DB95C6CE}.exe

    Filesize

    90KB

    MD5

    044cf481c522724883d022b3aae88b5d

    SHA1

    99337d4df7abd74fa1db9437d3b93844d936d214

    SHA256

    97d8c3370cc5c0de6dcbd3e77094cb069a20b886ac1e8cbc6602a30d7cac1643

    SHA512

    74438e69ae539ca2487f3a85f080f8706e436e72a92f42ed797b6d9403f2e8ee4637f8299c44c0497c056718195d45fc18206bf4d9e03137742865b1fe27c085

  • C:\Windows\{AA2E8C80-21CC-4154-ACF3-D8D4BDC8AAB7}.exe

    Filesize

    90KB

    MD5

    073af081569084858b31e94438f36ba3

    SHA1

    8821306ae4d86478ecc5765bad50b26d7c72fc32

    SHA256

    116aea8553d8de5efad40f5f41c144e39c82d8010927ebcc7004f2b1521f478a

    SHA512

    83f777b666a2fe07ecacb8c0e448c8bad82d0b9263f77c93a15fc5207363c25c8399b5f244facfb4bb3a344072816015b0a5fc4493b50d61d586f83cd0c0a738

  • C:\Windows\{AF7F4EF0-F747-4687-ACC0-685CDEC2675B}.exe

    Filesize

    90KB

    MD5

    3138303a62e002cede5dcab6296a5abf

    SHA1

    182c4cbc2a1c0eefb46f117170b42f4ad93d751d

    SHA256

    c66b4f9ad662bbeac113627003b27597e20db6679273fb41d3d22558cfdd10fe

    SHA512

    5d9ce1255bd5414a14f92077742471175d395f1cfedffa208c18355175102a088146a0a30ecaead343b9c9bca31df8af7340a1c9dc0346573f83486e17b39fe3

  • C:\Windows\{DC2D9F7D-F87A-4cf8-842B-1F243A191988}.exe

    Filesize

    90KB

    MD5

    df7b9895f81281e5a83c724b7f641223

    SHA1

    97434ffb2a5619579db4fdc153f225109a204b3c

    SHA256

    122ed32a88a6a98fdae587a075c57fd78ccf46121ab332f2a6adaee7179e6220

    SHA512

    091013adeec6075ddb7df4a24f8e417730f8ed5b6e227782dac8a760a93cd848ba68487561a53d7937b699357b564bdd20975e2c19e463a120867f8ba49d3a50