Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 01:31
Behavioral task
behavioral1
Sample
bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe
Resource
win10v2004-20241007-en
General
-
Target
bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe
-
Size
882KB
-
MD5
4127fc13c49cccdac5e9d33821e92c7d
-
SHA1
d401ac808c9db8f1000d7002849c5c7fc067f71d
-
SHA256
bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8
-
SHA512
954db6ce053d4cd4553855958cb6323a30b58ee7e5ecd91671458038e78bcd7dfd9e08ffa4c0a55351b6c4827ed177f40fdf5f01e422db0232fd243facbbbf82
-
SSDEEP
24576:oFS04YNEMuExDiU6E5R9s8xY/2l/dLOIbt+rA0E:o34auS+UjfU2TLOIbt+rw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe -
Executes dropped EXE 1 IoCs
pid Process 768 AudioDriver.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe File opened for modification C:\Windows\assembly\Desktop.ini bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe File created C:\Windows\assembly\Desktop.ini bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe File opened for modification C:\Windows\assembly\Desktop.ini bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AudioDriver.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe 768 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 768 AudioDriver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 768 AudioDriver.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 768 AudioDriver.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3416 wrote to memory of 768 3416 bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe 87 PID 3416 wrote to memory of 768 3416 bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe 87 PID 3416 wrote to memory of 768 3416 bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe"C:\Users\Admin\AppData\Local\Temp\bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882KB
MD54127fc13c49cccdac5e9d33821e92c7d
SHA1d401ac808c9db8f1000d7002849c5c7fc067f71d
SHA256bd0dfbc35aa1070260c273abc94e498b75330743e8113aa2de4cd085003161b8
SHA512954db6ce053d4cd4553855958cb6323a30b58ee7e5ecd91671458038e78bcd7dfd9e08ffa4c0a55351b6c4827ed177f40fdf5f01e422db0232fd243facbbbf82