Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe
Resource
win7-20240903-en
General
-
Target
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe
-
Size
88KB
-
MD5
8b97b5ed374d6e68451e6742133c3630
-
SHA1
061b5daf8569180fb017b3df17ef7a9ba17e983d
-
SHA256
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86
-
SHA512
3d5639a3459fcd1f33c4119b93bc15b875bae023da7933f5d3e964aac1c2bde4a2374faa35f0080bfaa7135c4840deab0877ba4b17d5437b4be32bdfe81bc799
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEn:6D0ctAVA/bmxIMnoKjyR/Nn
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 2 IoCs
resource yara_rule behavioral2/memory/2112-60-0x0000000000530000-0x0000000000535000-memory.dmp family_andromeda behavioral2/memory/2112-64-0x0000000000530000-0x0000000000535000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\47195 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msnoypj.bat" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe -
Executes dropped EXE 3 IoCs
pid Process 376 winlogonr.exe 920 winlogonr.exe 1072 winlogonr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogonr\\winlogonr.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum winlogonr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 winlogonr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4132 set thread context of 3772 4132 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 93 PID 376 set thread context of 920 376 winlogonr.exe 100 PID 376 set thread context of 1072 376 winlogonr.exe 101 -
resource yara_rule behavioral2/memory/3772-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3772-8-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3772-10-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3772-36-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3772-52-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/920-66-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msnoypj.bat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1072 winlogonr.exe 1072 winlogonr.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1072 winlogonr.exe 1072 winlogonr.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe Token: SeDebugPrivilege 920 winlogonr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4132 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 3772 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 376 winlogonr.exe 920 winlogonr.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4132 wrote to memory of 3772 4132 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 93 PID 4132 wrote to memory of 3772 4132 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 93 PID 4132 wrote to memory of 3772 4132 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 93 PID 4132 wrote to memory of 3772 4132 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 93 PID 4132 wrote to memory of 3772 4132 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 93 PID 4132 wrote to memory of 3772 4132 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 93 PID 4132 wrote to memory of 3772 4132 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 93 PID 4132 wrote to memory of 3772 4132 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 93 PID 3772 wrote to memory of 3020 3772 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 94 PID 3772 wrote to memory of 3020 3772 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 94 PID 3772 wrote to memory of 3020 3772 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 94 PID 3020 wrote to memory of 4520 3020 cmd.exe 97 PID 3020 wrote to memory of 4520 3020 cmd.exe 97 PID 3020 wrote to memory of 4520 3020 cmd.exe 97 PID 3772 wrote to memory of 376 3772 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 98 PID 3772 wrote to memory of 376 3772 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 98 PID 3772 wrote to memory of 376 3772 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 98 PID 376 wrote to memory of 920 376 winlogonr.exe 100 PID 376 wrote to memory of 920 376 winlogonr.exe 100 PID 376 wrote to memory of 920 376 winlogonr.exe 100 PID 376 wrote to memory of 920 376 winlogonr.exe 100 PID 376 wrote to memory of 920 376 winlogonr.exe 100 PID 376 wrote to memory of 920 376 winlogonr.exe 100 PID 376 wrote to memory of 920 376 winlogonr.exe 100 PID 376 wrote to memory of 920 376 winlogonr.exe 100 PID 376 wrote to memory of 1072 376 winlogonr.exe 101 PID 376 wrote to memory of 1072 376 winlogonr.exe 101 PID 376 wrote to memory of 1072 376 winlogonr.exe 101 PID 376 wrote to memory of 1072 376 winlogonr.exe 101 PID 376 wrote to memory of 1072 376 winlogonr.exe 101 PID 376 wrote to memory of 1072 376 winlogonr.exe 101 PID 1072 wrote to memory of 2112 1072 winlogonr.exe 102 PID 1072 wrote to memory of 2112 1072 winlogonr.exe 102 PID 1072 wrote to memory of 2112 1072 winlogonr.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe"C:\Users\Admin\AppData\Local\Temp\48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe"C:\Users\Admin\AppData\Local\Temp\48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BQROX.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4520
-
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:920
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2112
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD56831b89d0b8dc3e07588d733e75c122b
SHA18c70088c3224bbaf535ed19ec0f6bd5231c543be
SHA2569fe102f2c6dff35f03787b85f725d12347cf491c897730a7f2e818f65177ffc2
SHA512699fb44a25032ee4ad0ace1f941c826b333baddb65049c22e80b272909e85f4c8a00fef73fe2d97fa8998a0b6969b13461237bfc1e8f9bf711849d17d0cda6da
-
Filesize
88KB
MD58b97b5ed374d6e68451e6742133c3630
SHA1061b5daf8569180fb017b3df17ef7a9ba17e983d
SHA25648235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86
SHA5123d5639a3459fcd1f33c4119b93bc15b875bae023da7933f5d3e964aac1c2bde4a2374faa35f0080bfaa7135c4840deab0877ba4b17d5437b4be32bdfe81bc799