Analysis
-
max time kernel
120s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 07:17
Static task
static1
Behavioral task
behavioral1
Sample
d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe
Resource
win7-20240729-en
General
-
Target
d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe
-
Size
88KB
-
MD5
6f94eafd8cb8c157a4af2931f2d05e20
-
SHA1
6a69397e5058f3c8fd84b4be939a982e7484b0f4
-
SHA256
d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18be
-
SHA512
8e25058ba92fed72916364a116510a10b2b3871384fe3a1c2c26485ec35d153151f4f951dbc3fe8d633b4470e6ec003869e3748fbd5a358ecd25b5398f49420f
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEu:6D0ctAVA/bmxIMnoKjyR/Nu
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 2 IoCs
resource yara_rule behavioral2/memory/4172-61-0x0000000001500000-0x0000000001505000-memory.dmp family_andromeda behavioral2/memory/4172-65-0x0000000001500000-0x0000000001505000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\35092 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msaiebaa.com" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe -
Executes dropped EXE 3 IoCs
pid Process 3804 winlogonr.exe 4048 winlogonr.exe 3640 winlogonr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogonr\\winlogonr.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum winlogonr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 winlogonr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2800 set thread context of 3672 2800 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 94 PID 3804 set thread context of 4048 3804 winlogonr.exe 102 PID 3804 set thread context of 3640 3804 winlogonr.exe 103 -
resource yara_rule behavioral2/memory/3672-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3672-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3672-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3672-37-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3672-53-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4048-67-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msaiebaa.com svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 winlogonr.exe 3640 winlogonr.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3640 winlogonr.exe 3640 winlogonr.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe Token: SeDebugPrivilege 4048 winlogonr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2800 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 3672 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 3804 winlogonr.exe 4048 winlogonr.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3672 2800 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 94 PID 2800 wrote to memory of 3672 2800 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 94 PID 2800 wrote to memory of 3672 2800 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 94 PID 2800 wrote to memory of 3672 2800 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 94 PID 2800 wrote to memory of 3672 2800 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 94 PID 2800 wrote to memory of 3672 2800 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 94 PID 2800 wrote to memory of 3672 2800 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 94 PID 2800 wrote to memory of 3672 2800 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 94 PID 3672 wrote to memory of 4532 3672 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 95 PID 3672 wrote to memory of 4532 3672 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 95 PID 3672 wrote to memory of 4532 3672 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 95 PID 4532 wrote to memory of 4404 4532 cmd.exe 98 PID 4532 wrote to memory of 4404 4532 cmd.exe 98 PID 4532 wrote to memory of 4404 4532 cmd.exe 98 PID 3672 wrote to memory of 3804 3672 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 99 PID 3672 wrote to memory of 3804 3672 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 99 PID 3672 wrote to memory of 3804 3672 d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe 99 PID 3804 wrote to memory of 4048 3804 winlogonr.exe 102 PID 3804 wrote to memory of 4048 3804 winlogonr.exe 102 PID 3804 wrote to memory of 4048 3804 winlogonr.exe 102 PID 3804 wrote to memory of 4048 3804 winlogonr.exe 102 PID 3804 wrote to memory of 4048 3804 winlogonr.exe 102 PID 3804 wrote to memory of 4048 3804 winlogonr.exe 102 PID 3804 wrote to memory of 4048 3804 winlogonr.exe 102 PID 3804 wrote to memory of 4048 3804 winlogonr.exe 102 PID 3804 wrote to memory of 3640 3804 winlogonr.exe 103 PID 3804 wrote to memory of 3640 3804 winlogonr.exe 103 PID 3804 wrote to memory of 3640 3804 winlogonr.exe 103 PID 3804 wrote to memory of 3640 3804 winlogonr.exe 103 PID 3804 wrote to memory of 3640 3804 winlogonr.exe 103 PID 3804 wrote to memory of 3640 3804 winlogonr.exe 103 PID 3640 wrote to memory of 4172 3640 winlogonr.exe 104 PID 3640 wrote to memory of 4172 3640 winlogonr.exe 104 PID 3640 wrote to memory of 4172 3640 winlogonr.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe"C:\Users\Admin\AppData\Local\Temp\d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe"C:\Users\Admin\AppData\Local\Temp\d424dfe8ea9c6d62c30917bffa2067c0e0381fa469c85c8e04c4cb595dda18beN.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PGFQN.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4404
-
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4048
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4172
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD56831b89d0b8dc3e07588d733e75c122b
SHA18c70088c3224bbaf535ed19ec0f6bd5231c543be
SHA2569fe102f2c6dff35f03787b85f725d12347cf491c897730a7f2e818f65177ffc2
SHA512699fb44a25032ee4ad0ace1f941c826b333baddb65049c22e80b272909e85f4c8a00fef73fe2d97fa8998a0b6969b13461237bfc1e8f9bf711849d17d0cda6da
-
Filesize
88KB
MD5d98bfde7e0535bd8a4748a004cabb856
SHA12344c57f37ab4c31f70709fc9263c51eac5bdb0e
SHA256c38a43e9bace3914e1ec94aa1e2cce06a1a3da49693a4e659dd235bd980031c7
SHA51270943c6053e13bac4d998afae9e92372e1f3e008be6e0f978c5a74cb07bf70018c0b72daf9b04eec0e71b6b8065f32f0a5b72f10513c5d1a6663f7ed61ec5b25