Analysis

  • max time kernel
    118s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 11:39

General

  • Target

    ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe

  • Size

    79KB

  • MD5

    73ae5a63a08725057c33ff0b8f461051

  • SHA1

    fe08e7d1ba9e540b43609dc160eed8f74e9c8d1f

  • SHA256

    ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0

  • SHA512

    28aea43b167cb2e5c598daf6ff27872ea08bca7a8c72aced92fdf2e66797d0067280030b0b9a8ed1a508477cb575baa131637cbbda240fdcd9288d077b055637

  • SSDEEP

    768:4vw9816vhKQLroUN4/wQzXOQ69zbjlAAX5e9zp:wEGh0oYlGizbR9Xwzp

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe
    "C:\Users\Admin\AppData\Local\Temp\ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:116
    • C:\Windows\{67940CC7-08D9-42de-B760-982B6D559B89}.exe
      C:\Windows\{67940CC7-08D9-42de-B760-982B6D559B89}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\{105E309A-2D6B-4e1b-8E26-28DE3612358A}.exe
        C:\Windows\{105E309A-2D6B-4e1b-8E26-28DE3612358A}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3976
        • C:\Windows\{DBF8E7A6-7841-40f2-A339-BB01566BE17B}.exe
          C:\Windows\{DBF8E7A6-7841-40f2-A339-BB01566BE17B}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4296
          • C:\Windows\{4AF19E3F-CDFC-4fee-BD71-AAC6D78D5687}.exe
            C:\Windows\{4AF19E3F-CDFC-4fee-BD71-AAC6D78D5687}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4824
            • C:\Windows\{4D034C4C-2A5E-4aa8-9814-D2E5A5C23438}.exe
              C:\Windows\{4D034C4C-2A5E-4aa8-9814-D2E5A5C23438}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2696
              • C:\Windows\{84190473-6930-4ba5-B594-48D71A8DBC2C}.exe
                C:\Windows\{84190473-6930-4ba5-B594-48D71A8DBC2C}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3540
                • C:\Windows\{40BC9C5A-26BB-4919-8F8C-6B8A887C9140}.exe
                  C:\Windows\{40BC9C5A-26BB-4919-8F8C-6B8A887C9140}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4696
                  • C:\Windows\{47A9EA84-FC1E-4df3-ADFB-FE3700A508DE}.exe
                    C:\Windows\{47A9EA84-FC1E-4df3-ADFB-FE3700A508DE}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4016
                    • C:\Windows\{8232E8FD-91E5-42ec-8337-828EFEB3E9FF}.exe
                      C:\Windows\{8232E8FD-91E5-42ec-8337-828EFEB3E9FF}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4436
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{47A9E~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:3000
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{40BC9~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:4420
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{84190~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3716
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{4D034~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4568
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{4AF19~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2428
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{DBF8E~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3920
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{105E3~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4964
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{67940~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3464
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\EC3A0F~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{105E309A-2D6B-4e1b-8E26-28DE3612358A}.exe

    Filesize

    79KB

    MD5

    09bdefd5eadac7a5e18ae45343d3d6b0

    SHA1

    0aaa3a84a02902074b7f24f6216d9b42a05311ad

    SHA256

    cd8a1c6392eec406822f61ec39de1c15508e3ca303718c145ed9da811eabca97

    SHA512

    2618ab392435cb688cd28f388057f3f2f648be95765b54dad335643156f6b5e3e9707ff8130c907df9199f70c43efb1c8aaa2a2038340749b229387d3c2f31fa

  • C:\Windows\{40BC9C5A-26BB-4919-8F8C-6B8A887C9140}.exe

    Filesize

    79KB

    MD5

    289215c4740b03d7f8df21327cf3cc17

    SHA1

    8ace3b85455dc8e64d09b416f735245116bd8a06

    SHA256

    5ac93c4f23e4fa8687f5f81f7e531b5f93098d7b07f1419d9d70f0dd73b47c80

    SHA512

    551a23634a77b2c4447c285185dca71560c7d50399c730e631cd466c4dcff9237eb09b3cab70fd606dec54e48e2c6642a24fcd3a072a0459c586b26e80b9e60e

  • C:\Windows\{47A9EA84-FC1E-4df3-ADFB-FE3700A508DE}.exe

    Filesize

    79KB

    MD5

    8a4f4c62e52c859c4b05c65670605233

    SHA1

    ecf3018a5711108fd7ae2397e7b3a188e803aba9

    SHA256

    116039568ac84fcd59da64a57603ddbc496488dbc21004ea37ee88af0ec7ee12

    SHA512

    6f5271180091f6183564f5fa7842f972739524af369fa24e84f45d79138a3a03fed4c79f4e0265196c332191ca7dc29f9f9968862379b0c62092cc2e615f126c

  • C:\Windows\{4AF19E3F-CDFC-4fee-BD71-AAC6D78D5687}.exe

    Filesize

    79KB

    MD5

    d71d109f34f72b8d300e97e5a9b0d4d8

    SHA1

    1d06aab47365a4f3d24cfaba46ee06df34ed33c9

    SHA256

    ac19133e4b345fc2246c4d956077777b6ae4bd5be4ce058867358d1e2add9518

    SHA512

    f0b36a3085733939e271156e8cf4553401ba71780557d285af6d501ea48bfd302821e21973b3eb0d84fa1c72b5b9301199d1048874ea66d861260e25940d2971

  • C:\Windows\{4D034C4C-2A5E-4aa8-9814-D2E5A5C23438}.exe

    Filesize

    79KB

    MD5

    420a824ec223f50615b01eb087233066

    SHA1

    96217597d1e0a4a316627646f9948a2ceb2b080c

    SHA256

    06bafa35a560c0b4d12a3d891f57b11fc11068c191246b6a58e9865ce8bb56c1

    SHA512

    7813274d4464d8e0ddb0bf09599c534cddb333b8693357f5886920aba9889be266ece905e53cd085903e452a5ebe36c3969f46b6769b4381572926a665f40999

  • C:\Windows\{67940CC7-08D9-42de-B760-982B6D559B89}.exe

    Filesize

    79KB

    MD5

    5bde1b86d9de7917b2cebc9380c28c5d

    SHA1

    aa21601f59defda343fd68e23be31852217bb5be

    SHA256

    7e4d158b18d9c5b2fdb470ce40415296c498eb9b38428b71557eee1f071d7769

    SHA512

    e0484846c8df72faa72cf76ea7ef6e2957a081b32ad7d30b04966a0b5c095067996ddec72d701f209aec64d6365affc322b205ce30d1a864be76c71af61a5826

  • C:\Windows\{8232E8FD-91E5-42ec-8337-828EFEB3E9FF}.exe

    Filesize

    79KB

    MD5

    80c07cbf4f36959505644cbee949197e

    SHA1

    71b7726af3ff13b33945ea3ff63dfdcdaf0ff93a

    SHA256

    181cc061be5e4669da0c9fc50a0242e8ad070e2cfa90452b6d5cf911daebac64

    SHA512

    ff4b5d5263372892b63c4bad21547ea5285d7facda0fba4ffe6d039f98a1efa5fbc94beb69abfa554cdfa34a69c2aec6ac8283cf16ed8937bb5896c84e18cec0

  • C:\Windows\{84190473-6930-4ba5-B594-48D71A8DBC2C}.exe

    Filesize

    79KB

    MD5

    cc4442e83179f0a83a6ca26ed5c94109

    SHA1

    7e968aa02f1d6e2cb620b39f537d7dbab95e0c97

    SHA256

    b15fab569b0cd88515349ce3f50191e70c18dcc09edcbf17f7093e5ba7a0f0db

    SHA512

    ee9bb99ab9c169d85ba0a0fb8e08db438595d526df84c665a633cc8377a64ae84b1d3b2f3569204ff36c027a7bd20b68ec01de02751cecbe0a87ff278e6727f1

  • C:\Windows\{DBF8E7A6-7841-40f2-A339-BB01566BE17B}.exe

    Filesize

    79KB

    MD5

    2dffc636b1dd4fb11c9053be8719a395

    SHA1

    f9fdb9c51228c99db9ecc40184bae4d9f22e6f8a

    SHA256

    1e0a3d38b74d6055b6c6d1817538aff5cbf1cfe3e06bfe0cbb7a2e2bdf7489e7

    SHA512

    0ed62943c83a24775d361b19356a0d07a667c9ddf307ac4590698e81dce8d96ec22ec9dc237f450b2eefc6b963e11a4e35c3fc6ee70bd4ba396023f3927c7d62