Analysis

  • max time kernel
    118s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 12:08

General

  • Target

    90f08ef641529c0ba1fd58aeb45c932711f1ac5faa64cf3d8133ad01a79c5cae.exe

  • Size

    88KB

  • MD5

    1012b63cceb9f0a40384afb4752c81f5

  • SHA1

    4d1bdaca23b6d3a8af9d61cc9fcd894b62538100

  • SHA256

    90f08ef641529c0ba1fd58aeb45c932711f1ac5faa64cf3d8133ad01a79c5cae

  • SHA512

    21682c33d4feab8b2328b8775c116e2837ef4195b0d2cdb09f1d69767e6fef4fbb892eee126a43e11e0139f5f4cceff75e8cfd4976c164faee1fa34c1b322e59

  • SSDEEP

    768:Qvw9816vhKQLroO4/wQRN/frunMxVFA3b70:YEGh0oOlKunMxVS3H0

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90f08ef641529c0ba1fd58aeb45c932711f1ac5faa64cf3d8133ad01a79c5cae.exe
    "C:\Users\Admin\AppData\Local\Temp\90f08ef641529c0ba1fd58aeb45c932711f1ac5faa64cf3d8133ad01a79c5cae.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Windows\{86EB5D9A-DEEF-48c9-81CC-48B462708DBA}.exe
      C:\Windows\{86EB5D9A-DEEF-48c9-81CC-48B462708DBA}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Windows\{2D077939-DA62-4165-BA55-EADFD6AC87E7}.exe
        C:\Windows\{2D077939-DA62-4165-BA55-EADFD6AC87E7}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Windows\{F0EE01D0-E863-4668-A815-6B94052680D9}.exe
          C:\Windows\{F0EE01D0-E863-4668-A815-6B94052680D9}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3988
          • C:\Windows\{F7429665-7544-4922-8FAA-D53A779F84BB}.exe
            C:\Windows\{F7429665-7544-4922-8FAA-D53A779F84BB}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:444
            • C:\Windows\{C9946B57-B9C0-4b38-88FB-A398A5404418}.exe
              C:\Windows\{C9946B57-B9C0-4b38-88FB-A398A5404418}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:216
              • C:\Windows\{A4BE215B-48DF-4b00-95D4-727FA7474857}.exe
                C:\Windows\{A4BE215B-48DF-4b00-95D4-727FA7474857}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4840
                • C:\Windows\{229747A6-1833-400a-9166-CD353A4F471B}.exe
                  C:\Windows\{229747A6-1833-400a-9166-CD353A4F471B}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1448
                  • C:\Windows\{DAFEE078-0F30-44c3-B81C-EAD7B5D749E6}.exe
                    C:\Windows\{DAFEE078-0F30-44c3-B81C-EAD7B5D749E6}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4540
                    • C:\Windows\{25F934BC-7213-4d25-BBFE-D8593525C89F}.exe
                      C:\Windows\{25F934BC-7213-4d25-BBFE-D8593525C89F}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:5060
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{DAFEE~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1716
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{22974~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:1936
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{A4BE2~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4724
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{C9946~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2716
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{F7429~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3444
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{F0EE0~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4036
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{2D077~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3936
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{86EB5~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3172
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\90F08E~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{229747A6-1833-400a-9166-CD353A4F471B}.exe

    Filesize

    88KB

    MD5

    9de21cb7985e585629a75e2834688a47

    SHA1

    116510e719be7d36621850624042422bcae42fcf

    SHA256

    427f2e5aa94c1ed6bdc265a887bf59829ec88524a8ea997aee07a198773cce7a

    SHA512

    d577733006edbfc8fe5b344ecc116d53a6cb41076fc3924e756fe4127f47150dcaea523ba9b349c2aef7bf2d16e46501969cbcb98f547e9bf1708ca7b79912da

  • C:\Windows\{25F934BC-7213-4d25-BBFE-D8593525C89F}.exe

    Filesize

    88KB

    MD5

    483e48bf3eb606abe1f8521128154292

    SHA1

    2e1ac0dce9dcd9cf0dc3526b82aa35cfce2ca40a

    SHA256

    d901f196fbdfa60b792e71f3fffcd5ef327914dbc09f2835fd97ee0c637c0dea

    SHA512

    fa50870d50794bdf45bf11c0cfd98600fc0111856108e66fdf6fb6c390b89889adc558a09727e7cb83bd36329a631af198906653a3e12206311ef98ad625b155

  • C:\Windows\{2D077939-DA62-4165-BA55-EADFD6AC87E7}.exe

    Filesize

    88KB

    MD5

    c8017d2bc99ef994eb77c51440258c05

    SHA1

    689bbe5c30192565a359d29a36623e39fd683a7d

    SHA256

    c90fdc97b2bcdfc2b110a3b8b5b4f2b65e1c00354ae6cdb520ebf1c361dacfc4

    SHA512

    8a3284a89272323d6cda7b0f63fe992a67a1444781035e19e23aeee5f48f677e3e0ea72902f605cc881559afe03e1f7980c2d4e23c39e62c2220f5aa4859eb17

  • C:\Windows\{86EB5D9A-DEEF-48c9-81CC-48B462708DBA}.exe

    Filesize

    88KB

    MD5

    a39473c60ddc0155c2f8505a76b4f869

    SHA1

    44ca52191dc6402368dd4631df2519e820f310cb

    SHA256

    0e7109bf9b14fda6de581244ed93f44434be5031916a57a85a610314bdd9de8c

    SHA512

    799175e96e3513de2c3b8e95d5625df17b4c58f186f6f87d26f4bce52a768a1e7f36c0cb5f2a10b519448827dfd9d7e35471aae0cd0522a1aaa2696067e1833d

  • C:\Windows\{A4BE215B-48DF-4b00-95D4-727FA7474857}.exe

    Filesize

    88KB

    MD5

    ae79b50a91ddbba2ff8e0e15870465e9

    SHA1

    3e34cab6d00365c8e48da311fad2019452b1fd44

    SHA256

    e445fcc85a2e1ef379bbebc52b25e318213afc68bdd6c1bab7a60da5404a0973

    SHA512

    a90db8b4869e8636ebf7fe49ae2804c250a4dd2cb366c15485a2d2e0ffe9446e1c765f4a0ca2f1d8b978d48f8eafa7eaf7e6f60742ab9747c9e8d225e40559f0

  • C:\Windows\{C9946B57-B9C0-4b38-88FB-A398A5404418}.exe

    Filesize

    88KB

    MD5

    6626c9bdc71434fc02cf8e77007f0e04

    SHA1

    a879aabe5c416cbedec7e9cc9ab6012d5f3d6723

    SHA256

    35e1e079724a6185d518cfe294b0879d8a44ead64602d5403af41ff9ddffc134

    SHA512

    6e97e9dc0c1fe1fdad5170a32d84821e5887e92aa8ec25b11ac052a22afad3aa71f583c414e1d924cf0cd67b0ae64eddb27090a0a9c17d63756592a9fc176c51

  • C:\Windows\{DAFEE078-0F30-44c3-B81C-EAD7B5D749E6}.exe

    Filesize

    88KB

    MD5

    4fbf7abbbd6b57cbeb34bf67c4390a67

    SHA1

    376ed25d74e90bce5a2560e2898dfe58a36dcc6a

    SHA256

    2b6ca2691044e7c414cd45e3893d627ba0bf4212d6beba1436cc083832264636

    SHA512

    d66ac2ac4441798d449b3b2f92d39c5cd438b15bcff829453ac5e6f5ba9f517d59258be0b67f88225f426ed21eeb40f4a096310afc37c0bfdb0b7710d7e84f65

  • C:\Windows\{F0EE01D0-E863-4668-A815-6B94052680D9}.exe

    Filesize

    88KB

    MD5

    5674e2f6fb631c687ea13dc8a35f8246

    SHA1

    8c6c7c0b7ef1c1fea33c399d958d655945aec6ca

    SHA256

    d7c004ccbf8a3ab47b52f29af26b875bccc36c611107fc8e300250e2986277e4

    SHA512

    0bb6aa20d5a830a1a37a257142102a10770f0c04a6e75bac2421da16b308a4eb796eb7f9d4b84aa0135808320fcc6766a5159755b0c95667cf1673efad088908

  • C:\Windows\{F7429665-7544-4922-8FAA-D53A779F84BB}.exe

    Filesize

    88KB

    MD5

    fb4f4451b48ee1bc6d2a7ffd9325ecfb

    SHA1

    dd86a6fa5a1e82a8ead07a4ca028a486c095c0c6

    SHA256

    f061fae94a366643e8b05d25c7e3ce99c614f59826bf8d8aaa83a34fc6345265

    SHA512

    411d0652e46ca7d1e0e7e74a0a57bee52fa94b4d9a6a58d5274898cd6a6fb3da9f7a2170de998981a70c7a4ee965ce6291ecb5a30368db877e5aad3065ab437e