Analysis

  • max time kernel
    110s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 13:53

General

  • Target

    f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe

  • Size

    43KB

  • MD5

    a6927a5b7739703aff1ef6edb1b836ca

  • SHA1

    772e70ab6f8d8aa50f98fac7a0078ac512c27ecf

  • SHA256

    f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f

  • SHA512

    4a36be5e23ef09dce920d17921b6014a62b90f22842800a245ba03833694b388b42d1abc3c2229e6652e7fa2264c4361dbb094aa4a20e4e656e2e85b32a46e3a

  • SSDEEP

    768:xkF37jMLFyeYHYUVZ4qM0Pb0P85Wes3mxGha5FEBqV4hgVLvx:xmos3Z4qMqb0P22POqgtZ

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe
    "C:\Users\Admin\AppData\Local\Temp\f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\AppData\Roaming\webcam_plugin.exe
      C:\Users\Admin\AppData\Roaming\webcam_plugin.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Users\Admin\AppData\Roaming\Microsot_Centre\webcam_plugin.exe
        C:\Users\Admin\AppData\Roaming\Microsot_Centre\webcam_plugin.exe
        3⤵
        • Adds policy Run key to start application
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4260
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c UNISTA~1.BAT
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Unistalliveshows.bat

    Filesize

    88B

    MD5

    9e771543981fbe1a58d429795e1a631f

    SHA1

    3b231887441b1f8b2c90896131c0550c557bdfaa

    SHA256

    a8ed05538d0bdaafb3d12622d2e4b8efa9638c8e2ae1cbbe0d890eb71f8afed3

    SHA512

    63fa10bf6e0b5dbcbceddee0631804b1b173c902be62cdcdf56c6b1b2f43cd62d9628342f7e91a60b977981918c6d42fdeee89defac9ab6c624d1eb679ce8c2d

  • C:\Users\Admin\AppData\Roaming\webcam_plugin.exe

    Filesize

    43KB

    MD5

    43ec8fa0bff1499cdf3357ffffb366d6

    SHA1

    0fecccd11855f4ecec05ea8f9af904b4026d226b

    SHA256

    fcf419435ff99b553309a2f7b3503dfccc0513deb76f18aed7f3ac8d1d4bc8d0

    SHA512

    172789675db608d46f6057c9e7b4a34053665bff3f16be1a7c6b03005b3af522e7bf9fe7fda72ae06119f75411df1faced6ebf0c752e2b6d8d2945e5088f3da9

  • memory/1956-9-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1956-18-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4260-11-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4260-29-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/4880-10-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB