Analysis
-
max time kernel
110s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:53
Behavioral task
behavioral1
Sample
f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe
Resource
win10v2004-20241007-en
General
-
Target
f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe
-
Size
43KB
-
MD5
a6927a5b7739703aff1ef6edb1b836ca
-
SHA1
772e70ab6f8d8aa50f98fac7a0078ac512c27ecf
-
SHA256
f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f
-
SHA512
4a36be5e23ef09dce920d17921b6014a62b90f22842800a245ba03833694b388b42d1abc3c2229e6652e7fa2264c4361dbb094aa4a20e4e656e2e85b32a46e3a
-
SSDEEP
768:xkF37jMLFyeYHYUVZ4qM0Pb0P85Wes3mxGha5FEBqV4hgVLvx:xmos3Z4qMqb0P22POqgtZ
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run webcam_plugin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IExploreupdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsot_Centre\\sidebarsoi.exe" webcam_plugin.exe -
resource yara_rule behavioral2/files/0x0008000000023c6e-3.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 4880 webcam_plugin.exe 4260 webcam_plugin.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language webcam_plugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language webcam_plugin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4260 webcam_plugin.exe 4260 webcam_plugin.exe 4260 webcam_plugin.exe 4260 webcam_plugin.exe 4260 webcam_plugin.exe 4260 webcam_plugin.exe 4260 webcam_plugin.exe 4260 webcam_plugin.exe 4260 webcam_plugin.exe 4260 webcam_plugin.exe 4260 webcam_plugin.exe 4260 webcam_plugin.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1956 wrote to memory of 4880 1956 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 83 PID 1956 wrote to memory of 4880 1956 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 83 PID 1956 wrote to memory of 4880 1956 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 83 PID 4880 wrote to memory of 4260 4880 webcam_plugin.exe 84 PID 4880 wrote to memory of 4260 4880 webcam_plugin.exe 84 PID 4880 wrote to memory of 4260 4880 webcam_plugin.exe 84 PID 1956 wrote to memory of 3680 1956 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 104 PID 1956 wrote to memory of 3680 1956 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 104 PID 1956 wrote to memory of 3680 1956 f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe"C:\Users\Admin\AppData\Local\Temp\f6af401ecdfcf49ee6658b0227ea9f6fc407b3bcb09ed2b2d50cf0b5d092ae4f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Roaming\webcam_plugin.exeC:\Users\Admin\AppData\Roaming\webcam_plugin.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Roaming\Microsot_Centre\webcam_plugin.exeC:\Users\Admin\AppData\Roaming\Microsot_Centre\webcam_plugin.exe3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c UNISTA~1.BAT2⤵
- System Location Discovery: System Language Discovery
PID:3680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88B
MD59e771543981fbe1a58d429795e1a631f
SHA13b231887441b1f8b2c90896131c0550c557bdfaa
SHA256a8ed05538d0bdaafb3d12622d2e4b8efa9638c8e2ae1cbbe0d890eb71f8afed3
SHA51263fa10bf6e0b5dbcbceddee0631804b1b173c902be62cdcdf56c6b1b2f43cd62d9628342f7e91a60b977981918c6d42fdeee89defac9ab6c624d1eb679ce8c2d
-
Filesize
43KB
MD543ec8fa0bff1499cdf3357ffffb366d6
SHA10fecccd11855f4ecec05ea8f9af904b4026d226b
SHA256fcf419435ff99b553309a2f7b3503dfccc0513deb76f18aed7f3ac8d1d4bc8d0
SHA512172789675db608d46f6057c9e7b4a34053665bff3f16be1a7c6b03005b3af522e7bf9fe7fda72ae06119f75411df1faced6ebf0c752e2b6d8d2945e5088f3da9