Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
FIX.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FIX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
FIX.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
FIX.exe
Resource
win11-20241007-en
General
-
Target
FIX.exe
-
Size
1.8MB
-
MD5
51bde06ef57368566041b34ee98a1b56
-
SHA1
f8004ba5778fb824b86db13a0266fce8b4de615b
-
SHA256
7883458333c8d60e0a8162539a9f02f3cfa8eaa58def55b1e51d73cfd9dec520
-
SHA512
381489455756a1a62b1bf951ad6d8b16531a7c8ff5d86a990509488edd06cc4db7e2174818e9aae4d08dcffd1e1362629ea3a5908f99381de85c9d22813289a6
-
SSDEEP
24576:kCZ3A8t/P5l08GZ+wglq5U6I1YrCGYYmFsCgMxAgkzQI6wi58YA7hshahtZqtMJb:bZ5pPuZd5Umrq8Gw0Cb
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: FIX.exe File opened (read-only) \??\G: FIX.exe File opened (read-only) \??\N: FIX.exe File opened (read-only) \??\S: FIX.exe File opened (read-only) \??\Y: FIX.exe File opened (read-only) \??\T: FIX.exe File opened (read-only) \??\E: FIX.exe File opened (read-only) \??\H: FIX.exe File opened (read-only) \??\K: FIX.exe File opened (read-only) \??\M: FIX.exe File opened (read-only) \??\O: FIX.exe File opened (read-only) \??\P: FIX.exe File opened (read-only) \??\R: FIX.exe File opened (read-only) \??\V: FIX.exe File opened (read-only) \??\W: FIX.exe File opened (read-only) \??\X: FIX.exe File opened (read-only) \??\B: FIX.exe File opened (read-only) \??\J: FIX.exe File opened (read-only) \??\U: FIX.exe File opened (read-only) \??\I: FIX.exe File opened (read-only) \??\L: FIX.exe File opened (read-only) \??\Q: FIX.exe File opened (read-only) \??\Z: FIX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4050598569-1597076380-177084960-1000\{5777AFFF-A160-4B9C-AE39-6CE5F1DA9E11} FIX.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 5048 FIX.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: 33 216 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 216 AUDIODG.EXE Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe Token: SeShutdownPrivilege 5048 FIX.exe Token: SeCreatePagefilePrivilege 5048 FIX.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FIX.exe"C:\Users\Admin\AppData\Local\Temp\FIX.exe"1⤵
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x33c 0x4741⤵
- Suspicious use of AdjustPrivilegeToken
PID:216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD5d8c32a97d64419e597fd6d4317b0327d
SHA1ba5eb33fb111dadbfccc486a449ef0bfd1fe228c
SHA2568839a415b6103c7ca5f72525298451bbcec6a6f5ff0d08389af3234d08099a7f
SHA512d87e22ff3268447b97000c24804ce9f32674e929e82c71a0f91c637479306f7ebaa1a8693ee5fe5d7ec24f09f3f377155e03a94ed29fc7a58ca37eb494644a81
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD57e5e78a402b0a2f551cbfc8dc0f000ac
SHA18534459bb581151c9088733fde06db2b08b50228
SHA256fabb07b9338bbd0ebc86025ff22d142233e91b3935a1b9c009464c56be8ff7ce
SHA512264dcf66ede9f7b62b66ad470748edd2df12d9262061511267b60d3fbe6fa1f63f18a78f772d5ae096e8d3c70c8a62290a8f976c9198b10821a2a9be88034c15