Analysis

  • max time kernel
    118s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 00:06

General

  • Target

    2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe

  • Size

    87KB

  • MD5

    0a8623d8641e2736a98eb0103891e46b

  • SHA1

    2dd6b590078f60c94c4d121c42f84acc775063d8

  • SHA256

    2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160

  • SHA512

    b35a9f825be4103f6ec2593dd1536d82931003a7fb8b540202e408890f3a748c2b844aa6780de9f05e6d5ab37f7815baaa0023b772d628a7438b0f15eed3f9d5

  • SSDEEP

    384:5bLwOs8AHsc4sM6whKiroQ4/CFsrdk5I1Nb7g7FX7XYfruVDtM9tQ/FKlnVwUUOa:5vw9816uhKiroQ4/wQNNrfrunMxVFm

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe
    "C:\Users\Admin\AppData\Local\Temp\2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Windows\{EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe
      C:\Windows\{EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Windows\{98555321-18A0-42a5-8409-C93DFF99B774}.exe
        C:\Windows\{98555321-18A0-42a5-8409-C93DFF99B774}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4172
        • C:\Windows\{9EA274DC-0015-4f55-8007-679660CEBAE0}.exe
          C:\Windows\{9EA274DC-0015-4f55-8007-679660CEBAE0}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Windows\{F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe
            C:\Windows\{F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1524
            • C:\Windows\{1D267684-83CB-422a-B73D-26F78B549E57}.exe
              C:\Windows\{1D267684-83CB-422a-B73D-26F78B549E57}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3820
              • C:\Windows\{300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe
                C:\Windows\{300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4508
                • C:\Windows\{FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe
                  C:\Windows\{FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3680
                  • C:\Windows\{EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe
                    C:\Windows\{EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3296
                    • C:\Windows\{FB00C808-9AFE-493f-9100-57C75FEC2A0B}.exe
                      C:\Windows\{FB00C808-9AFE-493f-9100-57C75FEC2A0B}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2800
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{EDC47~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:756
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{FDD50~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:3008
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{30024~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3688
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{1D267~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4400
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{F2183~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4856
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{9EA27~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:432
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{98555~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4060
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{EC8CC~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4072
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2B6632~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{1D267684-83CB-422a-B73D-26F78B549E57}.exe

    Filesize

    87KB

    MD5

    35cd437e44bec6b199821ff3171c9c4c

    SHA1

    8ccd8d23e63c0edf7f60ee25068f1f1b59722481

    SHA256

    71fdab5d6ac6725acfee80219b909222c463c9c134c5675e27dd6c628d9ee915

    SHA512

    a627e903c6d3b14b8869c65a33e5d65300d06274ae854b483c4293a947b95e3f07acf550b12ba31c9c31b72748991d56bdedc8be968fcfecc10282c020c10257

  • C:\Windows\{300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe

    Filesize

    87KB

    MD5

    0e7a72f0c10436bbcd338e5fdfd58c4b

    SHA1

    34d06fa7a5f19b26ca9e8abb03261d93c1efa008

    SHA256

    1ae197487209b5433ea38c7818e7db8ecee713f5d5527678d0643ce28d43bb0b

    SHA512

    e88d9f1d6a6149089f1f1c5f7b6ab21cd71e4a5c195f8ab066c16853c6e5264ff844423053e39d21232aeb8428d4cddb0a6919371213bf323248ed82db3ccadd

  • C:\Windows\{98555321-18A0-42a5-8409-C93DFF99B774}.exe

    Filesize

    87KB

    MD5

    6811967da6a992f58280bf8a69ede622

    SHA1

    5205d98e39f6f6b41ff9ee5b39838bbf4c0e6a67

    SHA256

    9fc0c9790c4c8a13a57bd735a80764970626480d14ab3f7e691951d0dc2a3cde

    SHA512

    74745342097d43c0b0f3d305058c4fb0b4428073568fea737889572c4813808919568bdd34f36ac3f5ddb4827790ff93c9ea50ef115f1d518ccc24d134a192f3

  • C:\Windows\{9EA274DC-0015-4f55-8007-679660CEBAE0}.exe

    Filesize

    87KB

    MD5

    53e7a5344a6d4fa7523663fcc2e493d2

    SHA1

    e93bfdb63ce0fff38896bd4581a24205dde0196f

    SHA256

    5f6f13d2cd2d099ddcd27b602ecba234d42aae3166d5676365b9103f374d1704

    SHA512

    b060bdbe7b9957be9a784dffa75193dbce4d57431a9e78c984ca10883eee2006bc13ecd942a50202916e587def7a620be86a817696bf64ae7658dae2c8e169d1

  • C:\Windows\{EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe

    Filesize

    87KB

    MD5

    a5aca9a76546f27a40c074dd19fd5404

    SHA1

    081c0a52a25c62807b777893d5ead47aaa27f075

    SHA256

    b7d39c6c7f91750983899dcdc50299a4c3d5e5899f4f83059c63005f4e44f706

    SHA512

    88d2fe31f66d97ab5ab2279a067e9a1cc45a0a6fa16e0fa2e75d5ef85b5b781bb07a2665cd8d38ccd20644cdd7dc8e7330d933de6123171a0ed9e92197642ffd

  • C:\Windows\{EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe

    Filesize

    87KB

    MD5

    e034a6ec86370912513d7678eeba8aee

    SHA1

    d87cf25d0b3a1115ac500ef50b1b883da8d45ac9

    SHA256

    e7c2d31075693505f07e0b189626c82853037ab665d731d6c54b8337ddf83182

    SHA512

    4a280ab2aa92709e48732277e16568aeb08537287179bff48b7040673b81c403b711b17c4949a3652a96bdfe02bd6c54b0b249d5efb0244fcc69763165cbcf3c

  • C:\Windows\{F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe

    Filesize

    87KB

    MD5

    b31f13574886d150f00f09716441e0e5

    SHA1

    1c0bb23056a6ade2e1f07f5b358bc7c9c2a44ac3

    SHA256

    a56338c8def2c0ab3bbb56d1ef955799944d61f2c08ae34e5b70176026cbf4cc

    SHA512

    e030052333afedac3bfec4ca764890ae623fa22c908c4577ed3d46a670e45d520cb68144e9aabfde585634686b0175ce4b2ca1d59a63fc7f523cf5a9573e81c2

  • C:\Windows\{FB00C808-9AFE-493f-9100-57C75FEC2A0B}.exe

    Filesize

    87KB

    MD5

    b0e4e1d2d7332bc0743796191e85354c

    SHA1

    0f87740a3b9a67bf0b8d6c8a8ea74116bad4879b

    SHA256

    86a7f11a88d57579062563758db614c3d5cd82d8e02105323b8b1b2cb10a4fd3

    SHA512

    0ab5f7aa19e8a5a33f028103130802eb4135a6265967bf17ddcc4814ed32d08d42ff8575696bdffa4726203841c2ef211cfdd19ccd7cdf8cd067c047bc59e9da

  • C:\Windows\{FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe

    Filesize

    87KB

    MD5

    80ca34d8b034fa542188921821452ca3

    SHA1

    850982e585e3e3c2710315111a04e72afe18b8e7

    SHA256

    c5baa8b3e89751aa33ca3f9f0507c6364a8b3236656c07e5a099a859a5b55e38

    SHA512

    fd67e8fe39a8113d5629e8ba63e069a2028ab652a014020b353b1934f83a46eab4826e81c4dca61c109d065d864e9b471bccca93cc26524af8938aecf0587fc2

  • memory/1340-12-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1340-5-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1524-25-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1524-30-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2584-19-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2584-24-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2800-54-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3224-7-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3224-1-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3224-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3296-50-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3296-56-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3680-44-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3680-48-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3820-36-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3820-31-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4172-13-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4172-18-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4172-14-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4508-38-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4508-42-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB