Analysis
-
max time kernel
95s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 15:52
Behavioral task
behavioral1
Sample
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe
Resource
win10v2004-20241007-en
General
-
Target
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe
-
Size
9.8MB
-
MD5
713998985d9253877d350df15b73960e
-
SHA1
25084c650226fea6723520dfcddd7aeae3cfafeb
-
SHA256
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9
-
SHA512
c3f8d6fb21b8aa9a50262c34536b3677423e19288599276068709526aa8410fe90ec748563c9f488613a4bb7bbcdfdc65cae1388f1c48c43fcb62e73bfddd3be
-
SSDEEP
196608:Hyu91Hc3U2aFFSmAxz0J3I4Oo19wOZn3rUnLw8J51SHDi0:Suv/dAxo3fdZnALw8vkDl
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/768-8-0x0000000000DB0000-0x0000000002251000-memory.dmp vmprotect behavioral2/memory/768-12-0x0000000000DB0000-0x0000000002251000-memory.dmp vmprotect behavioral2/memory/768-13-0x0000000000DB0000-0x0000000002251000-memory.dmp vmprotect behavioral2/memory/768-36-0x0000000000DB0000-0x0000000002251000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CareUEyes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe /tray" a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe -
Modifies registry class 2 IoCs
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\WOW6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533} a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\WOW6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533}\uuid = "MjFmNjYwYmJkNjdhNWE5NWQwMDU5MmU1ZjFiMDViMjY=" a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exepid process 768 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe 768 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe 768 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe 768 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exepid process 768 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe 768 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe 768 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exepid process 768 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe 768 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe 768 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe"C:\Users\Admin\AppData\Local\Temp\a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dc64bb93c17e29195c39ab8022fdf32c
SHA1d236bfa7377710b71355268243a042832e78384f
SHA256cfcd3abe6f7893a0f132966afa2a32ec0e54d0e38f4b3dc97e8de7055fabeb20
SHA5127c7588861bcca16ec11d1b455b0713c33feae42c15d334b2ad80262415c204c7617aae2df0b89bc862590d698be4906a732e2ca9549f2d33ec7b3519e992d348