Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:18
Behavioral task
behavioral1
Sample
eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe
Resource
win10v2004-20241007-en
General
-
Target
eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe
-
Size
1.7MB
-
MD5
6f7b8480a4cb654f4f7c752711d47ffd
-
SHA1
0d2c246bbbd8cb7d838a9d1bd77bd0c4ad0b9728
-
SHA256
eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6
-
SHA512
0ec8a0b4339a42284c9e17258982033f1673697005d98a888eb5fdd2bd269a16c980d49063bb0814579f6205fe1fd14206d3025e66fef1c528a5a9dd01393146
-
SSDEEP
12288:Y6sg9q8utL6R91NNaUfViptH0D9wvT1xkZTWbq6Pknm2N5kv7Z62J5ugQ8cY47OO:YyG6RGjv7biFpVUu
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt3.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\local.exe = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe -
Executes dropped EXE 3 IoCs
pid Process 2996 winupdt3.exe 2184 winupdt3.exe 1436 winupdt3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdt = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt3.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2996 set thread context of 2184 2996 winupdt3.exe 87 PID 2996 set thread context of 1436 2996 winupdt3.exe 88 -
resource yara_rule behavioral2/memory/4176-0-0x0000000000400000-0x00000000005B6000-memory.dmp upx behavioral2/files/0x000b000000023b90-16.dat upx behavioral2/memory/4176-30-0x0000000000400000-0x00000000005B6000-memory.dmp upx behavioral2/memory/2184-34-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-31-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-36-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1436-43-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1436-40-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/1436-45-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2996-50-0x0000000000400000-0x00000000005B6000-memory.dmp upx behavioral2/memory/2184-51-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/1436-52-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2184-53-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-55-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-58-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-60-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-62-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-65-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-67-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-74-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-76-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/2184-81-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt3.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 456 reg.exe 3144 reg.exe 4088 reg.exe 4612 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2184 winupdt3.exe Token: SeCreateTokenPrivilege 2184 winupdt3.exe Token: SeAssignPrimaryTokenPrivilege 2184 winupdt3.exe Token: SeLockMemoryPrivilege 2184 winupdt3.exe Token: SeIncreaseQuotaPrivilege 2184 winupdt3.exe Token: SeMachineAccountPrivilege 2184 winupdt3.exe Token: SeTcbPrivilege 2184 winupdt3.exe Token: SeSecurityPrivilege 2184 winupdt3.exe Token: SeTakeOwnershipPrivilege 2184 winupdt3.exe Token: SeLoadDriverPrivilege 2184 winupdt3.exe Token: SeSystemProfilePrivilege 2184 winupdt3.exe Token: SeSystemtimePrivilege 2184 winupdt3.exe Token: SeProfSingleProcessPrivilege 2184 winupdt3.exe Token: SeIncBasePriorityPrivilege 2184 winupdt3.exe Token: SeCreatePagefilePrivilege 2184 winupdt3.exe Token: SeCreatePermanentPrivilege 2184 winupdt3.exe Token: SeBackupPrivilege 2184 winupdt3.exe Token: SeRestorePrivilege 2184 winupdt3.exe Token: SeShutdownPrivilege 2184 winupdt3.exe Token: SeDebugPrivilege 2184 winupdt3.exe Token: SeAuditPrivilege 2184 winupdt3.exe Token: SeSystemEnvironmentPrivilege 2184 winupdt3.exe Token: SeChangeNotifyPrivilege 2184 winupdt3.exe Token: SeRemoteShutdownPrivilege 2184 winupdt3.exe Token: SeUndockPrivilege 2184 winupdt3.exe Token: SeSyncAgentPrivilege 2184 winupdt3.exe Token: SeEnableDelegationPrivilege 2184 winupdt3.exe Token: SeManageVolumePrivilege 2184 winupdt3.exe Token: SeImpersonatePrivilege 2184 winupdt3.exe Token: SeCreateGlobalPrivilege 2184 winupdt3.exe Token: 31 2184 winupdt3.exe Token: 32 2184 winupdt3.exe Token: 33 2184 winupdt3.exe Token: 34 2184 winupdt3.exe Token: 35 2184 winupdt3.exe Token: SeDebugPrivilege 1436 winupdt3.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4176 eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe 2996 winupdt3.exe 2184 winupdt3.exe 2184 winupdt3.exe 1436 winupdt3.exe 2184 winupdt3.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 4176 wrote to memory of 4640 4176 eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe 82 PID 4176 wrote to memory of 4640 4176 eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe 82 PID 4176 wrote to memory of 4640 4176 eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe 82 PID 4640 wrote to memory of 1196 4640 cmd.exe 85 PID 4640 wrote to memory of 1196 4640 cmd.exe 85 PID 4640 wrote to memory of 1196 4640 cmd.exe 85 PID 4176 wrote to memory of 2996 4176 eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe 86 PID 4176 wrote to memory of 2996 4176 eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe 86 PID 4176 wrote to memory of 2996 4176 eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe 86 PID 2996 wrote to memory of 2184 2996 winupdt3.exe 87 PID 2996 wrote to memory of 2184 2996 winupdt3.exe 87 PID 2996 wrote to memory of 2184 2996 winupdt3.exe 87 PID 2996 wrote to memory of 2184 2996 winupdt3.exe 87 PID 2996 wrote to memory of 2184 2996 winupdt3.exe 87 PID 2996 wrote to memory of 2184 2996 winupdt3.exe 87 PID 2996 wrote to memory of 2184 2996 winupdt3.exe 87 PID 2996 wrote to memory of 2184 2996 winupdt3.exe 87 PID 2996 wrote to memory of 1436 2996 winupdt3.exe 88 PID 2996 wrote to memory of 1436 2996 winupdt3.exe 88 PID 2996 wrote to memory of 1436 2996 winupdt3.exe 88 PID 2996 wrote to memory of 1436 2996 winupdt3.exe 88 PID 2996 wrote to memory of 1436 2996 winupdt3.exe 88 PID 2996 wrote to memory of 1436 2996 winupdt3.exe 88 PID 2996 wrote to memory of 1436 2996 winupdt3.exe 88 PID 2996 wrote to memory of 1436 2996 winupdt3.exe 88 PID 2184 wrote to memory of 4092 2184 winupdt3.exe 89 PID 2184 wrote to memory of 4092 2184 winupdt3.exe 89 PID 2184 wrote to memory of 4092 2184 winupdt3.exe 89 PID 2184 wrote to memory of 3040 2184 winupdt3.exe 90 PID 2184 wrote to memory of 3040 2184 winupdt3.exe 90 PID 2184 wrote to memory of 3040 2184 winupdt3.exe 90 PID 2184 wrote to memory of 3276 2184 winupdt3.exe 91 PID 2184 wrote to memory of 3276 2184 winupdt3.exe 91 PID 2184 wrote to memory of 3276 2184 winupdt3.exe 91 PID 2184 wrote to memory of 1640 2184 winupdt3.exe 92 PID 2184 wrote to memory of 1640 2184 winupdt3.exe 92 PID 2184 wrote to memory of 1640 2184 winupdt3.exe 92 PID 3276 wrote to memory of 456 3276 cmd.exe 97 PID 3276 wrote to memory of 456 3276 cmd.exe 97 PID 3276 wrote to memory of 456 3276 cmd.exe 97 PID 1640 wrote to memory of 3144 1640 cmd.exe 98 PID 1640 wrote to memory of 3144 1640 cmd.exe 98 PID 1640 wrote to memory of 3144 1640 cmd.exe 98 PID 3040 wrote to memory of 4088 3040 cmd.exe 99 PID 3040 wrote to memory of 4088 3040 cmd.exe 99 PID 3040 wrote to memory of 4088 3040 cmd.exe 99 PID 4092 wrote to memory of 4612 4092 cmd.exe 100 PID 4092 wrote to memory of 4612 4092 cmd.exe 100 PID 4092 wrote to memory of 4612 4092 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe"C:\Users\Admin\AppData\Local\Temp\eb4632bcaf56a47ec25919767657f725cc0e9688c30478b81f49498b4125a5f6.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\porkd.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinUpdt" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1196
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\local.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\local.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3144
-
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1436
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5deba559edd7e3c8dcc3e27362ac41cde
SHA1a5688d69bc779c836262874f344de154ae7e7219
SHA25649f5709cc8357f7e406ae904f54d82d476094e2e93dc93308147d8ed9a175a90
SHA5129296532fd85f48b49802be12a8581453f84274cada2433d082d5901bd86c57c86bdcc4bd4420d2f6014d1e964f0b1234eb0d34bd23ffad22c9ae02f615847fbd
-
Filesize
1.7MB
MD503e18b31317dc41ce32605254057d9ce
SHA1b7b3103419aa50a9e2786da03486b1eceaa0b0ce
SHA2562900adec5f77fe6066b674956cebca4c75628ce06a08118db7557baf6089640a
SHA512c4d2ca179ba34f13f42fada6e56177cd376fb0c6b00b7d17ef13d97d71806ff5c9a7628a505d0fd45dd37677e924456c9b63d3fcafa720c098b03e26a70faf7e