Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 12:24
Static task
static1
Behavioral task
behavioral1
Sample
966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe
Resource
win10v2004-20241007-en
General
-
Target
966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe
-
Size
328KB
-
MD5
7bb8c348e54b41aee99d96ded45ef0c3
-
SHA1
9d44dd701704c252d2d264145b9bb4179ed41059
-
SHA256
966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169
-
SHA512
bc4e33731a6622636a347195102947da5b897df2e23083d77751fcb790869e31763b0db46fafa0d439592a3472d4aede3b34965672a682f6f29820977ea54918
-
SSDEEP
6144:zyWOeLm+tkxoGQvT+W4+HMc+MEGRQ6saHSMf3z0AzbLUG50Tpm+MmvbWdlL0d5as:zCemx0vN3HKGi6sYjJLUGGtedud5trp
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\03e69299.sys 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 3784 takeown.exe 3432 icacls.exe 3680 takeown.exe 2984 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\03e69299\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\03e69299.sys" 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 3432 icacls.exe 3680 takeown.exe 2984 icacls.exe 3784 takeown.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ws2tcpip.dll 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe File opened for modification C:\Windows\SysWOW64\ws2tcpip.dll 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe File created C:\Windows\SysWOW64\wshtcpip.dll 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe File created C:\Windows\SysWOW64\midimap.dll 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\HOOK_ID 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\HOOK_ID\name = "966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe" 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\SYS_DLL 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\SYS_DLL\name = "i6qawafy.dll" 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe Token: SeTakeOwnershipPrivilege 3784 takeown.exe Token: SeTakeOwnershipPrivilege 3680 takeown.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3184 wrote to memory of 1692 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 96 PID 3184 wrote to memory of 1692 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 96 PID 3184 wrote to memory of 1692 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 96 PID 1692 wrote to memory of 3784 1692 cmd.exe 98 PID 1692 wrote to memory of 3784 1692 cmd.exe 98 PID 1692 wrote to memory of 3784 1692 cmd.exe 98 PID 1692 wrote to memory of 3432 1692 cmd.exe 99 PID 1692 wrote to memory of 3432 1692 cmd.exe 99 PID 1692 wrote to memory of 3432 1692 cmd.exe 99 PID 3184 wrote to memory of 4920 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 100 PID 3184 wrote to memory of 4920 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 100 PID 3184 wrote to memory of 4920 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 100 PID 4920 wrote to memory of 3680 4920 cmd.exe 102 PID 4920 wrote to memory of 3680 4920 cmd.exe 102 PID 4920 wrote to memory of 3680 4920 cmd.exe 102 PID 4920 wrote to memory of 2984 4920 cmd.exe 103 PID 4920 wrote to memory of 2984 4920 cmd.exe 103 PID 4920 wrote to memory of 2984 4920 cmd.exe 103 PID 3184 wrote to memory of 4348 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 104 PID 3184 wrote to memory of 4348 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 104 PID 3184 wrote to memory of 4348 3184 966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe"C:\Users\Admin\AppData\Local\Temp\966f5f23d9d080dc8a033edab269598805651bf5be078b21f8e660ad530d0169.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\wshtcpip.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3432
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\midimap.dll && icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\midimap.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat2⤵
- System Location Discovery: System Language Discovery
PID:4348
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD5e5a130e54782b7f199b81b3d9959679a
SHA172c1eb0055ed358722c6530b81590226174f8a6c
SHA256a5d88b35012a4647d32b3cd0d4e7d8999b4f00f3f7fc352a9348329ad6ae9c4c
SHA512df7aa72f311fe7abe3ef6a034a1a91401a7596f484f28fd207add7981717f996a6bf997df31aeac0640353868d8061490846ed2dfc2023390d32868354f2d161