Analysis

  • max time kernel
    73s
  • max time network
    70s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-01-2025 22:52

General

  • Target

    idk.exe

  • Size

    839KB

  • MD5

    54e1acf7a7769c332fde3c497fc722ad

  • SHA1

    b57224bc44bac62740b78fe86afa3a7fb83b901e

  • SHA256

    bc0a1fcda7c1e2f33ac4ba5b4bf842c2c998d672c6cdd1855ffee526ae20f3f8

  • SHA512

    74e4c93dfe8fa742726b321fd2de1be70bc7e710f6e9010ec2ca823ff2941ca00c51e52e5e2eabac6f8e19b0710bf8831746eb5d91eda15218bbe52dbcfe969f

  • SSDEEP

    24576:6BS04YNEMuExDiU6E5R9s8xY/2l/dGtnIbt+ro:6j4auS+UjfU2TGdIbt+r

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\idk.exe
    "C:\Users\Admin\AppData\Local\Temp\idk.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3464
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
    1⤵
      PID:3120
    • C:\Windows\system32\BackgroundTransferHost.exe
      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
      1⤵
      • Modifies registry class
      PID:4628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\bfac2432-8ad8-43f7-90c9-808894d33a18.down_data

      Filesize

      555KB

      MD5

      5683c0028832cae4ef93ca39c8ac5029

      SHA1

      248755e4e1db552e0b6f8651b04ca6d1b31a86fb

      SHA256

      855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

      SHA512

      aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe

      Filesize

      839KB

      MD5

      54e1acf7a7769c332fde3c497fc722ad

      SHA1

      b57224bc44bac62740b78fe86afa3a7fb83b901e

      SHA256

      bc0a1fcda7c1e2f33ac4ba5b4bf842c2c998d672c6cdd1855ffee526ae20f3f8

      SHA512

      74e4c93dfe8fa742726b321fd2de1be70bc7e710f6e9010ec2ca823ff2941ca00c51e52e5e2eabac6f8e19b0710bf8831746eb5d91eda15218bbe52dbcfe969f

    • memory/3464-19-0x0000000074990000-0x0000000074F41000-memory.dmp

      Filesize

      5.7MB

    • memory/3464-20-0x0000000074990000-0x0000000074F41000-memory.dmp

      Filesize

      5.7MB

    • memory/3464-21-0x0000000074990000-0x0000000074F41000-memory.dmp

      Filesize

      5.7MB

    • memory/3464-22-0x0000000074990000-0x0000000074F41000-memory.dmp

      Filesize

      5.7MB

    • memory/4220-0-0x0000000074991000-0x0000000074992000-memory.dmp

      Filesize

      4KB

    • memory/4220-1-0x0000000074990000-0x0000000074F41000-memory.dmp

      Filesize

      5.7MB

    • memory/4220-2-0x0000000074990000-0x0000000074F41000-memory.dmp

      Filesize

      5.7MB

    • memory/4220-18-0x0000000074990000-0x0000000074F41000-memory.dmp

      Filesize

      5.7MB