Resubmissions

11-01-2025 02:58

250111-dgnb9stjep 7

02-01-2025 11:16

250102-ndlpdayrhs 10

02-01-2025 11:04

250102-m6qy5aypdz 10

Analysis

  • max time kernel
    119s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 02:58

General

  • Target

    yes.png

  • Size

    158KB

  • MD5

    2364ecb2d3966d365806878891a7cc00

  • SHA1

    35c38f9e237a3b942c16f36c90292ade83ab496f

  • SHA256

    aae7699b056e19bc9fd9ba3c5aa7571c2505cdd50108ae71b9d31fc690109c82

  • SHA512

    2b8d46a63b1843cb44516a4632c1f689b25a1e55610762534e875753f98b367c814dc5981d88edb562c21f18d9f5dfa9432f8997ac380af02b79f0ea51357859

  • SSDEEP

    3072:YOSE3N6QqCZNm3HXTu18hI/+g8MWqkPctocnlN7OEMm066SfTwFd6VFc2UTQ:lSENqwNOw8hVF9c2clN6EbUAg3rTQ

Malware Config

Signatures

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops file in System32 directory 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\yes.png
    1⤵
      PID:4016
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe"
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1980
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
      1⤵
        PID:4220
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:1336
        • C:\Windows\system32\mspaint.exe
          "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\yes.png" /ForceBootstrapPaint3D
          1⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:1456
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
          1⤵
          • Drops file in System32 directory
          PID:2892
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:1804

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\yes.png

          Filesize

          161KB

          MD5

          66b4cf060d485c109161a63175635978

          SHA1

          ad6208ee67e8bbd5afef36481cac3ad20f88b73e

          SHA256

          09155254efc1f636b921449ba8a1fe832493be4b5f2e08f4acb11b036c432e62

          SHA512

          b3978338a14b983c180cc6e0a0228f74dcbf5babdc9324ee37db8ae648855e7980c247ab4081afb512035998a7573925f3122274c2979edf3294cb83d2164069

        • memory/2892-0-0x000001AEF79C0000-0x000001AEF79D0000-memory.dmp

          Filesize

          64KB

        • memory/2892-4-0x000001AEF8360000-0x000001AEF8370000-memory.dmp

          Filesize

          64KB

        • memory/2892-11-0x000001AEFC650000-0x000001AEFC651000-memory.dmp

          Filesize

          4KB

        • memory/2892-13-0x000001AEFC6D0000-0x000001AEFC6D1000-memory.dmp

          Filesize

          4KB

        • memory/2892-15-0x000001AEFC6D0000-0x000001AEFC6D1000-memory.dmp

          Filesize

          4KB

        • memory/2892-16-0x000001AEFC760000-0x000001AEFC761000-memory.dmp

          Filesize

          4KB

        • memory/2892-17-0x000001AEFC760000-0x000001AEFC761000-memory.dmp

          Filesize

          4KB

        • memory/2892-18-0x000001AEFC770000-0x000001AEFC771000-memory.dmp

          Filesize

          4KB

        • memory/2892-19-0x000001AEFC770000-0x000001AEFC771000-memory.dmp

          Filesize

          4KB