Analysis

  • max time kernel
    118s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 09:11

General

  • Target

    9e993ed3ec524a5fe3d0c3cabc76d9346af445a76179c3f848ecfd2482d31f6bN.exe

  • Size

    91KB

  • MD5

    1e2b3437eac561d5e0abd77a07f97090

  • SHA1

    0a43d1c8a50480314f907e7a2736e092ea52a8bf

  • SHA256

    9e993ed3ec524a5fe3d0c3cabc76d9346af445a76179c3f848ecfd2482d31f6b

  • SHA512

    7b1851077fede5b0e3a8a464dc8989918b928d7921745258920bd89d384603d2292bc53f7c114bcd53d5bfaf12242b67c8e57a3217a58c89b31262355bf459da

  • SSDEEP

    768:5vw9816uhKiroz4/wQNNrfrunMxVFA3bQ:lEGkmozlCunMxVS3E

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e993ed3ec524a5fe3d0c3cabc76d9346af445a76179c3f848ecfd2482d31f6bN.exe
    "C:\Users\Admin\AppData\Local\Temp\9e993ed3ec524a5fe3d0c3cabc76d9346af445a76179c3f848ecfd2482d31f6bN.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Windows\{B1BC123B-F84B-4c27-9FD0-25ED5805868A}.exe
      C:\Windows\{B1BC123B-F84B-4c27-9FD0-25ED5805868A}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Windows\{A20F847E-B6D3-4f72-B7D7-0BBD7EBCED40}.exe
        C:\Windows\{A20F847E-B6D3-4f72-B7D7-0BBD7EBCED40}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Windows\{EED720ED-7AC7-4067-97C8-41B761ED258C}.exe
          C:\Windows\{EED720ED-7AC7-4067-97C8-41B761ED258C}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1264
          • C:\Windows\{5F2AB0E3-9FDB-4953-A8B6-2241E43A0DB7}.exe
            C:\Windows\{5F2AB0E3-9FDB-4953-A8B6-2241E43A0DB7}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:960
            • C:\Windows\{948BDB17-49E7-416e-B856-0C5FDB5918D2}.exe
              C:\Windows\{948BDB17-49E7-416e-B856-0C5FDB5918D2}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4480
              • C:\Windows\{A56555C8-DEC1-4895-BE96-A701302033AB}.exe
                C:\Windows\{A56555C8-DEC1-4895-BE96-A701302033AB}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:804
                • C:\Windows\{8B66304D-191F-4c29-9AF4-03DE99098A39}.exe
                  C:\Windows\{8B66304D-191F-4c29-9AF4-03DE99098A39}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2464
                  • C:\Windows\{660E5C88-C8F0-4f11-9E16-1470FB2525FA}.exe
                    C:\Windows\{660E5C88-C8F0-4f11-9E16-1470FB2525FA}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2280
                    • C:\Windows\{A8F79EF1-8407-42ce-A108-92B272CAD2CC}.exe
                      C:\Windows\{A8F79EF1-8407-42ce-A108-92B272CAD2CC}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:844
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{660E5~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1420
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{8B663~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:3372
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{A5655~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2720
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{948BD~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2788
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{5F2AB~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2104
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{EED72~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3944
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{A20F8~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2448
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{B1BC1~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1164
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\9E993E~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{5F2AB0E3-9FDB-4953-A8B6-2241E43A0DB7}.exe

    Filesize

    91KB

    MD5

    51daffabb289c578cec050102834b3bf

    SHA1

    b75bdfd657ee6b6de68807013e10fad4de96b9cf

    SHA256

    bde8037bf60c44cfc21e660534eb2adb1a3ef4c40180ce95935dffba3cc93dd6

    SHA512

    b710633359e06206edd1039bc3940a434e6a619343e944689d540db55ba8819c7594b2b5af3feda89353b00ae1ee70f8271df0ea552d36f4d7f49306d695e47e

  • C:\Windows\{660E5C88-C8F0-4f11-9E16-1470FB2525FA}.exe

    Filesize

    91KB

    MD5

    a9c96556ada172b5cafbfc42dcfdfebf

    SHA1

    c1d9d8e23be4753df5f9ab29a4db680f880f5189

    SHA256

    8c109aea6803d09aafcd6216f9d01a779a683af1c26da1f1108933678811378f

    SHA512

    2d27300e74c05c567051452d6a393577c15c8fa67836b7973dd964283a6e5e230b7d27ebde1f687886e484ece5e4044604bd077b16b1b660198396d30ea5d1c2

  • C:\Windows\{8B66304D-191F-4c29-9AF4-03DE99098A39}.exe

    Filesize

    91KB

    MD5

    6ed6201fe5dda051445f1ab17b71ec45

    SHA1

    93ae5d2c97533ac746b3662c1ca95ec72ffd636c

    SHA256

    94b6bc3c25f5e167443deba9022fca87c74a1a25a336ba169b12ba1a14cb94fe

    SHA512

    4045c4557018e042e962afca4b044831099933a92b61e31a16c1c433f81d20067c033153cc85d8452776383145b40ace868354d05311cc6d61520c9052ba75ca

  • C:\Windows\{948BDB17-49E7-416e-B856-0C5FDB5918D2}.exe

    Filesize

    91KB

    MD5

    f6bd06af32886fc323e571effa7dacb1

    SHA1

    a6b23a344bb87660f89cc1d0cfb175f49cb278b1

    SHA256

    394662bca91128af40bc789f13eaec77c5457cf5e3221ab4a6ea445ed5fe41da

    SHA512

    93219b797bcd20c1d2b0bfe81b869486952945766d107cea44556629675dad3f4f2b8c28a7cd10bedf0fbb4f7ffb73ff586c1bd8642717e729ca5d8cfae2669f

  • C:\Windows\{A20F847E-B6D3-4f72-B7D7-0BBD7EBCED40}.exe

    Filesize

    91KB

    MD5

    ccb30c0e50375fc8ae2fb484dd7f46df

    SHA1

    363e317e9ac749734b4abde12921ef7cb099b55b

    SHA256

    ef93ab28cdae3752896eac8c9070cc82238de0802506d89d4997447813e3a61b

    SHA512

    d60bdf63d4bc6d4afdb458edc4c3f7a752805b1be55b7d727489f99399e879c61c9a077301cde427956860e40991f5db5a3866f351d72c5a8103ba2e7a3dbabb

  • C:\Windows\{A56555C8-DEC1-4895-BE96-A701302033AB}.exe

    Filesize

    91KB

    MD5

    e7e029b024ef9a11371ec82a08ece563

    SHA1

    de363146f5197c4325ed3d7058202d3f2fadcb10

    SHA256

    ae79b1fde5e68ce84db835b7ec68d9f99ce8ee45412a212d944ef4472f58b24a

    SHA512

    133584b6fb5ec698022bbe6ce0e881cd11cd2838a60de007718996b8cc19c813178e5edf680b78e8060beece0843d5cc012ee45377e64fa8c2416fa9cdf095cc

  • C:\Windows\{A8F79EF1-8407-42ce-A108-92B272CAD2CC}.exe

    Filesize

    91KB

    MD5

    b16ce77a921726e3a674d6bb1a9f1b36

    SHA1

    2dc65e2aaf1661e32a2184293f22ecd146a037e7

    SHA256

    bbf7d536848638d70cc866c1c09254339f81c08a876f81ebb6f50b6c6f65e1fb

    SHA512

    d47d04ddee241f70d3dab8f11f0f9dd7552fa7a3fb04f5f0fbdee3a50e6fba116eb92e1abd5644237a53088aa5ac44e361ca42a363aa68a612ff2d2db7a6a2e6

  • C:\Windows\{B1BC123B-F84B-4c27-9FD0-25ED5805868A}.exe

    Filesize

    91KB

    MD5

    3dca88b4e37cceded6dd55e0c1de495b

    SHA1

    28018c2a7e8eb3396b825776525a8a314d0454dd

    SHA256

    9535cb745d7ac508d5cd513256735642e5330df22db441c2785c993fb94a1f8b

    SHA512

    cc4550ee5737c336f02d8793077af23df8940c395271c57ea5c8e814535ed274ec21e6bfdf1e955cee0a41cd925601a59675e063c2ff3cec811c6d3916a97f86

  • C:\Windows\{EED720ED-7AC7-4067-97C8-41B761ED258C}.exe

    Filesize

    91KB

    MD5

    57070d132f29f7c02c6b48b5c31f73d1

    SHA1

    3165e79e21b99ad781d15b6331fe8b33e924957f

    SHA256

    39e70ecf885ba495a5eb7ace94463388ed6dac0ec53360651640ed9d310d2a86

    SHA512

    3703f329c33c2c4bb4b8cdc71fba4984f68aa72b580d7d71bcef75ed0ec60c20405e3016d7a7c9d936af79aeff249fb7ef57afdf65adc649cdfcc61bfea491d5

  • memory/804-42-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/804-38-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/844-56-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/848-7-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/848-1-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/848-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/960-26-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/960-30-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1264-24-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1264-19-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2280-54-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2280-49-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2464-44-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2464-48-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2572-18-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2572-13-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3872-12-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3872-8-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3872-5-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4480-37-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4480-31-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB