Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2025, 12:06

General

  • Target

    b94ecfae3b5514ba1dc5c10faf595527159a535b5c326b39cb42185e6ef6d477.exe

  • Size

    10.9MB

  • MD5

    c836c14219ca56536439cc008608740f

  • SHA1

    a4e237dbd668e757595084872a921746edbcd418

  • SHA256

    b94ecfae3b5514ba1dc5c10faf595527159a535b5c326b39cb42185e6ef6d477

  • SHA512

    d03cf84096cf6b34be6fa15f18a0e8b721b2f9400d1dd95f7e584b27c938c6b4f3ec72dd424c4f81d9af5917c607d8ae3c00c2e321b571d2ace024110a6a66d6

  • SSDEEP

    196608:JrH67uot0SW/ZA9SL3oSzC1/OxwnIBSnCITfLb8MAFGrCaPiqXpAo83jVolDN/+K:Jvo2nZA9SMSzCl7YSnC8fLbUGr0UAH34

Malware Config

Signatures

  • Detects HijackLoader (aka IDAT Loader) 1 IoCs
  • HijackLoader

    HijackLoader is a multistage loader first seen in 2023.

  • Hijackloader family
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b94ecfae3b5514ba1dc5c10faf595527159a535b5c326b39cb42185e6ef6d477.exe
    "C:\Users\Admin\AppData\Local\Temp\b94ecfae3b5514ba1dc5c10faf595527159a535b5c326b39cb42185e6ef6d477.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\{21F50E39-05B3-4802-895A-FE76C4C169BA}\_isCBAC.exe
      "C:\Users\Admin\AppData\Local\Temp\{21F50E39-05B3-4802-895A-FE76C4C169BA}\_isCBAC.exe" -IS_temp ORIGINALSETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" ORIGINALSETUPEXENAME="b94ecfae3b5514ba1dc5c10faf595527159a535b5c326b39cb42185e6ef6d477.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:620
      • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\vmtoolsd.exe
        "C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\vmtoolsd.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2212
        • C:\Windows\SysWOW64\netsh.exe
          C:\Windows\SysWOW64\netsh.exe
          4⤵
          • Drops startup file
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3356
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\{21F50E39-05B3-4802-895A-FE76C4C169BA}\_isCBAC.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1536
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTg3Njg2MzkwIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:1404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\72698bc3

    Filesize

    900KB

    MD5

    5502fba2187f393b7e5e1830d9906c46

    SHA1

    2914c24491cb85d3683142d8b999d136ce26413d

    SHA256

    8c8162887b5e25de8b9feb5f1ee3c2df4dcacf597b9d9c801d0e1d1a3758dd55

    SHA512

    b21226990b07b00e025baa541263b6cf0601817c486db9ee6e1fcc94ef6dc5b0104a79c279ecba4e0054780cc016b994b9567a8a4f99458b2198975ac281e0d5

  • C:\Users\Admin\AppData\Local\Temp\wtltla

    Filesize

    1KB

    MD5

    03517d1c0ffd09df07e787aed54ac58a

    SHA1

    19390652a75553c9fed6c765f4f005bb750a9d00

    SHA256

    e47c9daea0674c21f33d54b2443f08b423551abe1d0692fc200a220023016800

    SHA512

    aefcb351efbcc1e9a1f373b3a96c45366de8022933e060bdeca5b3f85971e8f9621a3f41b660e5b61c6de26a8e89920938dc9049e3b19bfb831c53c2b5b2b83b

  • C:\Users\Admin\AppData\Local\Temp\{21F50E39-05B3-4802-895A-FE76C4C169BA}\SuiteSetup.ini

    Filesize

    127B

    MD5

    e45a9bc0a5f9a8334ddc22c1d6f2a182

    SHA1

    8251edf84a83f435907d9f54626b95882fc85de4

    SHA256

    c32b270d5d13fd5ea5616834517bc1591c4a5f8a392bed3dc7d70f3fbf79b75f

    SHA512

    a7a93b5e17226c9abb1e2005cdd2e54cea616f691f525bfb438509c616ca1f4f8179fc34cb31fad74fc8268895bd61b793618d05724b0d3a2e7f2b3a95df900b

  • C:\Users\Admin\AppData\Local\Temp\{21F50E39-05B3-4802-895A-FE76C4C169BA}\_isCBAC.exe

    Filesize

    10.9MB

    MD5

    c836c14219ca56536439cc008608740f

    SHA1

    a4e237dbd668e757595084872a921746edbcd418

    SHA256

    b94ecfae3b5514ba1dc5c10faf595527159a535b5c326b39cb42185e6ef6d477

    SHA512

    d03cf84096cf6b34be6fa15f18a0e8b721b2f9400d1dd95f7e584b27c938c6b4f3ec72dd424c4f81d9af5917c607d8ae3c00c2e321b571d2ace024110a6a66d6

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\crinoid.jpeg

    Filesize

    723KB

    MD5

    be07f9c4b1e294459ca4d3485b36e417

    SHA1

    224da0cb9bd665b690166f63e37538dd7479c340

    SHA256

    58eb477af0311544b8939d99f22dce69edcf3ad918274102c093966f1b4612f4

    SHA512

    f1f9fbb1b498e63eaf3ec5cf382eb5f10720213e39077f1ee4410dd06ecc3421fa49cf5646d9292c9dee60a29beb0b65d268dc39ed5514908670b8a80bd3b35a

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\glib-2.0.dll

    Filesize

    1.0MB

    MD5

    2c86ec2ba23eb138528d70eef98e9aaf

    SHA1

    246846a3fe46df492f0887a31f7d52aae4faa71a

    SHA256

    030983470da06708cc55fd6aca92df199a051922b580db5db55c8cb6b203b51b

    SHA512

    396a3883fa65d7c3a0af7d607001a6099316a85563147cb34fa9806c9a4b39cfa90c7fa9eb4456399977eb47438d10896d25ed5327ae7aa3e3ae28cd1d13701c

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\gmodule-2.0.dll

    Filesize

    24KB

    MD5

    b0a421b1534f3194132ec091780472d8

    SHA1

    699b1edc2cb19a48999a52a62a57ffc0f48f1a78

    SHA256

    2d6bc34b38bc0abf0c5e2f40e2513b4df47af57848534e011a76d4e974ad958b

    SHA512

    ba74654843c5b0f94dfefbed81cbee4c5f360193ef8ea92836c712fbeada39fa8179a51f0849f6c4be23add1ced08f5e25f873c4b0e7533ae647fa2b19b83f98

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\gobject-2.0.dll

    Filesize

    281KB

    MD5

    24a7a712160abc3f23f7410b18de85b8

    SHA1

    a01c3e116b6496c9feaa2951f6f6633bb403c3a1

    SHA256

    78dd76027e10c17824978db821777fcaa58d7cd5d5eb9d80d6ee817e26b18ab8

    SHA512

    d1f14a7bd44e1fc9bfc61f0b751ee6e0677322807ce5621206eeef898bab6c71ef1464962b20dc50f706084e53281a0d4b6d9142c6c1170a1e0a5fe4b12171df

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\gthread-2.0.dll

    Filesize

    31KB

    MD5

    78cf6611f6928a64b03a57fe218c3cd4

    SHA1

    c3f167e719aa944af2e80941ac629d39cec22308

    SHA256

    dbaad965702b89c371462e735dd925c694eda8d8557b280f7264bba992c0e698

    SHA512

    5caf019a6b75ba0330b8d0b60d362201d4863c0f3d70d2a9c84b6dbea2027d09bc8a6433820f28a41d126c7aaa13dbe126b38dc5c6d14a67ddef402fed9d9b7c

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\iconv.dll

    Filesize

    1.1MB

    MD5

    862dfc9bf209a46d6f4874614a6631cc

    SHA1

    43216aae64df217cba009145b6f9ad5b97fe927a

    SHA256

    84538f1aacebf9daad9fdb856611ab3d98a6d71c9ec79a8250eee694d2652a8b

    SHA512

    b0611cd9ad441871cca62291913197257660390fa4ea8a26cb41dc343a8a27ae111762de40c6f50cae3e365d8891500fc6ad0571aa3cd3a77eb83d9d488d19a8

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\intl.dll

    Filesize

    87KB

    MD5

    7dec946e99d79de06b04da51a280c1b7

    SHA1

    2e247806df913c7eb4a7dfbda26b34a54c94af95

    SHA256

    c0a46dd783b5bfdb8752a96626a117a0af21229c686c9a79a9aea71031d4e92e

    SHA512

    31274d6cd6153cc5f8bfa16c0ef1924be504352802615996f9dad1feb432f334751f335a7f03fc282b4cb967d9cab7d8a1ffea8dca5cea1f282129ea76ac43e9

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\vmtools.dll

    Filesize

    617KB

    MD5

    65c3c2a741838474a592679cda346753

    SHA1

    043d80766dd4e49d8dca6ac72b04e09b5491fdc9

    SHA256

    4e5f2c54d9ecfe48999edfcce0de038948f8b20ff68e299c55d9a2d6f65713e8

    SHA512

    e5d8b308586ffa914f46b6766217eb12ad759853d25108db06170b870d0e8947e2befabc2843f76cb864b0f0135a8f2163b7c93fe644b293789919d1d07c4079

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Coba\vmtoolsd.exe

    Filesize

    63KB

    MD5

    ae224c5e196ff381836c9e95deebb7d5

    SHA1

    910446a2a0f4e53307b6fdeb1a3e236c929e2ef4

    SHA256

    bf933ccf86c55fc328e343b55dbf2e8ebd528e8a0a54f8f659cd0d4b4f261f26

    SHA512

    f845dbb13b04f76b6823bec48e1c47f96bcbd6d02a834c8b128ac750fe338b53f775ee2a8784e8c443d49dfcb918c5b9d59b5492a1fe18743b8ba65b7d12514c

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\ISLogoSmall.png

    Filesize

    1KB

    MD5

    0de9d9bd4ae583015157d5d3bc77801f

    SHA1

    6201c31badab2c50fd0c619704622e0e0cad9f5e

    SHA256

    3039e1e23afc42bd3c07a8f4b65fb5d0377ca70f9f4ffb6fd7e7f33d82d837d1

    SHA512

    b393ad1dadb60723b6032c0dc6cb9c50709b516c5f5d414b788e79b944e8a4c988c2425798f4a9b8bd05bc6d18f37cb3fba55ce93228e13d38e974eb18ee3ba2

  • C:\Users\Admin\AppData\Local\Temp\{949B750D-5342-4873-974E-AF17257AE2D2}\Setup_UI.dll

    Filesize

    911KB

    MD5

    f437389551192e19c60236f2175a40e5

    SHA1

    0f60f429c678787713597bc9268bc2a4d2dc68c6

    SHA256

    05652b16afce690e686495a22a3cb483d9c1055891e2af89e60f309b752e2398

    SHA512

    7b80bc23bd06ad37511f1ed561f804fc3fcfe68c3b9429f08a294aef4837edc383bddd50875aeecc8008db9462d3405498c92e8219fa37f61160e4a0f6dd1027

  • memory/2148-132-0x0000000073481000-0x000000007348E000-memory.dmp

    Filesize

    52KB

  • memory/2148-290-0x00007FFC11250000-0x00007FFC11445000-memory.dmp

    Filesize

    2.0MB

  • memory/2148-300-0x0000000073481000-0x000000007348E000-memory.dmp

    Filesize

    52KB

  • memory/2212-129-0x0000000073480000-0x00000000735FB000-memory.dmp

    Filesize

    1.5MB

  • memory/2212-130-0x0000000073480000-0x00000000735FB000-memory.dmp

    Filesize

    1.5MB

  • memory/2212-128-0x0000000073486000-0x0000000073488000-memory.dmp

    Filesize

    8KB

  • memory/2212-127-0x0000000073480000-0x00000000735FB000-memory.dmp

    Filesize

    1.5MB

  • memory/3356-298-0x0000000000A00000-0x0000000000A56000-memory.dmp

    Filesize

    344KB

  • memory/3356-301-0x00007FFC11250000-0x00007FFC11445000-memory.dmp

    Filesize

    2.0MB

  • memory/3356-302-0x0000000000A00000-0x0000000000A56000-memory.dmp

    Filesize

    344KB