Analysis

  • max time kernel
    29s
  • max time network
    40s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 11:19

General

  • Target

    c4de113d7ca4597bdd05804ad84eb07d901bc370fa5cbdd8b98695b69f8e4989.exe

  • Size

    11.4MB

  • MD5

    6e920f27729fe1771ea7bc14ea8df52a

  • SHA1

    372a2b839a496d5d7f0865019bf546926bae38f7

  • SHA256

    c4de113d7ca4597bdd05804ad84eb07d901bc370fa5cbdd8b98695b69f8e4989

  • SHA512

    a31cf1573629019d213cae454f392ce61d2a2b64144ea80aeaaac575d4935d31fc23a8666ac4e07fac5cb818b708714777c3e7d30c6949307d5acc306c36a55a

  • SSDEEP

    196608:ChyPrJJ30ArPtrMEWnCNRYlyyBtf05uBHYWuRPGeEj1DkDxOeB/+RWmY3ndITtey:+6PEAvNRAjfTYNbEjNemvY3naTtTmo

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4de113d7ca4597bdd05804ad84eb07d901bc370fa5cbdd8b98695b69f8e4989.exe
    "C:\Users\Admin\AppData\Local\Temp\c4de113d7ca4597bdd05804ad84eb07d901bc370fa5cbdd8b98695b69f8e4989.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3500
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3444
    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
      "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
      1⤵
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4892
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
        "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart
        2⤵
          PID:5388
          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
            C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode
            3⤵
              PID:2916

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

          Filesize

          25.4MB

          MD5

          2668864562de5b5d690b31940d8c5623

          SHA1

          2437f0967247e1f5eee45ba678fdceca6bdf97b3

          SHA256

          594eeefd1a4e7e092cae5b3b52fa872e6c0c2d69ba8dc1851004b92680f33138

          SHA512

          4fc7a834cadb7b91b34abbccc5d27ee55f4226a8eb63f8c88139b92e22aa8c166328dd59ca4418321080907c035a0b1da1da323db6d0952737f97b13992cd7b7

        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

          Filesize

          14.8MB

          MD5

          dcbd8c8c12ca55a6f4cced357ef76382

          SHA1

          6884eb92e90490d40a809a12fb54f56041eb9be2

          SHA256

          c741eba1c6ae68fe81709f6ee39113dc48d79221c4506a9361b7ce1fdf1dfa21

          SHA512

          2acf15079ce8f5606a9548250f0eb1d6973aef7d2ee1e03b6f4d08aa064491a1e9e696579340952b84d534479f03e589d698a720e23fca4d4fe39f0c2c5faffd

        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

          Filesize

          7.2MB

          MD5

          717c1349f1e5dc1c25222c1ebb6097dd

          SHA1

          edd717844a248f8af930f1381fafcdacadad5bc3

          SHA256

          7aed9677aff3ce2bbd8c03376473f628928ecd0bdac6f124ce5349e33bf9cc16

          SHA512

          903a7a625ca3d9521e875d59483121dce05455a5fa644a099dc1a7edb6427b09d2f0cee797b31a9bb3125a16595957b63523b1790bac084200d7903e2932546f

        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

          Filesize

          5.6MB

          MD5

          3e378ed6fddaa4c591316b6b257ccb58

          SHA1

          3660f996f712f95835773bf22f1744bafaf56e4e

          SHA256

          262812721e71513a114d915e917fac5f06778ca1eb4a500abd2674bcda4c6038

          SHA512

          10de53c38c04c85409678dcef49ef0e832fa3d5c3a8b4a8c61541b9e85c5f8e630dbf87e45c861fb26cd3d92ecf8b3300887b9621a572083863ee14a47627612

        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\setup\logs\DeviceHealthSummaryConfiguration.ini

          Filesize

          77B

          MD5

          4f0ac92e00000b2a804f5ea94b5d8fc8

          SHA1

          f948b5098c13b2acce412c8597556e009f4906c9

          SHA256

          93bf2faa65766d2296a5dcb8bce511f9a454e162af0d4c63d86733bce156d05c

          SHA512

          76c829c0140c93d6c10db3e05db3df177bdfd368a463668f96f46084531b37f1bfcaad0e796c7b5beb42aea4ceddff90d374d7700bf16597402ac6e192044b14

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MSRA1ROA\PreSignInSettingsConfig[1].json

          Filesize

          63KB

          MD5

          e516a60bc980095e8d156b1a99ab5eee

          SHA1

          238e243ffc12d4e012fd020c9822703109b987f6

          SHA256

          543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

          SHA512

          9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WP7READH\update100[1].xml

          Filesize

          726B

          MD5

          53244e542ddf6d280a2b03e28f0646b7

          SHA1

          d9925f810a95880c92974549deead18d56f19c37

          SHA256

          36a6bd38a8a6f5a75b73caffae5ae66dfabcaefd83da65b493fa881ea8a64e7d

          SHA512

          4aa71d92ea2c46df86565d97aac75395371d3e17877ab252a297b84dca2ab251d50aaffc62eab9961f0df48de6f12be04a1f4a2cbde75b9ae7bcce6eb5450c62

        • C:\Users\Admin\AppData\Local\Temp\tmpD1D7.tmp

          Filesize

          3.8MB

          MD5

          d540e03d76941cb22ff61988bdb21d3b

          SHA1

          ac5ef380937f1886d8d085cf6ed52ae678ffd304

          SHA256

          f78f5393f9785c3190857fb7038b09ccc2287297a6dbfde071821d75d02e43f3

          SHA512

          db86ee32ba5654c9fe49a7cc10cebae3810b60f8030af0e7fbbaa790ec3a2f8a63ff1c3da51ce7c2361f0301302bb33b7b5e9a49ce61c6cef510222625dd254b

        • memory/3500-2-0x00007FFF0C5A0000-0x00007FFF0C5A2000-memory.dmp

          Filesize

          8KB

        • memory/3500-10-0x00000001402B4000-0x0000000140ABC000-memory.dmp

          Filesize

          8.0MB

        • memory/3500-9-0x0000000140000000-0x0000000141627000-memory.dmp

          Filesize

          22.2MB

        • memory/3500-8-0x0000000140000000-0x0000000141627000-memory.dmp

          Filesize

          22.2MB

        • memory/3500-7-0x0000000140000000-0x0000000141627000-memory.dmp

          Filesize

          22.2MB

        • memory/3500-0-0x00000001402B4000-0x0000000140ABC000-memory.dmp

          Filesize

          8.0MB

        • memory/3500-1-0x00007FFF0C590000-0x00007FFF0C592000-memory.dmp

          Filesize

          8KB