Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 19:40
Behavioral task
behavioral1
Sample
817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe
Resource
win10ltsc2021-20250410-en
General
-
Target
817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe
-
Size
345KB
-
MD5
fc01e536eb60eb27a3f954ccfb7cdc5a
-
SHA1
7355be1ed9bf00067e84f8207345923325fd7d32
-
SHA256
817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a
-
SHA512
12ce88e18be740d705b2f4305252943322d0578194947bf1f595e3b5a22df708b9abfbe321d8a5422830f49b8692b003f78e85a5d0271a94bf4a74d8c63220e7
-
SSDEEP
6144:+PtFqR7FDwaIJGIDHO4Il8Uc/IX9rER13dLeeWEXTFI1tEnnbGQVNXv9uOS9U:6jqRxJlsu4j2Ngtee/TFI1tEnnbGqNXF
Malware Config
Signatures
-
Downloads MZ/PE file 2 IoCs
flow pid Process 49 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 64 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe -
Executes dropped EXE 3 IoCs
pid Process 1468 3TR0Q6H406B1O61NWY55D2I9I9.exe 2428 51WRFA3GURKGRIV9CDL5Z7.exe 2580 atkexComSvc.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\atkexComSvc = "C:\\ProgramData\\atkexComSvc.exe" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3584 1468 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atkexComSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3TR0Q6H406B1O61NWY55D2I9I9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51WRFA3GURKGRIV9CDL5Z7.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3532 reg.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 2428 51WRFA3GURKGRIV9CDL5Z7.exe 2428 51WRFA3GURKGRIV9CDL5Z7.exe 2580 atkexComSvc.exe 2580 atkexComSvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeImpersonatePrivilege 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe Token: SeImpersonatePrivilege 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1004 wrote to memory of 1468 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 100 PID 1004 wrote to memory of 1468 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 100 PID 1004 wrote to memory of 1468 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 100 PID 1004 wrote to memory of 2428 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 106 PID 1004 wrote to memory of 2428 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 106 PID 1004 wrote to memory of 2428 1004 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 106 PID 2428 wrote to memory of 1628 2428 51WRFA3GURKGRIV9CDL5Z7.exe 112 PID 2428 wrote to memory of 1628 2428 51WRFA3GURKGRIV9CDL5Z7.exe 112 PID 2428 wrote to memory of 1628 2428 51WRFA3GURKGRIV9CDL5Z7.exe 112 PID 1628 wrote to memory of 3532 1628 cmd.exe 114 PID 1628 wrote to memory of 3532 1628 cmd.exe 114 PID 1628 wrote to memory of 3532 1628 cmd.exe 114 PID 1492 wrote to memory of 2580 1492 cmd.exe 117 PID 1492 wrote to memory of 2580 1492 cmd.exe 117 PID 1492 wrote to memory of 2580 1492 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe"C:\Users\Admin\AppData\Local\Temp\817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe"1⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\3TR0Q6H406B1O61NWY55D2I9I9.exe"C:\Users\Admin\AppData\Local\Temp\3TR0Q6H406B1O61NWY55D2I9I9.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 6683⤵
- Program crash
PID:3584
-
-
-
C:\Users\Admin\AppData\Local\Temp\51WRFA3GURKGRIV9CDL5Z7.exe"C:\Users\Admin\AppData\Local\Temp\51WRFA3GURKGRIV9CDL5Z7.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.execmd /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v atkexComSvc /t REG_SZ /d C:\ProgramData\atkexComSvc.exe /f"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v atkexComSvc /t REG_SZ /d C:\ProgramData\atkexComSvc.exe /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3532
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1468 -ip 14681⤵PID:3248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\atkexComSvc.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\ProgramData\atkexComSvc.exeC:\ProgramData\atkexComSvc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
Network
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.8MB
MD5b4f95c0def652145e9a081896c1ff0b3
SHA196e18c8e8e7d6548d4551038951a3231867f9ba3
SHA2566f0c30497c42675d68a4dfcddbb8b4a4699a28bbd05fc0feea91dc3c537c4ed6
SHA512200cc62bf1c9dcc48723b252e6c4abeab45e7e20346fa6da8b4aa58d47bfa1af3e47ac397df1ae96c8c6a6d4c2f3cbf856d583d275f4c06501c2961be8a32fb6
-
Filesize
10.5MB
MD5957e7d44b235699be79351c274cd8b99
SHA1e10f2b728fd02e49c80591241b239a96a029c6be
SHA2562e0a299e318a9a6928bc24b228e976a09c5322343bf0449620d42d04b615c739
SHA512baed1a2ea2d0476f61e5c10389998a5335ca18d790377c27330a91700078bb09b1f93d2e7457afa045c41b866ce732903f1b1a18038b72ca8579ab62a5bf5c35