Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250410-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250410-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
10/04/2025, 19:40
Behavioral task
behavioral1
Sample
817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe
Resource
win10ltsc2021-20250410-en
General
-
Target
817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe
-
Size
345KB
-
MD5
fc01e536eb60eb27a3f954ccfb7cdc5a
-
SHA1
7355be1ed9bf00067e84f8207345923325fd7d32
-
SHA256
817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a
-
SHA512
12ce88e18be740d705b2f4305252943322d0578194947bf1f595e3b5a22df708b9abfbe321d8a5422830f49b8692b003f78e85a5d0271a94bf4a74d8c63220e7
-
SSDEEP
6144:+PtFqR7FDwaIJGIDHO4Il8Uc/IX9rER13dLeeWEXTFI1tEnnbGQVNXv9uOS9U:6jqRxJlsu4j2Ngtee/TFI1tEnnbGqNXF
Malware Config
Signatures
-
Downloads MZ/PE file 2 IoCs
flow pid Process 13 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 17 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe -
Executes dropped EXE 3 IoCs
pid Process 2004 0CUUFTCSJEOGKM8GLWKW7ES7MQAY2SD.exe 3232 NK3B1IIVUWW0SFL0.exe 3748 atkexComSvc.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\atkexComSvc = "C:\\ProgramData\\atkexComSvc.exe" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4288 2004 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0CUUFTCSJEOGKM8GLWKW7ES7MQAY2SD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NK3B1IIVUWW0SFL0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atkexComSvc.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4192 reg.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 3232 NK3B1IIVUWW0SFL0.exe 3232 NK3B1IIVUWW0SFL0.exe 3748 atkexComSvc.exe 3748 atkexComSvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeImpersonatePrivilege 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe Token: SeImpersonatePrivilege 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2004 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 81 PID 2104 wrote to memory of 2004 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 81 PID 2104 wrote to memory of 2004 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 81 PID 2104 wrote to memory of 3232 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 85 PID 2104 wrote to memory of 3232 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 85 PID 2104 wrote to memory of 3232 2104 817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe 85 PID 3232 wrote to memory of 3656 3232 NK3B1IIVUWW0SFL0.exe 86 PID 3232 wrote to memory of 3656 3232 NK3B1IIVUWW0SFL0.exe 86 PID 3232 wrote to memory of 3656 3232 NK3B1IIVUWW0SFL0.exe 86 PID 3656 wrote to memory of 4192 3656 cmd.exe 88 PID 3656 wrote to memory of 4192 3656 cmd.exe 88 PID 3656 wrote to memory of 4192 3656 cmd.exe 88 PID 4004 wrote to memory of 3748 4004 cmd.exe 91 PID 4004 wrote to memory of 3748 4004 cmd.exe 91 PID 4004 wrote to memory of 3748 4004 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe"C:\Users\Admin\AppData\Local\Temp\817a988946844440df765ab64052f276470e3081294a4dc4d5d19adb74b3aa8a.exe"1⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\0CUUFTCSJEOGKM8GLWKW7ES7MQAY2SD.exe"C:\Users\Admin\AppData\Local\Temp\0CUUFTCSJEOGKM8GLWKW7ES7MQAY2SD.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 6963⤵
- Program crash
PID:4288
-
-
-
C:\Users\Admin\AppData\Local\Temp\NK3B1IIVUWW0SFL0.exe"C:\Users\Admin\AppData\Local\Temp\NK3B1IIVUWW0SFL0.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\cmd.execmd /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v atkexComSvc /t REG_SZ /d C:\ProgramData\atkexComSvc.exe /f"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v atkexComSvc /t REG_SZ /d C:\ProgramData\atkexComSvc.exe /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4192
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2004 -ip 20041⤵PID:4900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\atkexComSvc.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\ProgramData\atkexComSvc.exeC:\ProgramData\atkexComSvc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
Network
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.8MB
MD5b4f95c0def652145e9a081896c1ff0b3
SHA196e18c8e8e7d6548d4551038951a3231867f9ba3
SHA2566f0c30497c42675d68a4dfcddbb8b4a4699a28bbd05fc0feea91dc3c537c4ed6
SHA512200cc62bf1c9dcc48723b252e6c4abeab45e7e20346fa6da8b4aa58d47bfa1af3e47ac397df1ae96c8c6a6d4c2f3cbf856d583d275f4c06501c2961be8a32fb6
-
Filesize
10.5MB
MD5957e7d44b235699be79351c274cd8b99
SHA1e10f2b728fd02e49c80591241b239a96a029c6be
SHA2562e0a299e318a9a6928bc24b228e976a09c5322343bf0449620d42d04b615c739
SHA512baed1a2ea2d0476f61e5c10389998a5335ca18d790377c27330a91700078bb09b1f93d2e7457afa045c41b866ce732903f1b1a18038b72ca8579ab62a5bf5c35