Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250619-en -
resource tags
arch:x64arch:x86image:win10v2004-20250619-enlocale:en-usos:windows10-2004-x64system -
submitted
02/07/2025, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe
Resource
win10v2004-20250619-en
General
-
Target
89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe
-
Size
704KB
-
MD5
2517517512cd61100e76bc9a2f4de2fd
-
SHA1
b43b55dc1f2bbc4200f78b466ef1feac5fce8b07
-
SHA256
89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba
-
SHA512
4afed57735e3871e9db5a17bbd0df0ff8aa472fe2c0c6fdefa14a0d58c94a9d4bbfe8556094acc7f98d7f505dba275a0482ac2db03e6a0cf4cad54b07aa5d865
-
SSDEEP
12288:hSvO2x9mONvKRILSFnOkx2LIaxy6RJ05r:ovO2xJKRI2FOkx2LFEF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4784 c4f12804 -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description flow ioc pid Process Destination IP 26 223.5.5.5 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe Destination IP 45 114.114.114.114 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe Destination IP 53 223.5.5.5 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe Destination IP 2 114.114.114.114 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\c4f12804 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 c4f12804 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE c4f12804 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies c4f12804 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 c4f12804 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\51e760 c4f12804 File opened for modification C:\Windows\242880 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4f12804 -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" c4f12804 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" c4f12804 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" c4f12804 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" c4f12804 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix c4f12804 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" c4f12804 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ c4f12804 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" c4f12804 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4784 c4f12804 4784 c4f12804 4784 c4f12804 4784 c4f12804 4784 c4f12804 4784 c4f12804 4784 c4f12804 4784 c4f12804 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe Token: SeTcbPrivilege 2112 89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe Token: SeDebugPrivilege 4784 c4f12804 Token: SeTcbPrivilege 4784 c4f12804
Processes
-
C:\Users\Admin\AppData\Local\Temp\89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe"C:\Users\Admin\AppData\Local\Temp\89ea68d5b4d7b3287f0220966cc64c341148aa6ab3ea6d445cfad40b9bfa68ba.exe"1⤵
- Unexpected DNS network traffic destination
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
C:\Windows\Syswow64\c4f12804C:\Windows\Syswow64\c4f128041⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD579e80ec8c3c1c8e3ca4991b0cb96d61d
SHA180e10562c9e843aebfdd7be30026f2ec72c453c0
SHA2568eafab016a517b20f8b0ddfcd0df7f4f4270c19c267bf8631d4f69c30c0e65b1
SHA5127d7fdcd808b784a966e7adcb3ac514d1167b4330c091c109694d17357377747b29ee98bafa9882fac36a95ec1f77bb279b2539ad71c817b1086223110c308c7b