Analysis
-
max time kernel
82s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08/09/2022, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
1024KB
-
MD5
7ca925cfbb7fbdf1bfec8669f2187eaf
-
SHA1
f19ab3424d46842e494cd73ade54be773a9c4a1d
-
SHA256
74f81488637d5ab5ff32aa75dec6c9fc0995abd76d1ff80bd93a0a20b995271f
-
SHA512
dfb9c20bb2d882e8ca661ce78a76903d527f7e3a35d2dbd725f28b04e5f7b4d412a050ba562165cec593ccfa06fec2a8d013f60abceb2e31270457e4e249e159
-
SSDEEP
24576:zymtT27bMup0ty9+8vCHkKURkd2dk9brsfA/fSylSUdQ:GyS0qcXJrsfA3S
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1248 Respect.exe.pif -
Loads dropped DLL 1 IoCs
pid Process 1344 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1136 tasklist.exe 1588 tasklist.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1580 PING.EXE 900 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1248 Respect.exe.pif 1248 Respect.exe.pif 1248 Respect.exe.pif -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1508 robocopy.exe Token: SeRestorePrivilege 1508 robocopy.exe Token: SeSecurityPrivilege 1508 robocopy.exe Token: SeTakeOwnershipPrivilege 1508 robocopy.exe Token: SeDebugPrivilege 1136 tasklist.exe Token: SeDebugPrivilege 1588 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1248 Respect.exe.pif 1248 Respect.exe.pif 1248 Respect.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1248 Respect.exe.pif 1248 Respect.exe.pif 1248 Respect.exe.pif -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1508 1696 file.exe 27 PID 1696 wrote to memory of 1508 1696 file.exe 27 PID 1696 wrote to memory of 1508 1696 file.exe 27 PID 1696 wrote to memory of 1508 1696 file.exe 27 PID 1696 wrote to memory of 1296 1696 file.exe 29 PID 1696 wrote to memory of 1296 1696 file.exe 29 PID 1696 wrote to memory of 1296 1696 file.exe 29 PID 1696 wrote to memory of 1296 1696 file.exe 29 PID 1296 wrote to memory of 1344 1296 cmd.exe 31 PID 1296 wrote to memory of 1344 1296 cmd.exe 31 PID 1296 wrote to memory of 1344 1296 cmd.exe 31 PID 1296 wrote to memory of 1344 1296 cmd.exe 31 PID 1344 wrote to memory of 1136 1344 cmd.exe 32 PID 1344 wrote to memory of 1136 1344 cmd.exe 32 PID 1344 wrote to memory of 1136 1344 cmd.exe 32 PID 1344 wrote to memory of 1136 1344 cmd.exe 32 PID 1344 wrote to memory of 1392 1344 cmd.exe 33 PID 1344 wrote to memory of 1392 1344 cmd.exe 33 PID 1344 wrote to memory of 1392 1344 cmd.exe 33 PID 1344 wrote to memory of 1392 1344 cmd.exe 33 PID 1344 wrote to memory of 1588 1344 cmd.exe 35 PID 1344 wrote to memory of 1588 1344 cmd.exe 35 PID 1344 wrote to memory of 1588 1344 cmd.exe 35 PID 1344 wrote to memory of 1588 1344 cmd.exe 35 PID 1344 wrote to memory of 672 1344 cmd.exe 36 PID 1344 wrote to memory of 672 1344 cmd.exe 36 PID 1344 wrote to memory of 672 1344 cmd.exe 36 PID 1344 wrote to memory of 672 1344 cmd.exe 36 PID 1344 wrote to memory of 1012 1344 cmd.exe 37 PID 1344 wrote to memory of 1012 1344 cmd.exe 37 PID 1344 wrote to memory of 1012 1344 cmd.exe 37 PID 1344 wrote to memory of 1012 1344 cmd.exe 37 PID 1344 wrote to memory of 1248 1344 cmd.exe 38 PID 1344 wrote to memory of 1248 1344 cmd.exe 38 PID 1344 wrote to memory of 1248 1344 cmd.exe 38 PID 1344 wrote to memory of 1248 1344 cmd.exe 38 PID 1344 wrote to memory of 1580 1344 cmd.exe 39 PID 1344 wrote to memory of 1580 1344 cmd.exe 39 PID 1344 wrote to memory of 1580 1344 cmd.exe 39 PID 1344 wrote to memory of 1580 1344 cmd.exe 39 PID 1296 wrote to memory of 900 1296 cmd.exe 40 PID 1296 wrote to memory of 900 1296 cmd.exe 40 PID 1296 wrote to memory of 900 1296 cmd.exe 40 PID 1296 wrote to memory of 900 1296 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\robocopy.exerobocopy /?2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Organisations.jpg & ping -n 5 localhost2⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"4⤵PID:1392
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AVGUI.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\SysWOW64\find.exefind /I /N "avgui.exe"4⤵PID:672
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^rCLEJGCiZAx$" Member.jpg4⤵PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Respect.exe.pifRespect.exe.pif z4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1248
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 54⤵
- Runs ping.exe
PID:1580
-
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost3⤵
- Runs ping.exe
PID:900
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD503f808c39bf62f2a6b9abec8a4fe0a82
SHA1ff28cc35b45e0eb7341855882e145d9e05291e9e
SHA256617648709852d255c111c5f2fb07210634b121fdcb918cbda347f18eb0ee12ac
SHA512699fb696971b70737ac678ea95a90b8b8d66664fbbdd94dac0f533468ad7b6f51a44485c1628f52d3eb50f71f48e30ab383382bb7c64dfb2ff71889999758132
-
Filesize
924KB
MD56f8ba0fb285f541d1a77dcf07480b82a
SHA19c79bf9d1ec190222e48668185a5d8dd180453f7
SHA25646bebc12ec65133c022c6ee862abd2757f64fd6b6b38b8b8fbf32b5fe2fa7ed3
SHA5123059bc29512c9f944261fd573c06642ab887d7b43022ab23a98906a8deb31e67d6beb2d6e8de4d344f77224e015e0a00f00cc655d9d29c2705d774c999d9612e
-
Filesize
11KB
MD58c0c041c107dbedd83dd2fc002c7d9d6
SHA190b0e6f536705ff73f07937dc2ac89ecc407cbaf
SHA256f2200e20650a60edf30175c49e0f4b21fefb4cd1f851660c8d19e6f9613e21e7
SHA512f35ed7a2c22a193271a61befb8449cc092608789aa9125cc9508735d57aad0d8e50a422a01064cac68ac759b2d1d998206cb58d9d6b1ec27d6a0351b1a295f97
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4