Analysis
-
max time kernel
93s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe
Resource
win10v2004-20220812-en
General
-
Target
cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe
-
Size
88KB
-
MD5
642fd7cb5e109163b7234292800dd0dc
-
SHA1
a5afef724ab436d4f0a19c051a43b1b5e7450f48
-
SHA256
cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c
-
SHA512
6fc6ad9b9d81919a399cb53604cf2a04230b02937217dd5757e41801f89163fa5c066b8354a28ba2ee0ff992144de5968787653222be77a16f2e92be1a499423
-
SSDEEP
1536:AP5IAiR6aZrA062bNGsr/nhD7r453ktoBwJAMF+8f2:Q5IsUrj62bNGsr/e53k3JAMFW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 972 vstart.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1052 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 1052 cmd.exe 1052 cmd.exe 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe cmd.exe File opened for modification C:\Program Files\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe cmd.exe File opened for modification C:\Program Files\vstart.exe cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe File created C:\Program Files\705.5475.bat cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe -
Kills process with taskkill 1 IoCs
pid Process 528 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37A17A60-37F8-11ED-9332-6A94EDCEDC7A} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1156 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe Token: SeDebugPrivilege 528 taskkill.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: 33 544 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 544 AUDIODG.EXE Token: 33 544 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 544 AUDIODG.EXE Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1424 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 916 IEXPLORE.EXE 916 IEXPLORE.EXE 972 vstart.exe 972 vstart.exe 972 vstart.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1052 1424 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 26 PID 1424 wrote to memory of 1052 1424 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 26 PID 1424 wrote to memory of 1052 1424 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 26 PID 1424 wrote to memory of 1052 1424 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 26 PID 1052 wrote to memory of 1156 1052 cmd.exe 28 PID 1052 wrote to memory of 1156 1052 cmd.exe 28 PID 1052 wrote to memory of 1156 1052 cmd.exe 28 PID 1052 wrote to memory of 1156 1052 cmd.exe 28 PID 1052 wrote to memory of 984 1052 cmd.exe 29 PID 1052 wrote to memory of 984 1052 cmd.exe 29 PID 1052 wrote to memory of 984 1052 cmd.exe 29 PID 1052 wrote to memory of 984 1052 cmd.exe 29 PID 984 wrote to memory of 1640 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 31 PID 984 wrote to memory of 1640 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 31 PID 984 wrote to memory of 1640 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 31 PID 984 wrote to memory of 1640 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 31 PID 1640 wrote to memory of 916 1640 IEXPLORE.EXE 33 PID 1640 wrote to memory of 916 1640 IEXPLORE.EXE 33 PID 1640 wrote to memory of 916 1640 IEXPLORE.EXE 33 PID 1640 wrote to memory of 916 1640 IEXPLORE.EXE 33 PID 984 wrote to memory of 528 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 34 PID 984 wrote to memory of 528 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 34 PID 984 wrote to memory of 528 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 34 PID 984 wrote to memory of 528 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 34 PID 984 wrote to memory of 1768 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 36 PID 984 wrote to memory of 1768 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 36 PID 984 wrote to memory of 1768 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 36 PID 984 wrote to memory of 1768 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 36 PID 1768 wrote to memory of 1256 1768 net.exe 38 PID 1768 wrote to memory of 1256 1768 net.exe 38 PID 1768 wrote to memory of 1256 1768 net.exe 38 PID 1768 wrote to memory of 1256 1768 net.exe 38 PID 984 wrote to memory of 624 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 39 PID 984 wrote to memory of 624 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 39 PID 984 wrote to memory of 624 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 39 PID 984 wrote to memory of 624 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 39 PID 984 wrote to memory of 972 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 40 PID 984 wrote to memory of 972 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 40 PID 984 wrote to memory of 972 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 40 PID 984 wrote to memory of 972 984 cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe 40 PID 624 wrote to memory of 768 624 explorer.exe 41 PID 624 wrote to memory of 768 624 explorer.exe 41 PID 624 wrote to memory of 768 624 explorer.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe"C:\Users\Admin\AppData\Local\Temp\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\705.5475.bat""2⤵
- Deletes itself
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1156
-
-
C:\Program Files\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe"C:\Program Files\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" "?mac=6A:94:ED:CE:DC:7A&ver=1.0"4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:916
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 16404⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess4⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess5⤵PID:1256
-
-
-
\??\c:\windows\explorer.exe"c:\windows\explorer.exe"4⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:768
-
-
-
C:\Program Files\vstart.exe"C:\Program Files\vstart.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:972
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5181⤵
- Suspicious use of AdjustPrivilegeToken
PID:544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433B
MD519e46e4bc0a9c17cdb68ebe72806dbe4
SHA14fd151702fd31271e1c34a80a6f8d4a775cc84ef
SHA256b07e13f65a66a10ebc644d966405968e655bcdb38d87eb27e65fc575d5fc8989
SHA512a8bd95d82135bd5cfaccedf3710682e498ad22e015a334032d4371305d45469c0c79d683e166640d4bfb2fc39b2e57ace8ad96ca62eb61bd1d18f3b853aa24af
-
Filesize
88KB
MD5642fd7cb5e109163b7234292800dd0dc
SHA1a5afef724ab436d4f0a19c051a43b1b5e7450f48
SHA256cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c
SHA5126fc6ad9b9d81919a399cb53604cf2a04230b02937217dd5757e41801f89163fa5c066b8354a28ba2ee0ff992144de5968787653222be77a16f2e92be1a499423
-
Filesize
52KB
MD5333cc8e1009a8fd02d53d20c1dd3680e
SHA116e4610d0664be2c85f4aa47a8523e7b8505fed5
SHA2564c8e2abaf959348055248f43ccf81975146aa2af9d0509f06896961bf76af8eb
SHA512aa66d9ee44edde45d9c8244adb530422b4afc8e3361a4476e63c5f200fdc7473b35a0e2e221b4d75571ad7bbed536d27fdade1b6eeafc4544bd3edb0f28f0032
-
Filesize
88KB
MD5642fd7cb5e109163b7234292800dd0dc
SHA1a5afef724ab436d4f0a19c051a43b1b5e7450f48
SHA256cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c
SHA5126fc6ad9b9d81919a399cb53604cf2a04230b02937217dd5757e41801f89163fa5c066b8354a28ba2ee0ff992144de5968787653222be77a16f2e92be1a499423
-
Filesize
88KB
MD5642fd7cb5e109163b7234292800dd0dc
SHA1a5afef724ab436d4f0a19c051a43b1b5e7450f48
SHA256cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c
SHA5126fc6ad9b9d81919a399cb53604cf2a04230b02937217dd5757e41801f89163fa5c066b8354a28ba2ee0ff992144de5968787653222be77a16f2e92be1a499423
-
Filesize
52KB
MD5333cc8e1009a8fd02d53d20c1dd3680e
SHA116e4610d0664be2c85f4aa47a8523e7b8505fed5
SHA2564c8e2abaf959348055248f43ccf81975146aa2af9d0509f06896961bf76af8eb
SHA512aa66d9ee44edde45d9c8244adb530422b4afc8e3361a4476e63c5f200fdc7473b35a0e2e221b4d75571ad7bbed536d27fdade1b6eeafc4544bd3edb0f28f0032
-
Filesize
52KB
MD5333cc8e1009a8fd02d53d20c1dd3680e
SHA116e4610d0664be2c85f4aa47a8523e7b8505fed5
SHA2564c8e2abaf959348055248f43ccf81975146aa2af9d0509f06896961bf76af8eb
SHA512aa66d9ee44edde45d9c8244adb530422b4afc8e3361a4476e63c5f200fdc7473b35a0e2e221b4d75571ad7bbed536d27fdade1b6eeafc4544bd3edb0f28f0032