Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe
Resource
win10v2004-20220812-en
General
-
Target
70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe
-
Size
273KB
-
MD5
6b62fbffb83368368ffa51e2a4438a94
-
SHA1
83f358b6f8812699eaf850c1e0ae83acb5d176d9
-
SHA256
70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a
-
SHA512
ddb6c071152bd1bbe72dc50c282d626e225db3766c3b0ee889b6d9b670be8da49fa6607764cdb8be474b560c9df0507b95781074125ea1ec439d1b613c4378ed
-
SSDEEP
3072:kGu9BlfzWIbXWm+w0Jo5iZCxnBwR8AZxClXgoxqMSzbgEFYtNkx1kqxgbLeJ5j1P:k/0uoCxFArClXdSzvFSNXbK1ArAOFhI
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List document.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile document.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications document.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\NvTaskbarInit.exe = "C:\\Windows\\system32\\NvTaskbarInit.exe:*:Enabled:Explorer" document.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" document.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "1" document.exe -
Executes dropped EXE 4 IoCs
pid Process 4916 hh.exe 1412 document.exe 3276 document.exe 4500 NvMcTray.exe -
Loads dropped DLL 2 IoCs
pid Process 2076 rundll32.exe 3036 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "1" document.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nvidia Control Center = "C:\\Windows\\system32\\NvTaskbarInit.exe" document.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Oloyogibuxide = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Rutimse.dll\",Startup" rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" document.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: document.exe File opened (read-only) \??\J: document.exe File opened (read-only) \??\K: document.exe File opened (read-only) \??\O: document.exe File opened (read-only) \??\Q: document.exe File opened (read-only) \??\S: document.exe File opened (read-only) \??\Y: document.exe File opened (read-only) \??\E: document.exe File opened (read-only) \??\L: document.exe File opened (read-only) \??\N: document.exe File opened (read-only) \??\P: document.exe File opened (read-only) \??\V: document.exe File opened (read-only) \??\F: document.exe File opened (read-only) \??\M: document.exe File opened (read-only) \??\R: document.exe File opened (read-only) \??\T: document.exe File opened (read-only) \??\U: document.exe File opened (read-only) \??\I: document.exe File opened (read-only) \??\W: document.exe File opened (read-only) \??\X: document.exe File opened (read-only) \??\G: document.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\NvTaskbarInit.exe document.exe File created C:\Windows\SysWOW64\NvTaskbarInit.exe document.exe File created C:\Windows\SysWOW64\NvMcTray.exe document.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1412 set thread context of 3276 1412 document.exe 84 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\program files\grokster\my grokster\Adobe Photoshop CS4 crack.exe document.exe File created C:\program files\limewire\shared\Download Accelerator Plus v9.exe document.exe File created C:\program files\limewire\shared\Starcraft2 keys.txt.exe document.exe File created C:\program files\grokster\my grokster\Internet Download Manager V5.exe document.exe File created C:\program files\emule\incoming\Internet Download Manager V5.exe document.exe File created C:\program files\emule\incoming\PDF-XChange Pro.exe document.exe File created C:\program files\morpheus\my shared folder\PDF Unlocker v2.0.3.exe document.exe File created C:\program files\morpheus\my shared folder\Nero 9 9.2.6.0 keygen.exe document.exe File created C:\program files\grokster\my grokster\VmWare 7.0 keygen.exe document.exe File created C:\program files\grokster\my grokster\PDF-XChange Pro.exe document.exe File created C:\program files\limewire\shared\WinRAR v3.x keygen RaZoR.exe document.exe File created C:\program files\tesla\files\Winamp.Pro.v7.33.PowerPack.Portable+installer.exe document.exe File created C:\program files\winmx\shared\PDF Unlocker v2.0.3.exe document.exe File created C:\program files\icq\shared folder\Power ISO v4.2 + keygen axxo.exe document.exe File created C:\program files\grokster\my grokster\Starcraft2 Oblivion DLL.exe document.exe File created C:\program files\emule\incoming\Divx Pro 7 + keymaker.exe document.exe File created C:\program files\morpheus\my shared folder\K-Lite Mega Codec v5.5.1.exe document.exe File created C:\program files\winmx\shared\BitDefender AntiVirus 2010 Keygen.exe document.exe File created C:\program files\winmx\shared\Tuneup Ultilities 2010.exe document.exe File created C:\program files\emule\incoming\VmWare keygen.exe document.exe File created C:\program files\emule\incoming\CleanMyPC Registry Cleaner v6.02.exe document.exe File created C:\program files\emule\incoming\Starcraft2 keys.txt.exe document.exe File created C:\program files\morpheus\my shared folder\VmWare keygen.exe document.exe File created C:\program files\morpheus\my shared folder\Norton Internet Security 2010 crack.exe document.exe File created C:\program files\tesla\files\Adobe Illustrator CS4 crack.exe document.exe File created C:\program files\icq\shared folder\Ashampoo Snap 3.02.exe document.exe File created C:\program files\limewire\shared\Tuneup Ultilities 2010.exe document.exe File created C:\program files\morpheus\my shared folder\Adobe Illustrator CS4 crack.exe document.exe File created C:\program files\limewire\shared\Magic Video Converter 8 0 2 18.exe document.exe File created C:\program files\tesla\files\Total Commander7 license+keygen.exe document.exe File created C:\program files\winmx\shared\PDF password remover (works with all acrobat reader).exe document.exe File created C:\program files\grokster\my grokster\RapidShare Killer AIO 2010.exe document.exe File created C:\program files\limewire\shared\K-Lite Mega Codec v5.6.1 Portable.exe document.exe File created C:\program files\limewire\shared\Ad-aware 2010.exe document.exe File created C:\program files\winmx\shared\Adobe Photoshop CS4 crack.exe document.exe File created C:\program files\tesla\files\Anti-Porn v13.5.12.29.exe document.exe File created C:\program files\icq\shared folder\Internet Download Manager V5.exe document.exe File created C:\program files\grokster\my grokster\Alcohol 120 v1.9.7.exe document.exe File created C:\program files\morpheus\my shared folder\Windows2008 keygen and activator.exe document.exe File created C:\program files\limewire\shared\K-Lite Mega Codec v5.5.1.exe document.exe File created C:\program files\icq\shared folder\YouTubeGet 5.4.exe document.exe File created C:\program files\morpheus\my shared folder\Anti-Porn v13.5.12.29.exe document.exe File created C:\program files\icq\shared folder\Adobe Photoshop CS4 crack.exe document.exe File created C:\program files\limewire\shared\Power ISO v4.2 + keygen axxo.exe document.exe File created C:\program files\winmx\shared\Norton Internet Security 2010 crack.exe document.exe File created C:\program files\icq\shared folder\McAfee Total Protection 2010.exe document.exe File created C:\program files\icq\shared folder\Starcraft2 keys.txt.exe document.exe File created C:\program files\emule\incoming\Super Utilities Pro 2009 11.0.exe document.exe File created C:\program files\limewire\shared\Norton Internet Security 2010 crack.exe document.exe File created C:\program files\icq\shared folder\Rapidshare Auto Downloader 3.8.exe document.exe File created C:\program files\emule\incoming\K-Lite Mega Codec v5.6.1 Portable.exe document.exe File created C:\program files\morpheus\my shared folder\Starcraft2 Patch v0.2.exe document.exe File created C:\program files\morpheus\my shared folder\Starcraft2 Crack.exe document.exe File created C:\program files\emule\incoming\Myspace theme collection.exe document.exe File created C:\program files\morpheus\my shared folder\Absolute Video Converter 6.2.exe document.exe File created C:\program files\morpheus\my shared folder\DVD Tools Nero 10.5.6.0.exe document.exe File created C:\program files\winmx\shared\Image Size Reducer Pro v1.0.1.exe document.exe File created C:\program files\grokster\my grokster\Norton Anti-Virus 2010 Enterprise Crack.exe document.exe File created C:\program files\winmx\shared\AnyDVD HD v.6.3.1.8 Beta incl crack.exe document.exe File created C:\program files\icq\shared folder\Tuneup Ultilities 2010.exe document.exe File created C:\program files\emule\incoming\AnyDVD HD v.6.3.1.8 Beta incl crack.exe document.exe File created C:\program files\tesla\files\K-Lite Mega Codec v5.5.1.exe document.exe File created C:\program files\tesla\files\Nero 9 9.2.6.0 keygen.exe document.exe File created C:\program files\icq\shared folder\Sophos antivirus updater bypass.exe document.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe 3276 document.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4916 4948 70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe 82 PID 4948 wrote to memory of 4916 4948 70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe 82 PID 4948 wrote to memory of 4916 4948 70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe 82 PID 4948 wrote to memory of 1412 4948 70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe 83 PID 4948 wrote to memory of 1412 4948 70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe 83 PID 4948 wrote to memory of 1412 4948 70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe 83 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 1412 wrote to memory of 3276 1412 document.exe 84 PID 3276 wrote to memory of 4500 3276 document.exe 89 PID 3276 wrote to memory of 4500 3276 document.exe 89 PID 3276 wrote to memory of 4500 3276 document.exe 89 PID 4500 wrote to memory of 2076 4500 NvMcTray.exe 90 PID 4500 wrote to memory of 2076 4500 NvMcTray.exe 90 PID 4500 wrote to memory of 2076 4500 NvMcTray.exe 90 PID 2076 wrote to memory of 3036 2076 rundll32.exe 94 PID 2076 wrote to memory of 3036 2076 rundll32.exe 94 PID 2076 wrote to memory of 3036 2076 rundll32.exe 94 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" document.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe"C:\Users\Admin\AppData\Local\Temp\70aa626b0591bece87c1074a1cafcdae10ce2904bd55c0b034ca3367e59e9f4a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hh.exe2⤵
- Executes dropped EXE
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\document.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\document.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\document.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\document.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3276 -
C:\Windows\SysWOW64\NvMcTray.exe"C:\Windows\system32\NvMcTray.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Rutimse.dll",Startup5⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Rutimse.dll",iep6⤵
- Loads dropped DLL
PID:3036
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD55d1423367447aa893b5205e54afd2b17
SHA19bc3bd4a25bb9f889b585d461a39b94c177166b0
SHA256c38239c98d9ba20e7af37cd7e516dc69d3accfaf699d9d517976f6cfeccb052c
SHA512e3755609e320963576131594acfac101e794ba794cd0cf8e910d6ed9cd004bb58b022fbfde2b9fd2d6e267c20f2c4f081207e967fcc021b532fce81614fb4f61
-
Filesize
79KB
MD55d1423367447aa893b5205e54afd2b17
SHA19bc3bd4a25bb9f889b585d461a39b94c177166b0
SHA256c38239c98d9ba20e7af37cd7e516dc69d3accfaf699d9d517976f6cfeccb052c
SHA512e3755609e320963576131594acfac101e794ba794cd0cf8e910d6ed9cd004bb58b022fbfde2b9fd2d6e267c20f2c4f081207e967fcc021b532fce81614fb4f61
-
Filesize
79KB
MD55d1423367447aa893b5205e54afd2b17
SHA19bc3bd4a25bb9f889b585d461a39b94c177166b0
SHA256c38239c98d9ba20e7af37cd7e516dc69d3accfaf699d9d517976f6cfeccb052c
SHA512e3755609e320963576131594acfac101e794ba794cd0cf8e910d6ed9cd004bb58b022fbfde2b9fd2d6e267c20f2c4f081207e967fcc021b532fce81614fb4f61
-
Filesize
394KB
MD5c1a5ba03f0ba9832cc87180a4c4622a5
SHA1b6c0f0588c8efffc48f308dfddecbf6170204dd9
SHA256e41e19b9ee8889b3887b8cacf264468c661bdf382706bbd9052c1f95c4eea504
SHA512540e6077bf6a8739e9c9b28d609ef453c8a08cef9b81b018271aa7e83455c866e55af20a9545c8f73977d128fee64e1016fb00c4b3016d53925b62f0fb9eaa16
-
Filesize
394KB
MD5c1a5ba03f0ba9832cc87180a4c4622a5
SHA1b6c0f0588c8efffc48f308dfddecbf6170204dd9
SHA256e41e19b9ee8889b3887b8cacf264468c661bdf382706bbd9052c1f95c4eea504
SHA512540e6077bf6a8739e9c9b28d609ef453c8a08cef9b81b018271aa7e83455c866e55af20a9545c8f73977d128fee64e1016fb00c4b3016d53925b62f0fb9eaa16
-
Filesize
394KB
MD5c1a5ba03f0ba9832cc87180a4c4622a5
SHA1b6c0f0588c8efffc48f308dfddecbf6170204dd9
SHA256e41e19b9ee8889b3887b8cacf264468c661bdf382706bbd9052c1f95c4eea504
SHA512540e6077bf6a8739e9c9b28d609ef453c8a08cef9b81b018271aa7e83455c866e55af20a9545c8f73977d128fee64e1016fb00c4b3016d53925b62f0fb9eaa16
-
Filesize
28KB
MD5074728563a5b5eb857b3f365d629b59b
SHA1c78832f7ee345c94f47d9b319834c965a096d3f2
SHA256adec92253a3f64f5ee83d4c3158db8cfff83215a82ea833c109689d5a0d644a4
SHA5120800765f1d7de2a84fe2c6b92e777c008fb5043d857d602235818e8cb57a465068c44f3e6b068fd1ed03d881f4d97a678f940978c3056ad60c6821d3594b64c3
-
Filesize
28KB
MD5074728563a5b5eb857b3f365d629b59b
SHA1c78832f7ee345c94f47d9b319834c965a096d3f2
SHA256adec92253a3f64f5ee83d4c3158db8cfff83215a82ea833c109689d5a0d644a4
SHA5120800765f1d7de2a84fe2c6b92e777c008fb5043d857d602235818e8cb57a465068c44f3e6b068fd1ed03d881f4d97a678f940978c3056ad60c6821d3594b64c3
-
Filesize
79KB
MD5590ffc586126fa0cedfc82f8e5e20c56
SHA1afa7091d732bd228cb6ec4af63544ff9eb1233be
SHA2565877a70e36f1d51945837daae394da0275ca57e8acbb725fad992b454b7d16c6
SHA512d4b36ac52fdee2fb243d15b0713c3aab0630b07e6dd821380553bdf0176a0325d83122e3eaa9507bea5c8a068761eebb6c9c82c9e49edb011e952d61a7826a84
-
Filesize
79KB
MD5590ffc586126fa0cedfc82f8e5e20c56
SHA1afa7091d732bd228cb6ec4af63544ff9eb1233be
SHA2565877a70e36f1d51945837daae394da0275ca57e8acbb725fad992b454b7d16c6
SHA512d4b36ac52fdee2fb243d15b0713c3aab0630b07e6dd821380553bdf0176a0325d83122e3eaa9507bea5c8a068761eebb6c9c82c9e49edb011e952d61a7826a84