Analysis
-
max time kernel
149s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe
Resource
win7-20220812-en
General
-
Target
02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe
-
Size
280KB
-
MD5
6299c9384311ae7e821778b412d3f034
-
SHA1
41f42df825d791c9d31399c38b905a7efd9a1c3f
-
SHA256
02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad
-
SHA512
948d448fc5a8d1c416981b0e2ff55d295160b255a06c6cc769eed6de2113cefdfb62ca27d6fbd61a5b1307a895bd6f74758f58fb58fe2611942461c297ff3d22
-
SSDEEP
6144:FUqlft6xu7cfp2z2Psiuwp2tDEo0hK1fz/+pj9hBjExO:FUqNtNwf+i+DEfK1zcDBjE8
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1108 AB0F.tmp -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/1916-56-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1916-59-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1092-64-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1604-77-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\C31.exe = "C:\\Program Files (x86)\\LP\\0159\\C31.exe" 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\0159\C31.exe 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe File opened for modification C:\Program Files (x86)\LP\0159\C31.exe 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe File opened for modification C:\Program Files (x86)\LP\0159\AB0F.tmp 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1592 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 1596 msiexec.exe Token: SeTakeOwnershipPrivilege 1596 msiexec.exe Token: SeSecurityPrivilege 1596 msiexec.exe Token: SeShutdownPrivilege 1592 explorer.exe Token: SeShutdownPrivilege 1592 explorer.exe Token: SeShutdownPrivilege 1592 explorer.exe Token: SeShutdownPrivilege 1592 explorer.exe Token: SeShutdownPrivilege 1592 explorer.exe Token: SeShutdownPrivilege 1592 explorer.exe Token: SeShutdownPrivilege 1592 explorer.exe Token: SeShutdownPrivilege 1592 explorer.exe Token: SeShutdownPrivilege 1592 explorer.exe Token: SeShutdownPrivilege 1592 explorer.exe Token: 33 1772 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1772 AUDIODG.EXE Token: 33 1772 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1772 AUDIODG.EXE Token: SeShutdownPrivilege 1592 explorer.exe Token: SeShutdownPrivilege 1592 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe 1592 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1092 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 32 PID 1916 wrote to memory of 1092 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 32 PID 1916 wrote to memory of 1092 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 32 PID 1916 wrote to memory of 1092 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 32 PID 1916 wrote to memory of 1108 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 33 PID 1916 wrote to memory of 1108 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 33 PID 1916 wrote to memory of 1108 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 33 PID 1916 wrote to memory of 1108 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 33 PID 1916 wrote to memory of 1604 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 34 PID 1916 wrote to memory of 1604 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 34 PID 1916 wrote to memory of 1604 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 34 PID 1916 wrote to memory of 1604 1916 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe 34 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe"C:\Users\Admin\AppData\Local\Temp\02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exeC:\Users\Admin\AppData\Local\Temp\02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe startC:\Users\Admin\AppData\Roaming\9B7C9\E8D01.exe%C:\Users\Admin\AppData\Roaming\9B7C92⤵PID:1092
-
-
C:\Program Files (x86)\LP\0159\AB0F.tmp"C:\Program Files (x86)\LP\0159\AB0F.tmp"2⤵
- Executes dropped EXE
PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exeC:\Users\Admin\AppData\Local\Temp\02b316fe5ddc0694c25e19d20965ac6b628220e157e5d991f323d5375cafb1ad.exe startC:\Program Files (x86)\C9B1B\lvvm.exe%C:\Program Files (x86)\C9B1B2⤵PID:1604
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1592
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5501⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5ed2bad1e6970c4aede88be76b11c9250
SHA174a9b54a7b24414b3035c5e7cdb3d89393e785d3
SHA2568d766352dd398f94f5e3ead77d5b5ffffb8e605b066c47086020f8f8400ccdae
SHA512ffbf62a08a1112be48d39d36abee306b7ac17186177842a8d7b1253ecadc0827d2d8541b7e35e037c13c6e247670f83a7d73bf5f09ff7f20815678694236bc8f
-
Filesize
99KB
MD5ed2bad1e6970c4aede88be76b11c9250
SHA174a9b54a7b24414b3035c5e7cdb3d89393e785d3
SHA2568d766352dd398f94f5e3ead77d5b5ffffb8e605b066c47086020f8f8400ccdae
SHA512ffbf62a08a1112be48d39d36abee306b7ac17186177842a8d7b1253ecadc0827d2d8541b7e35e037c13c6e247670f83a7d73bf5f09ff7f20815678694236bc8f
-
Filesize
99KB
MD5ed2bad1e6970c4aede88be76b11c9250
SHA174a9b54a7b24414b3035c5e7cdb3d89393e785d3
SHA2568d766352dd398f94f5e3ead77d5b5ffffb8e605b066c47086020f8f8400ccdae
SHA512ffbf62a08a1112be48d39d36abee306b7ac17186177842a8d7b1253ecadc0827d2d8541b7e35e037c13c6e247670f83a7d73bf5f09ff7f20815678694236bc8f