Analysis
-
max time kernel
59s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe
Resource
win10v2004-20220901-en
General
-
Target
cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe
-
Size
108KB
-
MD5
a10a4bab1fd1f3576745ae0e89be5590
-
SHA1
55c27e117071b5ce89687bfd3769df308ec30a39
-
SHA256
cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5
-
SHA512
b3d05c27b831e1d9520eb7ccfbfe395f54b080ea445b1a4dc79152432a7f037ad68d99a6ff34e1868208ff3850d2863ad8005ed814f291eb23b63ce34ce88d70
-
SSDEEP
3072:3pJdnIvGLqC4xxiu6yCGmCyGyatgg5qJqY4oNB7YIKoMmC23ekcIG5GxNtWPTdF1:cGxNtWPTdFUia25vAEZQ6YYrQ/wm
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\list\C:\Windows\SysWOW64\svchost.exe = "C:\\Windows\\SysWOW64\\svchost.exe:*:Generic Host Process" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list msiexec.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\list\C:\Windows\SysWOW64\msiexec.exe = "C:\\Windows\\SysWOW64\\msiexec.exe:*:Generic Host Process" msiexec.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list svchost.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\60483 = "c:\\progra~3\\dxuinug.exe" msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 1532 dxuinug.exe 596 dxuinug.exe -
Deletes itself 1 IoCs
pid Process 1372 msiexec.exe -
Loads dropped DLL 3 IoCs
pid Process 1372 msiexec.exe 1372 msiexec.exe 1532 dxuinug.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum dxuinug.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 dxuinug.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1668 set thread context of 1028 1668 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 27 PID 1532 set thread context of 596 1532 dxuinug.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\progra~3\dxuinug.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1028 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 596 dxuinug.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1028 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 1028 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 596 dxuinug.exe 596 dxuinug.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1668 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 1532 dxuinug.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1028 1668 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 27 PID 1668 wrote to memory of 1028 1668 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 27 PID 1668 wrote to memory of 1028 1668 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 27 PID 1668 wrote to memory of 1028 1668 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 27 PID 1668 wrote to memory of 1028 1668 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 27 PID 1668 wrote to memory of 1028 1668 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 27 PID 1668 wrote to memory of 1028 1668 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 27 PID 1668 wrote to memory of 1028 1668 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 27 PID 1028 wrote to memory of 1372 1028 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 28 PID 1028 wrote to memory of 1372 1028 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 28 PID 1028 wrote to memory of 1372 1028 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 28 PID 1028 wrote to memory of 1372 1028 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 28 PID 1028 wrote to memory of 1372 1028 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 28 PID 1028 wrote to memory of 1372 1028 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 28 PID 1028 wrote to memory of 1372 1028 cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe 28 PID 1372 wrote to memory of 1532 1372 msiexec.exe 29 PID 1372 wrote to memory of 1532 1372 msiexec.exe 29 PID 1372 wrote to memory of 1532 1372 msiexec.exe 29 PID 1372 wrote to memory of 1532 1372 msiexec.exe 29 PID 1532 wrote to memory of 596 1532 dxuinug.exe 30 PID 1532 wrote to memory of 596 1532 dxuinug.exe 30 PID 1532 wrote to memory of 596 1532 dxuinug.exe 30 PID 1532 wrote to memory of 596 1532 dxuinug.exe 30 PID 1532 wrote to memory of 596 1532 dxuinug.exe 30 PID 1532 wrote to memory of 596 1532 dxuinug.exe 30 PID 1532 wrote to memory of 596 1532 dxuinug.exe 30 PID 1532 wrote to memory of 596 1532 dxuinug.exe 30 PID 596 wrote to memory of 576 596 dxuinug.exe 31 PID 596 wrote to memory of 576 596 dxuinug.exe 31 PID 596 wrote to memory of 576 596 dxuinug.exe 31 PID 596 wrote to memory of 576 596 dxuinug.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe"C:\Users\Admin\AppData\Local\Temp\cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe"C:\Users\Admin\AppData\Local\Temp\cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5.exe"2⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Modifies firewall policy service
- Adds policy Run key to start application
- Deletes itself
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\progra~3\dxuinug.exec:\progra~3\dxuinug.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
\??\c:\progra~3\dxuinug.exe"c:\progra~3\dxuinug.exe"5⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe6⤵
- Modifies firewall policy service
PID:576
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5a10a4bab1fd1f3576745ae0e89be5590
SHA155c27e117071b5ce89687bfd3769df308ec30a39
SHA256cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5
SHA512b3d05c27b831e1d9520eb7ccfbfe395f54b080ea445b1a4dc79152432a7f037ad68d99a6ff34e1868208ff3850d2863ad8005ed814f291eb23b63ce34ce88d70
-
Filesize
108KB
MD5a10a4bab1fd1f3576745ae0e89be5590
SHA155c27e117071b5ce89687bfd3769df308ec30a39
SHA256cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5
SHA512b3d05c27b831e1d9520eb7ccfbfe395f54b080ea445b1a4dc79152432a7f037ad68d99a6ff34e1868208ff3850d2863ad8005ed814f291eb23b63ce34ce88d70
-
Filesize
108KB
MD5a10a4bab1fd1f3576745ae0e89be5590
SHA155c27e117071b5ce89687bfd3769df308ec30a39
SHA256cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5
SHA512b3d05c27b831e1d9520eb7ccfbfe395f54b080ea445b1a4dc79152432a7f037ad68d99a6ff34e1868208ff3850d2863ad8005ed814f291eb23b63ce34ce88d70
-
Filesize
108KB
MD5a10a4bab1fd1f3576745ae0e89be5590
SHA155c27e117071b5ce89687bfd3769df308ec30a39
SHA256cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5
SHA512b3d05c27b831e1d9520eb7ccfbfe395f54b080ea445b1a4dc79152432a7f037ad68d99a6ff34e1868208ff3850d2863ad8005ed814f291eb23b63ce34ce88d70
-
Filesize
108KB
MD5a10a4bab1fd1f3576745ae0e89be5590
SHA155c27e117071b5ce89687bfd3769df308ec30a39
SHA256cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5
SHA512b3d05c27b831e1d9520eb7ccfbfe395f54b080ea445b1a4dc79152432a7f037ad68d99a6ff34e1868208ff3850d2863ad8005ed814f291eb23b63ce34ce88d70
-
Filesize
108KB
MD5a10a4bab1fd1f3576745ae0e89be5590
SHA155c27e117071b5ce89687bfd3769df308ec30a39
SHA256cbfa8f50b7f39eb6e5f2c3b47dd218338702d69c320305d532865306889cbec5
SHA512b3d05c27b831e1d9520eb7ccfbfe395f54b080ea445b1a4dc79152432a7f037ad68d99a6ff34e1868208ff3850d2863ad8005ed814f291eb23b63ce34ce88d70