Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 07:06
Behavioral task
behavioral1
Sample
e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe
Resource
win10v2004-20220901-en
General
-
Target
e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe
-
Size
27KB
-
MD5
115d47da2b4602a57a0ce5e6cedf0d40
-
SHA1
30b2edaca0d4d8098dbc225dd6d26e3a048b5a24
-
SHA256
e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7
-
SHA512
d56cd79fcb88a42f6487356b72b4029b108fd9fe5c8c82d4fd4c9dd4993638cf11adb55fad4987d94ca0763364feff1b90647f87e79e57768ae9ab8d02c8c236
-
SSDEEP
384:rPNs6IOSB0Qgns0jfbwFz88AfeQ990P34Pkfj0eohDTkVOhvF27z/985K29T/7Ww:rPNs/OS6zcF48A2Q/0Q2C9yoYf
Malware Config
Extracted
joker
http://mmtie.oss-cn-hangzhou.aliyuncs.com
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 11 IoCs
description ioc Process File created C:\Windows\system32\drivers\bc.sys duba_1_244.exe File opened for modification C:\Windows\system32\drivers\bc.sys duba_1_244.exe File created C:\Windows\system32\drivers\kisknl.sys duba_1_244.exe File created C:\Windows\system32\drivers\kisnetm.sys duba_1_244.exe File created C:\Windows\system32\drivers\kisnetmxp.sys duba_1_244.exe File created C:\Windows\system32\drivers\ksapi64.sys duba_1_244.exe File created C:\Windows\system32\drivers\ksskrpr.sys duba_1_244.exe File opened for modification C:\Windows\SysWOW64\drivers\KAVBase.sys duba_1_244.exe File created C:\Windows\system32\drivers\kisnetm64.sys duba_1_244.exe File created C:\Windows\system32\drivers\ksapi.sys duba_1_244.exe File created C:\Windows\system32\drivers\kisknl64.sys duba_1_244.exe -
Executes dropped EXE 2 IoCs
pid Process 1500 duba_1_244.exe 1540 install1968982.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32 duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ThreadingModel = "Apartment" duba_1_244.exe -
Sets file execution options in registry 2 TTPs 28 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVLOG2.EXE duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksetupwiz.exe duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRECYCLE.EXE duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxetray.exe duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kdrvmgr.exe duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSETUPWIZ.EXE duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scomregsvrv8.exe duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kisaddin.exe duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISADDIN.EXE duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISLIVE.EXE duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KXESCORE.EXE duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KDRVMGR.EXE duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kislive.exe duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kismain.exe duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kscan.exe duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSCAN.EXE duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISCALL.EXE duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\krecycle.exe duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KXETRAY.EXE duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlog2.exe duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISMAIN.EXE duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCOMREGSVRV8.EXE duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uninst.exe duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UNINST.EXE duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kiscall.exe duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksignsp.exe duba_1_244.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSIGNSP.EXE duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxescore.exe duba_1_244.exe -
resource yara_rule behavioral1/memory/1904-55-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/files/0x0007000000013402-59.dat upx behavioral1/files/0x0007000000013402-61.dat upx behavioral1/memory/1500-64-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral1/files/0x0007000000013402-66.dat upx behavioral1/files/0x0007000000013402-65.dat upx behavioral1/files/0x0007000000013402-67.dat upx behavioral1/files/0x0007000000013a03-69.dat upx behavioral1/files/0x0007000000013a03-71.dat upx behavioral1/files/0x0007000000013a03-75.dat upx behavioral1/files/0x0007000000013a03-74.dat upx behavioral1/files/0x0007000000013a03-73.dat upx behavioral1/memory/1540-77-0x0000000000400000-0x0000000000600000-memory.dmp upx behavioral1/memory/1904-81-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1500-91-0x0000000000400000-0x000000000051E000-memory.dmp upx behavioral1/memory/1540-96-0x0000000000400000-0x0000000000600000-memory.dmp upx behavioral1/memory/1500-98-0x0000000003E60000-0x0000000003EE9000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1512 cmd.exe -
Loads dropped DLL 14 IoCs
pid Process 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 1500 duba_1_244.exe 1500 duba_1_244.exe 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 1540 install1968982.exe 1540 install1968982.exe 1500 duba_1_244.exe 1500 duba_1_244.exe 1500 duba_1_244.exe 1500 duba_1_244.exe 1500 duba_1_244.exe 1500 duba_1_244.exe 1500 duba_1_244.exe 1500 duba_1_244.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kxesc = "\"c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kxetray.exe\" -autorun" duba_1_244.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 install1968982.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksde\kisknl64.sys duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\defaultshrink_skin_img.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\bro.cfg duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\cloudctrl.config duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kdrvmgr.exe duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsprotect64.exe duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\extendimg\5.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\scan_virus.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\scom.xml duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\gamesdb_dc_mini.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\kongqizhiliang.skin duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\extendimg\1.jpg duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\citys.xml duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksbwdt.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksedset.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\liectrl.config duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\extendimg\3.jpg duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\extendimg\4.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\web\kingsoft_bbs.htm duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\inject.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kfcdetect.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ks3rdhmpg64.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksreng3.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxebscsp.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksde\kisknl.sys duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\wfs.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\kongqizhiliang_skin_img.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\start_acc.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\whiteurl.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\sp3a.nlb duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\uni0nst.exe duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\defendmon.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksde\ksdecs.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\deswitch.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ks3rdhmpg.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kseescan.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksscore.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwssp.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\forecastmsg.xml duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksscfgx.ini duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\se.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavevent.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ktrashscan.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\weatherconfig.xml duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\fnsign.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\jijian.skin duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\microsoft.vc80.crt.manifest duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\speedtest.xml duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\krcmddb.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kismain.exe duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kpassport.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyprot.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\scom.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\pop.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kae\karchive.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\winesystem001.dat duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\krmcdm.krf duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\operation\cas\kinfoc.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsui64.dll duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\computer_doctor.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\dudubao_skin_img.png duba_1_244.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\jijian_skin_img.png duba_1_244.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 536 taskkill.exe -
Modifies registry class 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ThreadingModel = "Apartment" duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32 duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shellex\ContextMenuHandlers\duba_64bit duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\Shellex\ContextMenuHandlers\duba_64bit duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu.dll" duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_32bit duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51} duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32\ThreadingModel = "Apartment" duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_32bit duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CAA2D3B1-4BB5-4a45-A17A-122773379D99}\ProcID = "{D9503100-810C-1B29-3030-303133000000}" install1968982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Shellex\ContextMenuHandlers\duba_64bit duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_64bit duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4} duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\ = "CKavMenuShell Class" duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_32bit duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CAA2D3B1-4BB5-4a45-A17A-122773379D99} install1968982.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32 duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" duba_1_244.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" duba_1_244.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers duba_1_244.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1500 duba_1_244.exe Token: SeDebugPrivilege 536 taskkill.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1500 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 31 PID 1904 wrote to memory of 1500 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 31 PID 1904 wrote to memory of 1500 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 31 PID 1904 wrote to memory of 1500 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 31 PID 1904 wrote to memory of 1500 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 31 PID 1904 wrote to memory of 1500 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 31 PID 1904 wrote to memory of 1500 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 31 PID 1904 wrote to memory of 1540 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 32 PID 1904 wrote to memory of 1540 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 32 PID 1904 wrote to memory of 1540 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 32 PID 1904 wrote to memory of 1540 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 32 PID 1904 wrote to memory of 1540 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 32 PID 1904 wrote to memory of 1540 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 32 PID 1904 wrote to memory of 1540 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 32 PID 1904 wrote to memory of 1512 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 33 PID 1904 wrote to memory of 1512 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 33 PID 1904 wrote to memory of 1512 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 33 PID 1904 wrote to memory of 1512 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 33 PID 1904 wrote to memory of 1512 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 33 PID 1904 wrote to memory of 1512 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 33 PID 1904 wrote to memory of 1512 1904 e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe 33 PID 1512 wrote to memory of 536 1512 cmd.exe 35 PID 1512 wrote to memory of 536 1512 cmd.exe 35 PID 1512 wrote to memory of 536 1512 cmd.exe 35 PID 1512 wrote to memory of 536 1512 cmd.exe 35 PID 1512 wrote to memory of 536 1512 cmd.exe 35 PID 1512 wrote to memory of 536 1512 cmd.exe 35 PID 1512 wrote to memory of 536 1512 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe"C:\Users\Admin\AppData\Local\Temp\e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\sbnimb.tmp\dtstop.tmp\duba_1_244.exe"C:\Users\Admin\AppData\Local\Temp\sbnimb.tmp\dtstop.tmp\duba_1_244.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Registers COM server for autorun
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\sbnimb.tmp\dtstop.tmp\install1968982.exe"C:\Users\Admin\AppData\Local\Temp\sbnimb.tmp\dtstop.tmp\install1968982.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies registry class
PID:1540
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e50dec2ce16a676fbb9135dced4902b897069c3f635031b27cb358478d134ee7.exe.bat
Filesize330B
MD5576ab231dbbbd590427d75c64a178a36
SHA11de395b7af852e4fa2e8076775d1d9a784615b41
SHA25619075a439dc5c7db6c0b796bfcf15ffafb611e920bc67e6e78d88c81a7c71ad9
SHA512ddeea8fb7148200546a2bc11524d73df74a5a41f96b4cf003458f5a3918337fc42cc2624efca911bf985524b0353939086063c175b7761e464b6643280571ced
-
Filesize
16.8MB
MD51f1c87b2b8528523907cc58c00923df8
SHA1ea0f7ad5e2d0bc48e52ea9e00c56dc14ea026514
SHA25637e29c28eb4a4753f6926c2f7dfd169a09e184264f537c64893637716237733a
SHA5122a8d2107eb8d479d8378c780389278e2d20653954d93dea72700b9bb9c21bc7ecf826243c1aadf8a6bc2705cc9d0055a01cf24c32a8ba38cca87ca51abd66fbc
-
Filesize
16.8MB
MD51f1c87b2b8528523907cc58c00923df8
SHA1ea0f7ad5e2d0bc48e52ea9e00c56dc14ea026514
SHA25637e29c28eb4a4753f6926c2f7dfd169a09e184264f537c64893637716237733a
SHA5122a8d2107eb8d479d8378c780389278e2d20653954d93dea72700b9bb9c21bc7ecf826243c1aadf8a6bc2705cc9d0055a01cf24c32a8ba38cca87ca51abd66fbc
-
Filesize
4.6MB
MD5512fe2eb54dde3c922ce73c075a592a1
SHA14332a256f0a77381ecd11e823475c335691325d7
SHA256110f6a132f05a0d7b31d449beb75c7b22cd1fd409d50b32ded10e8ac305d852e
SHA512a3f6fda13e054d5f3f52f0b62895c94b467b32e5811bf52e91c7c747554204af150c0bddce229bcd4b912c575079376ffdd02dbe281d2a59f1f6824b464b993e
-
Filesize
4.6MB
MD5512fe2eb54dde3c922ce73c075a592a1
SHA14332a256f0a77381ecd11e823475c335691325d7
SHA256110f6a132f05a0d7b31d449beb75c7b22cd1fd409d50b32ded10e8ac305d852e
SHA512a3f6fda13e054d5f3f52f0b62895c94b467b32e5811bf52e91c7c747554204af150c0bddce229bcd4b912c575079376ffdd02dbe281d2a59f1f6824b464b993e
-
Filesize
69KB
MD5c8ed4b3af03d82cc3fe2f8c42c22326c
SHA178a2e216262b8f1b35e408685cf20f2fa4685d8f
SHA2561c73f57c31845d3719644f815ca9df1efb18cfc3dfc2dc1b4afddb71261afb31
SHA51234e6cf09afa68875be24005f90be35bb7c490ac9d2f63befadfdd1902136c383ee903442c9df572e2ccd0b7ea1be10857401c76c5b6923c28f8eaecab5b3c45c
-
Filesize
1.1MB
MD504eeb71a179940aca8073ddaa5bf4350
SHA102f7c99c4a2784b2db466b20c6e9c02cccc733b6
SHA256acd8f6de1355fa40d4703149eeae1887c3f4ee0474f65c7aa257db38924e1385
SHA512049a164a916863f037f88288faab7ce6f92d555fac4e819d6b79ed787c583f0a0d821ef173440c481f4d2a39ee1547437c6471e2e2b37cf53ad6701ede452f21
-
Filesize
337KB
MD5bb1ce6771f3bdfa3db16106e6802cf45
SHA19303e90c1782df8dd383ae75235e400e4a75df25
SHA256b30440a7fe3f2cef818e9769df7aea5af5bd150058630299c34836f0eeec0270
SHA512d412665027d7ad1b110a9e62b8ef2d1ab500b559865bb2cfa6584347993bb1e5634e442b158b3a8cbbf2df62d5ccd81714ac3e7f97246aca7b700991147893c2
-
Filesize
337KB
MD5bb1ce6771f3bdfa3db16106e6802cf45
SHA19303e90c1782df8dd383ae75235e400e4a75df25
SHA256b30440a7fe3f2cef818e9769df7aea5af5bd150058630299c34836f0eeec0270
SHA512d412665027d7ad1b110a9e62b8ef2d1ab500b559865bb2cfa6584347993bb1e5634e442b158b3a8cbbf2df62d5ccd81714ac3e7f97246aca7b700991147893c2
-
Filesize
495KB
MD5c423991edd1e101d7c1aa7f2fe5d6670
SHA11f19d1c7e6f9189b2cdc875cc4b5c9afcf976e51
SHA256f6cf76ca159237d0661b94d49d50657363db2df2f1b15188a60ef207c09a9ca4
SHA51273640c9f8342ba3d51649726e85bad9510860ca836f8de21df27d9163ae0a6092a66fe8b10c3870f1ec3084a5ea1cb2917af50572b865a15d8faa8306fb9df9f
-
Filesize
259KB
MD51636dd864151388451acb8b2fc1fccb8
SHA106e3ac51140a1f7c35f79f8c69e997919838bd01
SHA256859bdfd8e8f067c3d2328e3cc910d906d07298fd2a5ffc9e89f22df61c499126
SHA512694911e645fc982ec31aba9283c5e247a93d05b378a3e6eee1374d7f405257bef0e665f58fe29f1dd8417169373a772b6015548c1dc4643266a457b283dcaf10
-
Filesize
259KB
MD51636dd864151388451acb8b2fc1fccb8
SHA106e3ac51140a1f7c35f79f8c69e997919838bd01
SHA256859bdfd8e8f067c3d2328e3cc910d906d07298fd2a5ffc9e89f22df61c499126
SHA512694911e645fc982ec31aba9283c5e247a93d05b378a3e6eee1374d7f405257bef0e665f58fe29f1dd8417169373a772b6015548c1dc4643266a457b283dcaf10
-
Filesize
842KB
MD5c833984034607e01850987d075f4c3b9
SHA1c5cb941666198a1678c88faf22be0a1b0b007813
SHA256c6027958286a3f1a0e5ff5e104d461c6a1df7e1d0a828ab78fffa506ee2cc294
SHA512918e3fee2fae74e8f278277774d8237c658b3d7c994ec20640c81667e66671a3029bdf7ff8e9fcfdbff8f1b2d8f98bd5492d5a3200d516a47db19a2ecce72d59
-
Filesize
16.8MB
MD51f1c87b2b8528523907cc58c00923df8
SHA1ea0f7ad5e2d0bc48e52ea9e00c56dc14ea026514
SHA25637e29c28eb4a4753f6926c2f7dfd169a09e184264f537c64893637716237733a
SHA5122a8d2107eb8d479d8378c780389278e2d20653954d93dea72700b9bb9c21bc7ecf826243c1aadf8a6bc2705cc9d0055a01cf24c32a8ba38cca87ca51abd66fbc
-
Filesize
16.8MB
MD51f1c87b2b8528523907cc58c00923df8
SHA1ea0f7ad5e2d0bc48e52ea9e00c56dc14ea026514
SHA25637e29c28eb4a4753f6926c2f7dfd169a09e184264f537c64893637716237733a
SHA5122a8d2107eb8d479d8378c780389278e2d20653954d93dea72700b9bb9c21bc7ecf826243c1aadf8a6bc2705cc9d0055a01cf24c32a8ba38cca87ca51abd66fbc
-
Filesize
16.8MB
MD51f1c87b2b8528523907cc58c00923df8
SHA1ea0f7ad5e2d0bc48e52ea9e00c56dc14ea026514
SHA25637e29c28eb4a4753f6926c2f7dfd169a09e184264f537c64893637716237733a
SHA5122a8d2107eb8d479d8378c780389278e2d20653954d93dea72700b9bb9c21bc7ecf826243c1aadf8a6bc2705cc9d0055a01cf24c32a8ba38cca87ca51abd66fbc
-
Filesize
4.6MB
MD5512fe2eb54dde3c922ce73c075a592a1
SHA14332a256f0a77381ecd11e823475c335691325d7
SHA256110f6a132f05a0d7b31d449beb75c7b22cd1fd409d50b32ded10e8ac305d852e
SHA512a3f6fda13e054d5f3f52f0b62895c94b467b32e5811bf52e91c7c747554204af150c0bddce229bcd4b912c575079376ffdd02dbe281d2a59f1f6824b464b993e
-
Filesize
4.6MB
MD5512fe2eb54dde3c922ce73c075a592a1
SHA14332a256f0a77381ecd11e823475c335691325d7
SHA256110f6a132f05a0d7b31d449beb75c7b22cd1fd409d50b32ded10e8ac305d852e
SHA512a3f6fda13e054d5f3f52f0b62895c94b467b32e5811bf52e91c7c747554204af150c0bddce229bcd4b912c575079376ffdd02dbe281d2a59f1f6824b464b993e
-
Filesize
4.6MB
MD5512fe2eb54dde3c922ce73c075a592a1
SHA14332a256f0a77381ecd11e823475c335691325d7
SHA256110f6a132f05a0d7b31d449beb75c7b22cd1fd409d50b32ded10e8ac305d852e
SHA512a3f6fda13e054d5f3f52f0b62895c94b467b32e5811bf52e91c7c747554204af150c0bddce229bcd4b912c575079376ffdd02dbe281d2a59f1f6824b464b993e