Analysis
-
max time kernel
135s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 14:22
Behavioral task
behavioral1
Sample
d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe
-
Size
323KB
-
MD5
06c0155ca14b2aa9ca7164823b04e140
-
SHA1
9f286e7679006ee92bf7d874d030d9b9d108dcf9
-
SHA256
d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a
-
SHA512
708f20d039a6725d079a80da70aad41ed58ed36f6ba161dc05e5656dc1019650dcfb016849ffa663c43b061f18fae7928b9b73b2b0012d6e962334287a6a7402
-
SSDEEP
6144:KexS8ZE9UoGWllR+2S2zr7JhYQ+kCABN1aKprYyYyNC7ToS529oc:KewCE9Zps2nF/cABN1aKprYyqoS55c
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "c:\\cc.ico" d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe -
resource yara_rule behavioral1/memory/1952-59-0x0000000000400000-0x00000000004E1000-memory.dmp upx behavioral1/memory/1952-60-0x0000000000400000-0x00000000004E1000-memory.dmp upx behavioral1/memory/1952-62-0x0000000000400000-0x00000000004E1000-memory.dmp upx -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "c:\\cc.ico" d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 992 shutdown.exe Token: SeRemoteShutdownPrivilege 992 shutdown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1952 d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe 1952 d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1228 1952 d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe 30 PID 1952 wrote to memory of 1228 1952 d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe 30 PID 1952 wrote to memory of 1228 1952 d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe 30 PID 1952 wrote to memory of 1228 1952 d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe 30 PID 1952 wrote to memory of 992 1952 d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe 28 PID 1952 wrote to memory of 992 1952 d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe 28 PID 1952 wrote to memory of 992 1952 d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe 28 PID 1952 wrote to memory of 992 1952 d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe"C:\Users\Admin\AppData\Local\Temp\d3bd9b4480aa032b01b957a7645041e67c28c49f44b1acff9aaceed0d718784a.exe"1⤵
- Modifies system executable filetype association
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\shutdown.exeshutdown -s -t 100 -c ÐÜèÉÕÏ㲡¶¾2⤵
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\1.bat2⤵
- Modifies registry class
PID:1228
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1748
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18B
MD5c6c7b4dcc81c27c76c49dfd2acee715e
SHA1ef6a2a2ccb276bc9a057cd0d6f0bd3867d1988b7
SHA256edc099fdfa8210f123cdc51dfb3256cc7dc3c0af614fd63e3c1d6182bf37ae21
SHA512b9d1aba58a20238e3870c9785a43d1c64273b3c332d545f8c363d02844214f6dcd3332c35281b2663ed2192728c33d915d457615c6f4057a1dccdea188d38898