Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe
Resource
win10v2004-20220812-en
General
-
Target
4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe
-
Size
314KB
-
MD5
083be4e8fc288e0cfb69a018e180bec6
-
SHA1
f7c5398d38afcc54ab6a4c8abc52ae32d72c07aa
-
SHA256
4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb
-
SHA512
6a0a7e1b0ac81d2831857d23cfa34de9b297383a57bd73780cf2a17d5755b4574d7eb70fee961ba0524f6757a13f359ed5c1975fcbde826489bb27d4ae41db20
-
SSDEEP
6144:1jIgoXtkqrh1erSAoAQrv/v9DpN/NuE9fKhL3C4RU/RqaYKK99mdNt1:h9oX6qlrI8f9D8hL3C4RkOL9O1
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\TRAEKDBWMG = "C:\\Windows\\SysWOW64\\NOISEX.exe" 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe -
Executes dropped EXE 1 IoCs
pid Process 316 NOISEX.exe -
resource yara_rule behavioral1/memory/2032-55-0x00000000013D0000-0x000000000146E000-memory.dmp upx behavioral1/memory/2032-58-0x00000000013D0000-0x000000000146E000-memory.dmp upx behavioral1/memory/2032-59-0x00000000013D0000-0x000000000146E000-memory.dmp upx behavioral1/memory/2032-60-0x00000000013D0000-0x00000000014D0000-memory.dmp upx behavioral1/memory/2032-71-0x00000000013D0000-0x00000000014D0000-memory.dmp upx behavioral1/memory/2032-76-0x00000000013D0000-0x000000000146E000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe -
Deletes itself 1 IoCs
pid Process 1796 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\NOISEX.exe 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe File opened for modification C:\Windows\SysWOW64\NOISEX.exe 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe 316 NOISEX.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe Token: SeDebugPrivilege 316 NOISEX.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2032 wrote to memory of 316 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe 28 PID 2032 wrote to memory of 316 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe 28 PID 2032 wrote to memory of 316 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe 28 PID 2032 wrote to memory of 316 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe 28 PID 2032 wrote to memory of 1796 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe 30 PID 2032 wrote to memory of 1796 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe 30 PID 2032 wrote to memory of 1796 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe 30 PID 2032 wrote to memory of 1796 2032 4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe"C:\Users\Admin\AppData\Local\Temp\4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe"1⤵
- Adds policy Run key to start application
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\NOISEX.exeC:\Windows\SysWOW64\NOISEX.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\SysWOW64\cmd.exe/c C:\Users\Admin\AppData\Local\Temp\~unins2184.bat "C:\Users\Admin\AppData\Local\Temp\4fa232aa44066a2dd2e89958df384a5ec421eeff85133bca87225a637740a1fb.exe"2⤵
- Deletes itself
PID:1796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49B
MD59e0a2f5ab30517809b95a1ff1dd98c53
SHA15c1eefdf10e67d1e9216e2e3f5e92352d583c9ce
SHA25697ac9fee75a1f7b63b3115e9c4fb9dda80b1caba26d2fb51325670dee261fe32
SHA512e959cc1fd48fb1cccf135a697924c775a3812bab211fc7f9b00c5a9d617261d84c5d6f7cb548774c1e8f46811b06ca39c5603d0e10cbcb7b805f9abbe49b9b42
-
Filesize
134KB
MD5aad8148eaae45f60c489fcb8c8f49311
SHA1738ab1f69a6fc146c7ecb01c5a29dee46428555d
SHA256fc488a878d1edb1d4badbf3991fef6828305c8427a0f90291e1fca5e8e2b0b29
SHA512121a453cda48a75a86573fa28bd9899defb10a7a23592e5a2701fc528e796d1086b41b565e51eadef5ab0cea4e0a450191c582e7e23a6d75f00a713669c56562
-
Filesize
134KB
MD5aad8148eaae45f60c489fcb8c8f49311
SHA1738ab1f69a6fc146c7ecb01c5a29dee46428555d
SHA256fc488a878d1edb1d4badbf3991fef6828305c8427a0f90291e1fca5e8e2b0b29
SHA512121a453cda48a75a86573fa28bd9899defb10a7a23592e5a2701fc528e796d1086b41b565e51eadef5ab0cea4e0a450191c582e7e23a6d75f00a713669c56562
-
Filesize
134KB
MD5aad8148eaae45f60c489fcb8c8f49311
SHA1738ab1f69a6fc146c7ecb01c5a29dee46428555d
SHA256fc488a878d1edb1d4badbf3991fef6828305c8427a0f90291e1fca5e8e2b0b29
SHA512121a453cda48a75a86573fa28bd9899defb10a7a23592e5a2701fc528e796d1086b41b565e51eadef5ab0cea4e0a450191c582e7e23a6d75f00a713669c56562