Analysis
-
max time kernel
200s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:13
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
1.1MB
-
MD5
4fe8dcd05222282de480bdafea6aba1f
-
SHA1
759daa63a30ed49ffbf9a0193d84a1cdbe1222fd
-
SHA256
7d6cfc8c6d71c9ae06ec9774d5ccc0fc9243dc326e02fc4e383cfe2805bb51a5
-
SHA512
33cb600e6011bd0c1b4839943dc04e0811206f217a80f80368e00003ba67207bf9d1988502c84ec0b32291e4b8ab105be2c850899608fe23a18fea0664558ee2
-
SSDEEP
24576:8dxuLNNc/bZzuFVwtnXNff8VXhcjwJScM7N:ExuZNcFzuMtdkRcj+F6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Fingering.exe.pifpid process 3596 Fingering.exe.pif -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
file.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 3620 powershell.exe 3620 powershell.exe 3620 powershell.exe 1708 powershell.exe 1708 powershell.exe 1708 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3620 powershell.exe Token: SeDebugPrivilege 1708 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
file.execmd.execmd.exedescription pid process target process PID 4548 wrote to memory of 5024 4548 file.exe dllhost.exe PID 4548 wrote to memory of 5024 4548 file.exe dllhost.exe PID 4548 wrote to memory of 5024 4548 file.exe dllhost.exe PID 4548 wrote to memory of 380 4548 file.exe cmd.exe PID 4548 wrote to memory of 380 4548 file.exe cmd.exe PID 4548 wrote to memory of 380 4548 file.exe cmd.exe PID 380 wrote to memory of 5020 380 cmd.exe cmd.exe PID 380 wrote to memory of 5020 380 cmd.exe cmd.exe PID 380 wrote to memory of 5020 380 cmd.exe cmd.exe PID 5020 wrote to memory of 3620 5020 cmd.exe powershell.exe PID 5020 wrote to memory of 3620 5020 cmd.exe powershell.exe PID 5020 wrote to memory of 3620 5020 cmd.exe powershell.exe PID 5020 wrote to memory of 1708 5020 cmd.exe powershell.exe PID 5020 wrote to memory of 1708 5020 cmd.exe powershell.exe PID 5020 wrote to memory of 1708 5020 cmd.exe powershell.exe PID 5020 wrote to memory of 2892 5020 cmd.exe findstr.exe PID 5020 wrote to memory of 2892 5020 cmd.exe findstr.exe PID 5020 wrote to memory of 2892 5020 cmd.exe findstr.exe PID 5020 wrote to memory of 3596 5020 cmd.exe Fingering.exe.pif PID 5020 wrote to memory of 3596 5020 cmd.exe Fingering.exe.pif PID 5020 wrote to memory of 3596 5020 cmd.exe Fingering.exe.pif
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\dllhost.exedllhost kajdkfjiwueriuiwjedkfmsnfvkajksdjfvopqeirjgfiowe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Chaos.sldm & ping -n 5 localhost2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avastui4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avgui4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^186324320118119570326051194996969004524735423858363919713624054535922606$" Laura.sldm4⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fingering.exe.pifFingering.exe.pif p4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5a7971ef7f34ad9ff94eeef799c1d14e3
SHA167548dc46e92b5683ffc72f811d36928d0961dd0
SHA25663570ea08f4d2a41af077244a54097121dd0c6ef711118ff86b7f9f20a1900e3
SHA5120c39c81b7047ca625e0f2c016162bf700e2c0a4aee871267ca3b487f950aa665a41ee0fd824e5f6c3be6ff8715beb9b147eb001bf8b4909875d3cc403c9a1efe
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Chaos.sldmFilesize
11KB
MD5766cd31bc50af9191db198b9d9cbce21
SHA117e68a47d9b3047f45ee131939a26e61d40be489
SHA25611d2e04123587d79920d251e77d93ec63c31dbdd851fb83338ccae702abf4b9e
SHA512bc192b93130d20b3e977afefd396440d8d5b9f0810072ec7b49345d7fc37aef96e765637cbca1bd634b001dbc5ec962164032d6ebeb1635066e925c7f310294d
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fingering.exe.pifFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Laura.sldmFilesize
872KB
MD5d5cdf1b70132decc8e666ebac1ec6f4e
SHA1d33bf8800a42c0b2296af81d845e0781995561ae
SHA256a031e9c50ee8c2d970361fd95eece7bee539c687d856276dd653df6bb47f7838
SHA5125ee87f6d9ad1954620e9d7874b5b3f4d8f3acbd0154c8f2778158821fad3b2cced7b66dfc09a4618236ee2a0d2b22997159938fe9b00959a5bc63eef13b40084
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Washington.sldmFilesize
870KB
MD5abdce2f6477de773c615aa30af891947
SHA1eeaf88372316b85f1a27f8f5bc32aa1516e89ff5
SHA256cef22e6487839bb15df2efbdfdf2ea4009c0f5c176e515f8c018ae63bb1324b1
SHA51225f586a69eed0f65d69e5abb62a1d4c792c9b67620825853ea53f7c4c55d9adfd141a9443f6efff271b58cec9e77176c04ac6d4b227271dbbac9fec68e48b579
-
memory/380-133-0x0000000000000000-mapping.dmp
-
memory/1708-147-0x0000000000000000-mapping.dmp
-
memory/2892-150-0x0000000000000000-mapping.dmp
-
memory/3596-153-0x0000000000000000-mapping.dmp
-
memory/3620-137-0x0000000002190000-0x00000000021C6000-memory.dmpFilesize
216KB
-
memory/3620-143-0x0000000005F40000-0x0000000005FD6000-memory.dmpFilesize
600KB
-
memory/3620-144-0x0000000000690000-0x00000000006AA000-memory.dmpFilesize
104KB
-
memory/3620-145-0x0000000005DA0000-0x0000000005DC2000-memory.dmpFilesize
136KB
-
memory/3620-146-0x0000000007050000-0x00000000075F4000-memory.dmpFilesize
5.6MB
-
memory/3620-142-0x0000000005A60000-0x0000000005A7E000-memory.dmpFilesize
120KB
-
memory/3620-141-0x00000000053B0000-0x0000000005416000-memory.dmpFilesize
408KB
-
memory/3620-140-0x0000000005290000-0x00000000052F6000-memory.dmpFilesize
408KB
-
memory/3620-139-0x0000000004BA0000-0x0000000004BC2000-memory.dmpFilesize
136KB
-
memory/3620-138-0x0000000004BF0000-0x0000000005218000-memory.dmpFilesize
6.2MB
-
memory/3620-136-0x0000000000000000-mapping.dmp
-
memory/5020-135-0x0000000000000000-mapping.dmp
-
memory/5024-132-0x0000000000000000-mapping.dmp