Analysis
-
max time kernel
160s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:44
Static task
static1
Behavioral task
behavioral1
Sample
4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe
-
Size
709KB
-
MD5
6e9b570076b7fd137363a78af0747755
-
SHA1
3aa07a562ed1d0aa82bf638f62aa84580f3d448f
-
SHA256
4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8
-
SHA512
9f08e2f2030a6d23d016f9f2098d044b9e83e8b13379faa62df686cba8f6fef94c9deca35f7ba7856e5060e5763d8a62d575b8d593617b3800867c3239d1d7a1
-
SSDEEP
12288:F6kOqfZQE8a26yQIETJ7WcYXopqvVQG+UDRz+3:8k1fyE8gyJEN7Hx03L+3
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 848 bcdedit.exe 1128 bcdedit.exe 1036 bcdedit.exe 1020 bcdedit.exe 916 bcdedit.exe 1176 bcdedit.exe 784 bcdedit.exe 984 bcdedit.exe 980 bcdedit.exe 1892 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
fouzbe.exedescription ioc process File created C:\Windows\system32\drivers\6cd21f.sys fouzbe.exe -
Executes dropped EXE 1 IoCs
Processes:
fouzbe.exepid process 2044 fouzbe.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1540 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exepid process 1148 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fouzbe.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run fouzbe.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fouzbe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Jiunu\\fouzbe.exe" fouzbe.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exedescription pid process target process PID 1148 set thread context of 1540 1148 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exefouzbe.exepid process 1148 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe 2044 fouzbe.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fouzbe.exedescription pid process Token: SeShutdownPrivilege 2044 fouzbe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exefouzbe.exedescription pid process target process PID 1148 wrote to memory of 2044 1148 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe fouzbe.exe PID 1148 wrote to memory of 2044 1148 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe fouzbe.exe PID 1148 wrote to memory of 2044 1148 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe fouzbe.exe PID 1148 wrote to memory of 2044 1148 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe fouzbe.exe PID 2044 wrote to memory of 1128 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1128 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1128 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1128 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 848 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 848 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 848 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 848 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1036 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1036 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1036 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1036 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1020 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1020 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1020 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1020 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 916 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 916 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 916 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 916 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1176 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1176 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1176 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1176 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1892 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1892 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1892 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1892 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 980 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 980 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 980 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 980 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 984 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 984 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 984 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 984 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 784 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 784 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 784 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 784 2044 fouzbe.exe bcdedit.exe PID 2044 wrote to memory of 1136 2044 fouzbe.exe taskhost.exe PID 2044 wrote to memory of 1136 2044 fouzbe.exe taskhost.exe PID 2044 wrote to memory of 1136 2044 fouzbe.exe taskhost.exe PID 2044 wrote to memory of 1136 2044 fouzbe.exe taskhost.exe PID 2044 wrote to memory of 1136 2044 fouzbe.exe taskhost.exe PID 2044 wrote to memory of 1200 2044 fouzbe.exe Dwm.exe PID 2044 wrote to memory of 1200 2044 fouzbe.exe Dwm.exe PID 2044 wrote to memory of 1200 2044 fouzbe.exe Dwm.exe PID 2044 wrote to memory of 1200 2044 fouzbe.exe Dwm.exe PID 2044 wrote to memory of 1200 2044 fouzbe.exe Dwm.exe PID 2044 wrote to memory of 1288 2044 fouzbe.exe Explorer.EXE PID 2044 wrote to memory of 1288 2044 fouzbe.exe Explorer.EXE PID 2044 wrote to memory of 1288 2044 fouzbe.exe Explorer.EXE PID 2044 wrote to memory of 1288 2044 fouzbe.exe Explorer.EXE PID 2044 wrote to memory of 1288 2044 fouzbe.exe Explorer.EXE PID 2044 wrote to memory of 1148 2044 fouzbe.exe 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe PID 2044 wrote to memory of 1148 2044 fouzbe.exe 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe PID 2044 wrote to memory of 1148 2044 fouzbe.exe 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe PID 2044 wrote to memory of 1148 2044 fouzbe.exe 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe PID 2044 wrote to memory of 1148 2044 fouzbe.exe 4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe"C:\Users\Admin\AppData\Local\Temp\4b93016587c5573e8516b560a99c9c7d9ee4f70aef528489e89783727294ddb8.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Jiunu\fouzbe.exe"C:\Users\Admin\AppData\Local\Temp\Jiunu\fouzbe.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:848 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1128 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1036 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1020 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:916 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1176 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:784 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:984 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:980 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
PID:1892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HHP14EA.bat"3⤵
- Deletes itself
PID:1540
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1200
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1136
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-139462852-153164769-41651773611306038451498597314-2104948662-1932138801231049099"1⤵PID:1944
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1260
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276B
MD5da7c2cf1b0ee9208ca84ee1eeb7e9e3e
SHA1aa24fe070a38e2102df40da4ef8c4d0efca0e591
SHA2567ddae63424d5e87e5f6ff44ee8515352dc975aa6a78577f0f79c3387d764a91b
SHA512c62d2889b5dcbe292e1f6dcb5f2890929d2aaaae8a4848aebd50e5932078a0a2bdac533af821506abdd65f9e2e906fd60b44882c50443a3a96233a65b92958a4
-
Filesize
709KB
MD571ed5cf7e32e18325e02d961d5ef9bcb
SHA19eb75000f4354d1b38e85529440d6ac22962a4e0
SHA2568f9e1a8122780b54659d29ec9d6ccce7699ccc40abe4430d513d95d042e6a63b
SHA51249b603fa8e77cbcd6a4d7604ea99acae11f6bed78c05737511ce86bdcdcd1abd7d96ba1f07ac8bf5ee6bb26dc052f7bc6857d337ca8a6a0847ff1921d273995e
-
Filesize
709KB
MD571ed5cf7e32e18325e02d961d5ef9bcb
SHA19eb75000f4354d1b38e85529440d6ac22962a4e0
SHA2568f9e1a8122780b54659d29ec9d6ccce7699ccc40abe4430d513d95d042e6a63b
SHA51249b603fa8e77cbcd6a4d7604ea99acae11f6bed78c05737511ce86bdcdcd1abd7d96ba1f07ac8bf5ee6bb26dc052f7bc6857d337ca8a6a0847ff1921d273995e
-
Filesize
709KB
MD571ed5cf7e32e18325e02d961d5ef9bcb
SHA19eb75000f4354d1b38e85529440d6ac22962a4e0
SHA2568f9e1a8122780b54659d29ec9d6ccce7699ccc40abe4430d513d95d042e6a63b
SHA51249b603fa8e77cbcd6a4d7604ea99acae11f6bed78c05737511ce86bdcdcd1abd7d96ba1f07ac8bf5ee6bb26dc052f7bc6857d337ca8a6a0847ff1921d273995e