Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:45
Static task
static1
Behavioral task
behavioral1
Sample
88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe
Resource
win10v2004-20221111-en
Errors
General
-
Target
88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe
-
Size
706KB
-
MD5
d5ae8a95a74e4e6c37e21ba2a4eefb09
-
SHA1
c41fbff4e3639b2563eeb97f9a90d357a26d665c
-
SHA256
88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2
-
SHA512
a1c080195281c3b7cc6cd34cd07c1471c7abf9980b0f6b51f181bbea9055d1209c52cd46c201a365079a191c2ad9bc64907509bdcd1cc06201c6910fbadd1d71
-
SSDEEP
12288:vdNxMB4UKc/WL6Ls5K0NGi5n6hft0TxssvHMpssp:LxDs/ZSG/feGsvHCr
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 1724 bcdedit.exe 1748 bcdedit.exe 1736 bcdedit.exe 892 bcdedit.exe 1828 bcdedit.exe 780 bcdedit.exe 1976 bcdedit.exe 1888 bcdedit.exe 1072 bcdedit.exe 1092 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
idug.exedescription ioc process File created C:\Windows\system32\drivers\6ca6db.sys idug.exe -
Executes dropped EXE 1 IoCs
Processes:
idug.exepid process 2040 idug.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1980 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exepid process 1280 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
idug.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run idug.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\Idug = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Sajy\\idug.exe" idug.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exedescription pid process target process PID 1280 set thread context of 1980 1280 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exeidug.exepid process 1280 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe 2040 idug.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
idug.exedescription pid process Token: SeShutdownPrivilege 2040 idug.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exeidug.exedescription pid process target process PID 1280 wrote to memory of 2040 1280 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe idug.exe PID 1280 wrote to memory of 2040 1280 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe idug.exe PID 1280 wrote to memory of 2040 1280 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe idug.exe PID 1280 wrote to memory of 2040 1280 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe idug.exe PID 2040 wrote to memory of 1724 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1724 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1724 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1724 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1748 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1748 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1748 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1748 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1736 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1736 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1736 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1736 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 892 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 892 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 892 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 892 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1828 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1828 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1828 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1828 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1976 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1976 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1976 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1976 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 780 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 780 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 780 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 780 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1092 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1092 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1092 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1092 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1072 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1072 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1072 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1072 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1888 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1888 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1888 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1888 2040 idug.exe bcdedit.exe PID 2040 wrote to memory of 1120 2040 idug.exe taskhost.exe PID 2040 wrote to memory of 1120 2040 idug.exe taskhost.exe PID 2040 wrote to memory of 1120 2040 idug.exe taskhost.exe PID 2040 wrote to memory of 1120 2040 idug.exe taskhost.exe PID 2040 wrote to memory of 1120 2040 idug.exe taskhost.exe PID 2040 wrote to memory of 1180 2040 idug.exe Dwm.exe PID 2040 wrote to memory of 1180 2040 idug.exe Dwm.exe PID 2040 wrote to memory of 1180 2040 idug.exe Dwm.exe PID 2040 wrote to memory of 1180 2040 idug.exe Dwm.exe PID 2040 wrote to memory of 1180 2040 idug.exe Dwm.exe PID 2040 wrote to memory of 1252 2040 idug.exe Explorer.EXE PID 2040 wrote to memory of 1252 2040 idug.exe Explorer.EXE PID 2040 wrote to memory of 1252 2040 idug.exe Explorer.EXE PID 2040 wrote to memory of 1252 2040 idug.exe Explorer.EXE PID 2040 wrote to memory of 1252 2040 idug.exe Explorer.EXE PID 2040 wrote to memory of 1280 2040 idug.exe 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe PID 2040 wrote to memory of 1280 2040 idug.exe 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe PID 2040 wrote to memory of 1280 2040 idug.exe 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe PID 2040 wrote to memory of 1280 2040 idug.exe 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe PID 2040 wrote to memory of 1280 2040 idug.exe 88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe"C:\Users\Admin\AppData\Local\Temp\88757631988c9544b36f0212cf7cdf6c621d5005b99b64c238f4f7c487eb89f2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\Sajy\idug.exe"C:\Users\Admin\AppData\Local\Temp\Sajy\idug.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1724 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1748 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1736 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:892 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1828 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:780 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1976 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1888 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1072 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON3⤵
- Modifies boot configuration data using bcdedit
PID:1092 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MTP85E7.bat"2⤵
- Deletes itself
PID:1980
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1337266008-137890683116212770901229295055834978131899851223-1336191529-856981535"1⤵PID:2012
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:872
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD529a2d840ad4335cc326095bb2bf0cb87
SHA1a745875729ce3e5f10fa09806821be6cdcfa181d
SHA25629997356cfe76b3a068f4a3861369afe022b4776eb99103c453b51a1da5c559a
SHA5122ac244839ec6484987799129badc18660f47e54a76dcd604de08db03f962468a236dc8bba6271e23ab9fd123dc2f44c7634975da6eb7fb23a9bb4c11763889a5
-
Filesize
706KB
MD56b1ffc7b412b4bd5ad0e9f96cc4dd187
SHA104fd1ab619223e054dcaa3f1ae0d2e6bf43da575
SHA256492e0a85b3159d3b8c05c8726ae542fb079d710dd303606f2d6111c108e6b81e
SHA51275717088bf90f1a03619ff7ce1dc6ddb412c8c54ad97a0d128f714620a4965101530e01e095dbc791df0f6c0ce79307790dee39abf90c4be44fd17ebda9cca3e
-
Filesize
706KB
MD56b1ffc7b412b4bd5ad0e9f96cc4dd187
SHA104fd1ab619223e054dcaa3f1ae0d2e6bf43da575
SHA256492e0a85b3159d3b8c05c8726ae542fb079d710dd303606f2d6111c108e6b81e
SHA51275717088bf90f1a03619ff7ce1dc6ddb412c8c54ad97a0d128f714620a4965101530e01e095dbc791df0f6c0ce79307790dee39abf90c4be44fd17ebda9cca3e
-
Filesize
706KB
MD56b1ffc7b412b4bd5ad0e9f96cc4dd187
SHA104fd1ab619223e054dcaa3f1ae0d2e6bf43da575
SHA256492e0a85b3159d3b8c05c8726ae542fb079d710dd303606f2d6111c108e6b81e
SHA51275717088bf90f1a03619ff7ce1dc6ddb412c8c54ad97a0d128f714620a4965101530e01e095dbc791df0f6c0ce79307790dee39abf90c4be44fd17ebda9cca3e