Analysis
-
max time kernel
151s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:37
Static task
static1
Behavioral task
behavioral1
Sample
34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe
Resource
win10v2004-20220812-en
General
-
Target
34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe
-
Size
87KB
-
MD5
137d3c3ba473d353780e70812e70e866
-
SHA1
998431781c4159d4f09aa0cf1df3a095f61cffa8
-
SHA256
34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5
-
SHA512
066e968bfc9a94f5952200969bac720f8289c81d352e84397cee51149b2674a7bcbad87158d998451a2e31b72bf96820b05551d05cab6fa53d382e36d300f7fe
-
SSDEEP
1536:D/4vBHlDwtTczP20u39yd8pNuIm0LRv5yc6LAjKbUz+3Jkp6n5:DgvBH5KQhu3OImi5yLX/
Malware Config
Signatures
-
Drops startup file 2 IoCs
Processes:
34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\collector1" 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe -
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe:Zone.Identifier cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exedescription pid process Token: SeDebugPrivilege 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe Token: 33 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe Token: SeIncBasePriorityPrivilege 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exepid process 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.execsc.exedescription pid process target process PID 584 wrote to memory of 1724 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe csc.exe PID 584 wrote to memory of 1724 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe csc.exe PID 584 wrote to memory of 1724 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe csc.exe PID 584 wrote to memory of 1724 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe csc.exe PID 1724 wrote to memory of 2028 1724 csc.exe cvtres.exe PID 1724 wrote to memory of 2028 1724 csc.exe cvtres.exe PID 1724 wrote to memory of 2028 1724 csc.exe cvtres.exe PID 1724 wrote to memory of 2028 1724 csc.exe cvtres.exe PID 584 wrote to memory of 1452 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe cmd.exe PID 584 wrote to memory of 1452 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe cmd.exe PID 584 wrote to memory of 1452 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe cmd.exe PID 584 wrote to memory of 1452 584 34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe"C:\Users\Admin\AppData\Local\Temp\34d0e62117f9242410bd4e46f6b3bb112815eb723cea74138f3b36806d5c03f5.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\byxacy7v.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFE2F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFE1E.tmp"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- NTFS ADS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESFE2F.tmpFilesize
1KB
MD5e262347d161b3ab29eaacc481ffbe94b
SHA1c2540db71b1035e6e8c449a3b6527366b2294b17
SHA2566c96a123a91fc37eeadc031ef578f75c3f67a221fc03b5d6c76ebc0f9208ca5e
SHA512580c7c5e6708cdded92b6917b5b110cb8a9181a0cda8d3b5473e7b5415db61d7ed303d21209e81ad7160dd97373a4b28424768aba5ce1c30480efe3aaa338eca
-
C:\Users\Admin\AppData\Local\Temp\byxacy7v.dllFilesize
4KB
MD54320d794a68801a8b69c49543588ed7d
SHA170bc67e58468dad4845d6e6582c630036c3dfb32
SHA2563d4c74badad4e46cb6f7ed93fe546e68d24243736e1928f571173950423a3a59
SHA512123254a9f57fbecfd1a037f88265e9333811455e38a1b0ba9fe1534fb6cef7ae5f444ad4e2504e317971ba7be3748ab7f686b249bf8da1cb66bfd99010bc2327
-
\??\c:\Users\Admin\AppData\Local\Temp\CSCFE1E.tmpFilesize
652B
MD53ad65f26e248db1bee009d25dca4f51a
SHA180b8b134e7dd245e2aeb35f869b60cefce7cd249
SHA256d13429484954cae88ad38c251ae846936579e8679969ab2ec60ff29f86fb60a7
SHA512257dd755eaaf69d0c253bb9d660e035f5762e5559ab14d917da0b84a7871f1bc6359b15c310934493cd4acc92e18826c02f63c31ce58333e384840811dc9e3a4
-
\??\c:\Users\Admin\AppData\Local\Temp\byxacy7v.0.csFilesize
658B
MD50015048d5687060c80cf9898ec0f2e43
SHA143ba7edc4b5eb3f18f37a8772c9eb6289827d183
SHA25605062e993ff31afbfab5b531a4f431c32cd8ea0ab7373878e6a838349eab8b62
SHA512ef1054487760b0e312016fdf2784480d55f6592b94051bf47f8d713d6304b1516f5abc845e8781022727286a798bc54c0b8fd9ef422026b0140494d4d215ef54
-
\??\c:\Users\Admin\AppData\Local\Temp\byxacy7v.cmdlineFilesize
187B
MD501e84a73849e679ce336a7436402ed46
SHA198e1a6d403e0c283d4a8592aa8b88dcab7311b1c
SHA25650b53da303d886d847fe2fab3916579b801fed30d264df8a8a625d6de0e76153
SHA51214bc873659f9668ac6cf0b6185f3bbdaacea945dd0d35f878de043b2e87f1ad4b53b58c968d6d97a2cb4d79ca16fb7d34f7fde24c53961b5a6b299b42d61f0b8
-
memory/584-54-0x0000000075B11000-0x0000000075B13000-memory.dmpFilesize
8KB
-
memory/584-55-0x0000000074780000-0x0000000074D2B000-memory.dmpFilesize
5.7MB
-
memory/584-64-0x0000000074780000-0x0000000074D2B000-memory.dmpFilesize
5.7MB
-
memory/1452-63-0x0000000000000000-mapping.dmp
-
memory/1724-56-0x0000000000000000-mapping.dmp
-
memory/2028-59-0x0000000000000000-mapping.dmp