Analysis
-
max time kernel
214s -
max time network
294s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:51
Static task
static1
Behavioral task
behavioral1
Sample
e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe
Resource
win10v2004-20221111-en
General
-
Target
e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe
-
Size
316KB
-
MD5
07c19ae7a373c1c7bc7217a44499c668
-
SHA1
757b45bf6000f48cec14d1d841ca947be904c636
-
SHA256
e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f
-
SHA512
edc36c4de66621c7831277eae6ba5879e4e1a5833767af57b3b77b7a4402898f7ed440e9ffa5e5db61dffd5d271e761c53f15dc2ed8716a66d544ad736a4ccf8
-
SSDEEP
6144:pgUzVP6rNX+ZAQEqjbEY2L/iSiumcZrSf5G8LUu9d:pgl5XGFgaDufZmfZH9d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
aClKeLmPfEj24512.exepid process 1892 aClKeLmPfEj24512.exe -
Processes:
resource yara_rule behavioral1/memory/920-54-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/920-56-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/920-58-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/1892-68-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exepid process 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
aClKeLmPfEj24512.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\aClKeLmPfEj24512 = "C:\\ProgramData\\aClKeLmPfEj24512\\aClKeLmPfEj24512.exe" aClKeLmPfEj24512.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exeaClKeLmPfEj24512.exepid process 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe 1892 aClKeLmPfEj24512.exe 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exeaClKeLmPfEj24512.exedescription pid process Token: SeDebugPrivilege 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe Token: SeDebugPrivilege 1892 aClKeLmPfEj24512.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
aClKeLmPfEj24512.exepid process 1892 aClKeLmPfEj24512.exe 1892 aClKeLmPfEj24512.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
aClKeLmPfEj24512.exepid process 1892 aClKeLmPfEj24512.exe 1892 aClKeLmPfEj24512.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
aClKeLmPfEj24512.exepid process 1892 aClKeLmPfEj24512.exe 1892 aClKeLmPfEj24512.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exedescription pid process target process PID 920 wrote to memory of 1892 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe aClKeLmPfEj24512.exe PID 920 wrote to memory of 1892 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe aClKeLmPfEj24512.exe PID 920 wrote to memory of 1892 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe aClKeLmPfEj24512.exe PID 920 wrote to memory of 1892 920 e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe aClKeLmPfEj24512.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe"C:\Users\Admin\AppData\Local\Temp\e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\aClKeLmPfEj24512\aClKeLmPfEj24512.exe"C:\ProgramData\aClKeLmPfEj24512\aClKeLmPfEj24512.exe" "C:\Users\Admin\AppData\Local\Temp\e7e2780e7c72c181bfd9dcc530bbdc6d7d44aa332a61a70b747f05c1f627536f.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\aClKeLmPfEj24512\aClKeLmPfEj24512.exeFilesize
316KB
MD556b9b3e507b1f3a47ea9a61ee87f675c
SHA15ec93862846bc436e24fe9000f777b7ec8e555e6
SHA2562d02b8ef2567457d78c978470c4d9e457b07e78e43faf8015a7c1837033e4170
SHA5122636a5eaa1376b86d6f8f7586ee3aa6bad4f398ee57b6485c2fb3b6c5b926ce557eb460e233a4deead5fb485e2e9e3a1f7ab36d9017ab13be2273054f0b55709
-
C:\ProgramData\aClKeLmPfEj24512\aClKeLmPfEj24512.exeFilesize
316KB
MD556b9b3e507b1f3a47ea9a61ee87f675c
SHA15ec93862846bc436e24fe9000f777b7ec8e555e6
SHA2562d02b8ef2567457d78c978470c4d9e457b07e78e43faf8015a7c1837033e4170
SHA5122636a5eaa1376b86d6f8f7586ee3aa6bad4f398ee57b6485c2fb3b6c5b926ce557eb460e233a4deead5fb485e2e9e3a1f7ab36d9017ab13be2273054f0b55709
-
\ProgramData\aClKeLmPfEj24512\aClKeLmPfEj24512.exeFilesize
316KB
MD556b9b3e507b1f3a47ea9a61ee87f675c
SHA15ec93862846bc436e24fe9000f777b7ec8e555e6
SHA2562d02b8ef2567457d78c978470c4d9e457b07e78e43faf8015a7c1837033e4170
SHA5122636a5eaa1376b86d6f8f7586ee3aa6bad4f398ee57b6485c2fb3b6c5b926ce557eb460e233a4deead5fb485e2e9e3a1f7ab36d9017ab13be2273054f0b55709
-
\ProgramData\aClKeLmPfEj24512\aClKeLmPfEj24512.exeFilesize
316KB
MD556b9b3e507b1f3a47ea9a61ee87f675c
SHA15ec93862846bc436e24fe9000f777b7ec8e555e6
SHA2562d02b8ef2567457d78c978470c4d9e457b07e78e43faf8015a7c1837033e4170
SHA5122636a5eaa1376b86d6f8f7586ee3aa6bad4f398ee57b6485c2fb3b6c5b926ce557eb460e233a4deead5fb485e2e9e3a1f7ab36d9017ab13be2273054f0b55709
-
memory/920-54-0x0000000000400000-0x00000000004B6000-memory.dmpFilesize
728KB
-
memory/920-56-0x0000000000400000-0x00000000004B6000-memory.dmpFilesize
728KB
-
memory/920-57-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/920-58-0x0000000000400000-0x00000000004B6000-memory.dmpFilesize
728KB
-
memory/1892-61-0x0000000000000000-mapping.dmp
-
memory/1892-68-0x0000000000400000-0x00000000004B6000-memory.dmpFilesize
728KB