Analysis

  • max time kernel
    87s
  • max time network
    87s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 19:06

Errors

Reason
Machine shutdown

General

  • Target

    8ebbf4037d4df7fd23f076448d4ca93d61857bf6be6ee4d130fe6c176bb34f69.exe

  • Size

    569KB

  • MD5

    4e66f4af565563d95fe443d36dca93a0

  • SHA1

    81ea30f87ae9e096e8bafeab1affbd5e1c0ba51f

  • SHA256

    8ebbf4037d4df7fd23f076448d4ca93d61857bf6be6ee4d130fe6c176bb34f69

  • SHA512

    d6cdffe8d59a5d752b29446475fb7ec1f79e968898f2ffc5920a44c216d13fb1f1c4040e2951b0825d5574cf2d5b0c3994ecd876dbc7ac7a5bc64c6140982fbf

  • SSDEEP

    12288:L0GRcmZ828Z0Nq5JlozbAMmopzRW92wMU4M:5Rq/Z0Nilozbvm2Rc25LM

Malware Config

Signatures

  • Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ebbf4037d4df7fd23f076448d4ca93d61857bf6be6ee4d130fe6c176bb34f69.exe
    "C:\Users\Admin\AppData\Local\Temp\8ebbf4037d4df7fd23f076448d4ca93d61857bf6be6ee4d130fe6c176bb34f69.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\ProgramData\cD02400PhOpN02400\cD02400PhOpN02400.exe
      "C:\ProgramData\cD02400PhOpN02400\cD02400PhOpN02400.exe" BOMBARDAMAXIMUM
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1820
    • C:\ProgramData\cD02400PhOpN02400\cD02400PhOpN02400.exe
      "C:\ProgramData\cD02400PhOpN02400\cD02400PhOpN02400.exe" "C:\Users\Admin\AppData\Local\Temp\8ebbf4037d4df7fd23f076448d4ca93d61857bf6be6ee4d130fe6c176bb34f69.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Deletes itself
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe -set TESTSIGNING ON
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1600
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe -set TESTSIGNING ON
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:668
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe -set TESTSIGNING ON
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:948
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe -set TESTSIGNING ON
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1532
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe -set TESTSIGNING ON
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:744
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe -set TESTSIGNING ON
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1740
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe -set TESTSIGNING ON
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:432
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe -set TESTSIGNING ON
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1080
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe -set TESTSIGNING ON
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1076
      • C:\Windows\system32\bcdedit.exe
        bcdedit.exe -set TESTSIGNING ON
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:664
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:108
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1872

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\cD02400PhOpN02400\cD02400PhOpN02400

        Filesize

        192B

        MD5

        59000607dcef31b34d0c3fb4ca1dd9eb

        SHA1

        613154a2b02f324b7c87b39d1e4db1c9a697e8a5

        SHA256

        32d3ea49c68f7ec4f4755ab62d7e0a7949272cd9b8a370423ee3aee3cfec50e2

        SHA512

        09c1d3ced449d1e2bf83ff8d8a492149dc465fc4783e02c3577b010c31d4280cf64e8a4f58258cba8303b54d7c813a4d2cf2661f578e5dd3e286abcb64a59337

      • C:\ProgramData\cD02400PhOpN02400\cD02400PhOpN02400.exe

        Filesize

        569KB

        MD5

        7b51b577d92e4b1f286d7f721de82397

        SHA1

        393303c9f99388e6624d0975b7af3426679bc4bc

        SHA256

        d0954a38403b812cee698bfc7c416ca927c83a6164eb6936e1ad04abfd7773e7

        SHA512

        b1c2f9dcfcd57d60efc3a45a4a0535e402aee522ee93ae15906bedcc24ef54e8a29a3017cc86daa3deb891d9a4d7a67425145ac55f6750ed39ec0036db3ba0ee

      • C:\ProgramData\cD02400PhOpN02400\cD02400PhOpN02400.exe

        Filesize

        569KB

        MD5

        7b51b577d92e4b1f286d7f721de82397

        SHA1

        393303c9f99388e6624d0975b7af3426679bc4bc

        SHA256

        d0954a38403b812cee698bfc7c416ca927c83a6164eb6936e1ad04abfd7773e7

        SHA512

        b1c2f9dcfcd57d60efc3a45a4a0535e402aee522ee93ae15906bedcc24ef54e8a29a3017cc86daa3deb891d9a4d7a67425145ac55f6750ed39ec0036db3ba0ee

      • C:\ProgramData\cD02400PhOpN02400\cD02400PhOpN02400.exe

        Filesize

        569KB

        MD5

        7b51b577d92e4b1f286d7f721de82397

        SHA1

        393303c9f99388e6624d0975b7af3426679bc4bc

        SHA256

        d0954a38403b812cee698bfc7c416ca927c83a6164eb6936e1ad04abfd7773e7

        SHA512

        b1c2f9dcfcd57d60efc3a45a4a0535e402aee522ee93ae15906bedcc24ef54e8a29a3017cc86daa3deb891d9a4d7a67425145ac55f6750ed39ec0036db3ba0ee

      • \ProgramData\cD02400PhOpN02400\cD02400PhOpN02400.exe

        Filesize

        569KB

        MD5

        7b51b577d92e4b1f286d7f721de82397

        SHA1

        393303c9f99388e6624d0975b7af3426679bc4bc

        SHA256

        d0954a38403b812cee698bfc7c416ca927c83a6164eb6936e1ad04abfd7773e7

        SHA512

        b1c2f9dcfcd57d60efc3a45a4a0535e402aee522ee93ae15906bedcc24ef54e8a29a3017cc86daa3deb891d9a4d7a67425145ac55f6750ed39ec0036db3ba0ee

      • \ProgramData\cD02400PhOpN02400\cD02400PhOpN02400.exe

        Filesize

        569KB

        MD5

        7b51b577d92e4b1f286d7f721de82397

        SHA1

        393303c9f99388e6624d0975b7af3426679bc4bc

        SHA256

        d0954a38403b812cee698bfc7c416ca927c83a6164eb6936e1ad04abfd7773e7

        SHA512

        b1c2f9dcfcd57d60efc3a45a4a0535e402aee522ee93ae15906bedcc24ef54e8a29a3017cc86daa3deb891d9a4d7a67425145ac55f6750ed39ec0036db3ba0ee

      • \ProgramData\cD02400PhOpN02400\cD02400PhOpN02400.exe

        Filesize

        569KB

        MD5

        7b51b577d92e4b1f286d7f721de82397

        SHA1

        393303c9f99388e6624d0975b7af3426679bc4bc

        SHA256

        d0954a38403b812cee698bfc7c416ca927c83a6164eb6936e1ad04abfd7773e7

        SHA512

        b1c2f9dcfcd57d60efc3a45a4a0535e402aee522ee93ae15906bedcc24ef54e8a29a3017cc86daa3deb891d9a4d7a67425145ac55f6750ed39ec0036db3ba0ee

      • memory/108-88-0x000007FEFBD11000-0x000007FEFBD13000-memory.dmp

        Filesize

        8KB

      • memory/1520-54-0x0000000075351000-0x0000000075353000-memory.dmp

        Filesize

        8KB

      • memory/1520-68-0x0000000000400000-0x00000000004D5000-memory.dmp

        Filesize

        852KB

      • memory/1520-56-0x0000000000692000-0x00000000006E1000-memory.dmp

        Filesize

        316KB

      • memory/1520-55-0x0000000000400000-0x00000000004D5000-memory.dmp

        Filesize

        852KB

      • memory/1716-90-0x0000000000682000-0x00000000006D1000-memory.dmp

        Filesize

        316KB

      • memory/1716-77-0x0000000000682000-0x00000000006D1000-memory.dmp

        Filesize

        316KB

      • memory/1716-76-0x0000000000400000-0x00000000004D5000-memory.dmp

        Filesize

        852KB

      • memory/1716-73-0x00000000002C0000-0x00000000002C6000-memory.dmp

        Filesize

        24KB

      • memory/1716-72-0x0000000000682000-0x00000000006D1000-memory.dmp

        Filesize

        316KB

      • memory/1716-71-0x0000000000400000-0x00000000004D5000-memory.dmp

        Filesize

        852KB

      • memory/1716-89-0x0000000000400000-0x00000000004D5000-memory.dmp

        Filesize

        852KB

      • memory/1820-75-0x00000000005F2000-0x0000000000641000-memory.dmp

        Filesize

        316KB

      • memory/1820-74-0x0000000000400000-0x00000000004D5000-memory.dmp

        Filesize

        852KB

      • memory/1820-63-0x00000000005F2000-0x0000000000641000-memory.dmp

        Filesize

        316KB

      • memory/1820-62-0x0000000000400000-0x00000000004D5000-memory.dmp

        Filesize

        852KB

      • memory/1820-91-0x00000000005F2000-0x0000000000641000-memory.dmp

        Filesize

        316KB