Analysis
-
max time kernel
151s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 22:04
Static task
static1
Behavioral task
behavioral1
Sample
9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe
Resource
win10v2004-20221111-en
General
-
Target
9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe
-
Size
409KB
-
MD5
35f9fc3d8ca341cd6f65189ce25be1c2
-
SHA1
cae0189d23c3b22bd0971fc0d194d88b59ce52bb
-
SHA256
9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0
-
SHA512
edabaceb82deb52048d85459b40f52f9ae3d5024aeb0a9461572b07a360cf8a78c0f488aa374c0208249cdfef437f1ca9e9d2a2f77ebe726df291aa3a2d56e87
-
SSDEEP
6144:YxFnLbgMJRd37/E/NsOdh+vTt7a6TNAVYkDHARU7fXCwXD93FSEqOoNvexyg:Yx1gMrdAxdkvTdT23gRULvSEINvRg
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exepid process 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exeExplorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\DigbElif = "regsvr32.exe \"C:\\ProgramData\\DigbElif\\DigbElif.dat\"" 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\DigbElif = "regsvr32.exe \"C:\\ProgramData\\DigbElif\\DigbElif.dat\"" Explorer.EXE -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" Explorer.EXE -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" Explorer.EXE -
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\TabProcGrowth = "0" Explorer.EXE -
Modifies registry class 6 IoCs
Processes:
Explorer.EXE9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\CLSID\{28FB7CC1-5F8E-4F7F-9E91-5CDF46D923E7}\{1EBB0F7B-13F8-42FB-BE71-18C2312A3987} = f62865f6 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\CLSID\{6C9C60E4-6F96-4D8F-AF6A-08B869A703F2}\#cert = 31 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\CLSID\{6C9C60E4-6F96-4D8F-AF6A-08B869A703F2} 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe Set value (data) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\CLSID\{6C9C60E4-6F96-4D8F-AF6A-08B869A703F2}\#sd = 433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c54656d705c393437316161313361633266653531343366363838613835636261636233663063653137393834353965353330613266393934623439623533323439623463302e65786500 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\CLSID\{6C9C60E4-6F96-4D8F-AF6A-08B869A703F2} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\CLSID\{28FB7CC1-5F8E-4F7F-9E91-5CDF46D923E7} Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exepid process 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1372 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exeExplorer.EXEdescription pid process Token: SeCreateGlobalPrivilege 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe Token: SeDebugPrivilege 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe Token: SeCreateGlobalPrivilege 1372 Explorer.EXE Token: SeShutdownPrivilege 1372 Explorer.EXE Token: SeDebugPrivilege 1372 Explorer.EXE Token: SeShutdownPrivilege 1372 Explorer.EXE Token: SeShutdownPrivilege 1372 Explorer.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exedescription pid process target process PID 2024 wrote to memory of 300 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe spoolsv.exe PID 2024 wrote to memory of 300 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe spoolsv.exe PID 2024 wrote to memory of 1372 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe Explorer.EXE PID 2024 wrote to memory of 1372 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe Explorer.EXE PID 2024 wrote to memory of 760 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe sppsvc.exe PID 2024 wrote to memory of 760 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe sppsvc.exe PID 2024 wrote to memory of 1936 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe WMIADAP.EXE PID 2024 wrote to memory of 1936 2024 9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe WMIADAP.EXE
Processes
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1936
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:760
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe"C:\Users\Admin\AppData\Local\Temp\9471aa13ac2fe5143f688a85cbacb3f0ce1798459e530a2f994b49b53249b4c0.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD51e74f0a3622261ab8072cd76f5f7bd89
SHA1a534edb09915f95065d0f8379a18926583695715
SHA25627ff45f4358c0f3ebb775fcbf205f785d24fb0070ffb04fc3ee24d83c1b1bb0e
SHA512cb40f6c8b04d75a1b13ee48887e861a324bdc7a496a2cd83954a71af2d0dd5644532b3d4e5d2c377c5d87b02041736b5f9f0f59c6d08c21abf29f9cef5504fe0
-
Filesize
276KB
MD51e74f0a3622261ab8072cd76f5f7bd89
SHA1a534edb09915f95065d0f8379a18926583695715
SHA25627ff45f4358c0f3ebb775fcbf205f785d24fb0070ffb04fc3ee24d83c1b1bb0e
SHA512cb40f6c8b04d75a1b13ee48887e861a324bdc7a496a2cd83954a71af2d0dd5644532b3d4e5d2c377c5d87b02041736b5f9f0f59c6d08c21abf29f9cef5504fe0