Analysis
-
max time kernel
157s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 03:53
Static task
static1
Behavioral task
behavioral1
Sample
19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe
Resource
win7-20221111-en
General
-
Target
19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe
-
Size
264KB
-
MD5
04779ea376c73f19b714c74e3dfb72a7
-
SHA1
154341817652934d4dc650e7946839c76c1768da
-
SHA256
19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807
-
SHA512
113f6602bda448fe0cff2027b37de78df712b7cc3f1d969476145e244582e123b1dd192f2d2117889062696540dbb6e2a8d5590f8d457cada95475d622000df9
-
SSDEEP
6144:x+ClqR9NJStyOKs8jV1uiNCCc4gFOJNrX5NQsl+Uhzp3I0R:xNy3JStyOKs8jLN+5FOJZ1ljhz1
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
7B77.tmppid process 976 7B77.tmp -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule behavioral1/memory/896-56-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/844-70-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1264-77-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exepid process 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\A1A.exe = "C:\\Program Files (x86)\\LP\\CD17\\A1A.exe" 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
Processes:
19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exedescription ioc process File created C:\Program Files (x86)\LP\CD17\A1A.exe 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe File opened for modification C:\Program Files (x86)\LP\CD17\A1A.exe 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe File opened for modification C:\Program Files (x86)\LP\CD17\7B77.tmp 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exepid process 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2032 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
msiexec.exeexplorer.exeAUDIODG.EXEdescription pid process Token: SeRestorePrivilege 608 msiexec.exe Token: SeTakeOwnershipPrivilege 608 msiexec.exe Token: SeSecurityPrivilege 608 msiexec.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: SeShutdownPrivilege 2032 explorer.exe Token: 33 2044 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2044 AUDIODG.EXE Token: 33 2044 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2044 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid process 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
Processes:
explorer.exepid process 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe 2032 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exedescription pid process target process PID 896 wrote to memory of 976 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 7B77.tmp PID 896 wrote to memory of 976 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 7B77.tmp PID 896 wrote to memory of 976 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 7B77.tmp PID 896 wrote to memory of 976 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 7B77.tmp PID 896 wrote to memory of 844 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe PID 896 wrote to memory of 844 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe PID 896 wrote to memory of 844 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe PID 896 wrote to memory of 844 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe PID 896 wrote to memory of 1264 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe PID 896 wrote to memory of 1264 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe PID 896 wrote to memory of 1264 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe PID 896 wrote to memory of 1264 896 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe"C:\Users\Admin\AppData\Local\Temp\19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:896 -
C:\Program Files (x86)\LP\CD17\7B77.tmp"C:\Program Files (x86)\LP\CD17\7B77.tmp"2⤵
- Executes dropped EXE
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exeC:\Users\Admin\AppData\Local\Temp\19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe startC:\Users\Admin\AppData\Roaming\7022B\0FFCD.exe%C:\Users\Admin\AppData\Roaming\7022B2⤵PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exeC:\Users\Admin\AppData\Local\Temp\19001d88ace027554c1a53e3b0b7030fc5a7d023fa4f848ff7811eee99bb0807.exe startC:\Program Files (x86)\2B37B\lvvm.exe%C:\Program Files (x86)\2B37B2⤵PID:1264
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:608
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2032
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5881⤵
- Suspicious use of AdjustPrivilegeToken
PID:2044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5b3665f15b4cd433e21ac50c2f224b101
SHA1b96fc19237dd9767418f23dab9451489c75bf5b6
SHA256d7c3b90a540de9a91bb01c49e5f632a8e9085dfd774e627b31799018dcd6aed9
SHA512b2e030be29ac15267cd1613070aac2f5282680a6d3a56878e6e44f5eba58b8870e1a05dbc7418f7b67a271b8a184902d483863465e2e2692a9929cec740e20bd
-
Filesize
95KB
MD5b3665f15b4cd433e21ac50c2f224b101
SHA1b96fc19237dd9767418f23dab9451489c75bf5b6
SHA256d7c3b90a540de9a91bb01c49e5f632a8e9085dfd774e627b31799018dcd6aed9
SHA512b2e030be29ac15267cd1613070aac2f5282680a6d3a56878e6e44f5eba58b8870e1a05dbc7418f7b67a271b8a184902d483863465e2e2692a9929cec740e20bd
-
Filesize
95KB
MD5b3665f15b4cd433e21ac50c2f224b101
SHA1b96fc19237dd9767418f23dab9451489c75bf5b6
SHA256d7c3b90a540de9a91bb01c49e5f632a8e9085dfd774e627b31799018dcd6aed9
SHA512b2e030be29ac15267cd1613070aac2f5282680a6d3a56878e6e44f5eba58b8870e1a05dbc7418f7b67a271b8a184902d483863465e2e2692a9929cec740e20bd