Analysis
-
max time kernel
168s -
max time network
206s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 05:24
Static task
static1
Behavioral task
behavioral1
Sample
RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe
Resource
win10v2004-20220812-en
General
-
Target
RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe
-
Size
176KB
-
MD5
4a1d13a05a93cfaa8dd2627c696d2f0b
-
SHA1
173c81da2aab91f225f8eb5e8fcc87119be4eff0
-
SHA256
03f825726fdf3341bcfa36fcfd6dcd08e9d7ec3df982f7af9a290aa6f3c5647c
-
SHA512
29269b35d3b041ccf08d2351e4f3fa906ed396e5a880b357398f2f72ba7a20ff870531b2d7febaa1e4173412074d6bc7bee5723ad683011ee4a247fb683e7301
-
SSDEEP
3072:q6AMa+ceqZl+r4okWL23kjsZUQoRyV01WZIrLwwWyKdMd9zfp0T0:VfzsbWa3hZUHRHwwWy8UO4
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1528 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\loibgjiv.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Identities\\loibgjiv.exe\"" Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exeExplorer.EXEpid process 1544 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 1544 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exeExplorer.EXEpid process 1544 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe 1244 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1544 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe Token: SeDebugPrivilege 1244 Explorer.EXE Token: SeShutdownPrivilege 1244 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exeExplorer.EXEdescription pid process target process PID 1544 wrote to memory of 1528 1544 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe cmd.exe PID 1544 wrote to memory of 1528 1544 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe cmd.exe PID 1544 wrote to memory of 1528 1544 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe cmd.exe PID 1544 wrote to memory of 1528 1544 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe cmd.exe PID 1544 wrote to memory of 1244 1544 RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe Explorer.EXE PID 1244 wrote to memory of 1124 1244 Explorer.EXE taskhost.exe PID 1244 wrote to memory of 1180 1244 Explorer.EXE Dwm.exe PID 1244 wrote to memory of 1544 1244 Explorer.EXE RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe PID 1244 wrote to memory of 1528 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1528 1244 Explorer.EXE cmd.exe PID 1244 wrote to memory of 1324 1244 Explorer.EXE conhost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe"C:\Users\Admin\AppData\Local\Temp\RG928200002_2014_november_00000329320.023042490280.0324980000038-0000006.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS3962~1.BAT"3⤵
- Deletes itself
PID:1528
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-52442740919905907135440223559421118951220596073-959535311144192714-1195246043"1⤵PID:1324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD584edb1747f8d9b5f4eaad943f3df133c
SHA1f6715ec4d3efe8d8ce7a820b372db82d403911a6
SHA2569384fa9cd63e57f03b44426ddcb8ac2390e4355f97917a16f7be24bec7098334
SHA512bce0221c9650ba4ea20177d745742d612dfbd12da153ab31cb13180027a9babe06d6b5a3384cb20a54c064b4993a68d329add2e9e3b576230baf38fceedeed8f