Analysis
-
max time kernel
104s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 10:59
Static task
static1
Behavioral task
behavioral1
Sample
cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe
Resource
win10v2004-20221111-en
General
-
Target
cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe
-
Size
503KB
-
MD5
aaf1572112e467c4667ab84bcdee33b2
-
SHA1
a1b4610140a1901995bedacb82ac1392d0890067
-
SHA256
cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1
-
SHA512
3f86ed1eb5a123a93c789c6165784f92ddd389ff680e3b0d96a0d334e31650c7bf21bd2dd973c697446d83d02427aea729574a61e80ac787e574eef4d958b0c9
-
SSDEEP
12288:mN7OjRhWIqHcFED5g3GrkppAkpmRhW3J8lBhZLTt2:eOllqHcCF2IHWZ8ltLTt2
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 1836 bcdedit.exe 1964 bcdedit.exe 436 bcdedit.exe 1072 bcdedit.exe 1124 bcdedit.exe 1696 bcdedit.exe 980 bcdedit.exe 1224 bcdedit.exe 1804 bcdedit.exe 1352 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
duig.exedescription ioc process File created C:\Windows\system32\drivers\6d5581.sys duig.exe -
Executes dropped EXE 2 IoCs
Processes:
duig.exeduig.exepid process 1656 duig.exe 1476 duig.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1856 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exepid process 1348 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe 1348 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exeduig.exedescription pid process target process PID 1232 set thread context of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1656 set thread context of 1476 1656 duig.exe duig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
duig.exepid process 1476 duig.exe 1476 duig.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
duig.exedescription pid process Token: SeShutdownPrivilege 1476 duig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exeduig.exepid process 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe 1656 duig.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.execf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exeduig.exeduig.exedescription pid process target process PID 1232 wrote to memory of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1232 wrote to memory of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1232 wrote to memory of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1232 wrote to memory of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1232 wrote to memory of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1232 wrote to memory of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1232 wrote to memory of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1232 wrote to memory of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1232 wrote to memory of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1232 wrote to memory of 1348 1232 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe PID 1348 wrote to memory of 1656 1348 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe duig.exe PID 1348 wrote to memory of 1656 1348 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe duig.exe PID 1348 wrote to memory of 1656 1348 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe duig.exe PID 1348 wrote to memory of 1656 1348 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe duig.exe PID 1656 wrote to memory of 1476 1656 duig.exe duig.exe PID 1656 wrote to memory of 1476 1656 duig.exe duig.exe PID 1656 wrote to memory of 1476 1656 duig.exe duig.exe PID 1656 wrote to memory of 1476 1656 duig.exe duig.exe PID 1656 wrote to memory of 1476 1656 duig.exe duig.exe PID 1656 wrote to memory of 1476 1656 duig.exe duig.exe PID 1656 wrote to memory of 1476 1656 duig.exe duig.exe PID 1656 wrote to memory of 1476 1656 duig.exe duig.exe PID 1656 wrote to memory of 1476 1656 duig.exe duig.exe PID 1656 wrote to memory of 1476 1656 duig.exe duig.exe PID 1348 wrote to memory of 1856 1348 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cmd.exe PID 1348 wrote to memory of 1856 1348 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cmd.exe PID 1348 wrote to memory of 1856 1348 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cmd.exe PID 1348 wrote to memory of 1856 1348 cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe cmd.exe PID 1476 wrote to memory of 1836 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1836 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1836 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1836 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 980 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 980 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 980 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 980 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1696 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1696 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1696 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1696 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1964 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1964 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1964 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1964 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1124 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1124 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1124 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1124 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1072 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1072 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1072 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1072 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 436 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 436 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 436 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 436 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1804 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1804 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1804 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1804 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1224 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1224 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1224 1476 duig.exe bcdedit.exe PID 1476 wrote to memory of 1224 1476 duig.exe bcdedit.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe"C:\Users\Admin\AppData\Local\Temp\cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe"C:\Users\Admin\AppData\Local\Temp\cf0eed4a772ddce4823d434ecad5b4296a0af94d057535d0a18e762ce79f81e1.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Roaming\Itxyn\duig.exe"C:\Users\Admin\AppData\Roaming\Itxyn\duig.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Roaming\Itxyn\duig.exe"C:\Users\Admin\AppData\Roaming\Itxyn\duig.exe"5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1836 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1964 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:436 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1072 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1124 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1696 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:980 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1224 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1804 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DBZ2852.bat"4⤵
- Deletes itself
PID:1856
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1252
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1152
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1228
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5b0385ad99f59f5c02a4cbfc14e6c8a57
SHA11a150b288dae39d7f86cb580d1199eee8e5781b2
SHA256e6ff5473e4f72541d84c5fc3cb3ae1460e38b4224e0feabec6c3b7564fe91e4c
SHA512b965d4ead87a8f861f192436489526ffc906f61b921f8f2a27849914c02282c246c506eb7498cf3fa5c061935d0bb17a3dc38c89856ae1867bd7fc2643e5566f
-
Filesize
503KB
MD51de3c30d14a26fa2f1689e682667eae7
SHA1902b52018eb457ab8be1fb754538747cd495495e
SHA256cccc52741f2718e0bee909eb598683b3ee7f842579fdca95918e03f111610c97
SHA5126035d9289070317d251728eb8341109213b0c7532b087e3fedbdf4294e34f81c55348c12f49564a04557178d0eb05d94a1d663e6572f86228012b06383cd1885
-
Filesize
503KB
MD51de3c30d14a26fa2f1689e682667eae7
SHA1902b52018eb457ab8be1fb754538747cd495495e
SHA256cccc52741f2718e0bee909eb598683b3ee7f842579fdca95918e03f111610c97
SHA5126035d9289070317d251728eb8341109213b0c7532b087e3fedbdf4294e34f81c55348c12f49564a04557178d0eb05d94a1d663e6572f86228012b06383cd1885
-
Filesize
503KB
MD51de3c30d14a26fa2f1689e682667eae7
SHA1902b52018eb457ab8be1fb754538747cd495495e
SHA256cccc52741f2718e0bee909eb598683b3ee7f842579fdca95918e03f111610c97
SHA5126035d9289070317d251728eb8341109213b0c7532b087e3fedbdf4294e34f81c55348c12f49564a04557178d0eb05d94a1d663e6572f86228012b06383cd1885
-
Filesize
503KB
MD51de3c30d14a26fa2f1689e682667eae7
SHA1902b52018eb457ab8be1fb754538747cd495495e
SHA256cccc52741f2718e0bee909eb598683b3ee7f842579fdca95918e03f111610c97
SHA5126035d9289070317d251728eb8341109213b0c7532b087e3fedbdf4294e34f81c55348c12f49564a04557178d0eb05d94a1d663e6572f86228012b06383cd1885
-
Filesize
503KB
MD51de3c30d14a26fa2f1689e682667eae7
SHA1902b52018eb457ab8be1fb754538747cd495495e
SHA256cccc52741f2718e0bee909eb598683b3ee7f842579fdca95918e03f111610c97
SHA5126035d9289070317d251728eb8341109213b0c7532b087e3fedbdf4294e34f81c55348c12f49564a04557178d0eb05d94a1d663e6572f86228012b06383cd1885