Analysis
-
max time kernel
188s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 13:57
Static task
static1
Behavioral task
behavioral1
Sample
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe
Resource
win10v2004-20220812-en
General
-
Target
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe
-
Size
98KB
-
MD5
00748908d76108512f23f75a06121abe
-
SHA1
f9337ed78937699f66ad3216765c20b270b61fbd
-
SHA256
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a
-
SHA512
93b6a33b3fd3d9b1e741ef87b0616c311235f445a1a4eae45159e7fa389538a6879b0d9d116482281d063550bbdd388b9ecba4c78446e7f645a4d4caf1850ff8
-
SSDEEP
3072:8Lk395hYXJxIL9ZslcFt0dAXNCJuhOP7BTmTQh5:8QqbILMlcFt0WCIIEQz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
imopgmi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\DownloadSave\\imopgmi.exe" imopgmi.exe -
Executes dropped EXE 4 IoCs
Processes:
kuaiboa.exe5015.exeimopgmi.exe imopgmi.exepid process 1400 kuaiboa.exe 1156 5015.exe 360 imopgmi.exe 1108 imopgmi.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\kuaiboa.exe upx \Users\Admin\AppData\Local\Temp\kuaiboa.exe upx C:\Users\Admin\AppData\Local\Temp\kuaiboa.exe upx behavioral1/memory/1400-65-0x0000000000400000-0x0000000000415000-memory.dmp upx \Users\Admin\AppData\Local\Temp\kuaiboa.exe upx \Users\Admin\AppData\Local\Temp\kuaiboa.exe upx \Users\Admin\AppData\Local\Temp\kuaiboa.exe upx C:\Users\Admin\AppData\Local\Temp\kuaiboa.exe upx -
Loads dropped DLL 15 IoCs
Processes:
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exekuaiboa.exe5015.exeimopgmi.exe imopgmi.exepid process 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 1400 kuaiboa.exe 1400 kuaiboa.exe 1400 kuaiboa.exe 1156 5015.exe 1156 5015.exe 1156 5015.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 1108 imopgmi.exe 1108 imopgmi.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
imopgmi.exedescription ioc process File opened (read-only) \??\O: imopgmi.exe File opened (read-only) \??\Q: imopgmi.exe File opened (read-only) \??\P: imopgmi.exe File opened (read-only) \??\N: imopgmi.exe File opened (read-only) \??\J: imopgmi.exe File opened (read-only) \??\Z: imopgmi.exe File opened (read-only) \??\Y: imopgmi.exe File opened (read-only) \??\T: imopgmi.exe File opened (read-only) \??\S: imopgmi.exe File opened (read-only) \??\B: imopgmi.exe File opened (read-only) \??\R: imopgmi.exe File opened (read-only) \??\M: imopgmi.exe File opened (read-only) \??\L: imopgmi.exe File opened (read-only) \??\X: imopgmi.exe File opened (read-only) \??\W: imopgmi.exe File opened (read-only) \??\V: imopgmi.exe File opened (read-only) \??\U: imopgmi.exe File opened (read-only) \??\F: imopgmi.exe File opened (read-only) \??\E: imopgmi.exe File opened (read-only) \??\K: imopgmi.exe File opened (read-only) \??\I: imopgmi.exe File opened (read-only) \??\H: imopgmi.exe File opened (read-only) \??\G: imopgmi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
5015.exeimopgmi.exepid process 1156 5015.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
imopgmi.exe imopgmi.exedescription pid process Token: SeIncBasePriorityPrivilege 360 imopgmi.exe Token: SeIncBasePriorityPrivilege 1108 imopgmi.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
kuaiboa.exe5015.exeimopgmi.exe imopgmi.exepid process 1400 kuaiboa.exe 1156 5015.exe 1400 kuaiboa.exe 1400 kuaiboa.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 360 imopgmi.exe 1108 imopgmi.exe 1108 imopgmi.exe 360 imopgmi.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe5015.exeimopgmi.exedescription pid process target process PID 588 wrote to memory of 1400 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe kuaiboa.exe PID 588 wrote to memory of 1400 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe kuaiboa.exe PID 588 wrote to memory of 1400 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe kuaiboa.exe PID 588 wrote to memory of 1400 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe kuaiboa.exe PID 588 wrote to memory of 1400 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe kuaiboa.exe PID 588 wrote to memory of 1400 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe kuaiboa.exe PID 588 wrote to memory of 1400 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe kuaiboa.exe PID 588 wrote to memory of 1156 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 5015.exe PID 588 wrote to memory of 1156 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 5015.exe PID 588 wrote to memory of 1156 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 5015.exe PID 588 wrote to memory of 1156 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 5015.exe PID 588 wrote to memory of 1156 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 5015.exe PID 588 wrote to memory of 1156 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 5015.exe PID 588 wrote to memory of 1156 588 1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe 5015.exe PID 1156 wrote to memory of 360 1156 5015.exe imopgmi.exe PID 1156 wrote to memory of 360 1156 5015.exe imopgmi.exe PID 1156 wrote to memory of 360 1156 5015.exe imopgmi.exe PID 1156 wrote to memory of 360 1156 5015.exe imopgmi.exe PID 1156 wrote to memory of 360 1156 5015.exe imopgmi.exe PID 1156 wrote to memory of 360 1156 5015.exe imopgmi.exe PID 1156 wrote to memory of 360 1156 5015.exe imopgmi.exe PID 360 wrote to memory of 1108 360 imopgmi.exe imopgmi.exe PID 360 wrote to memory of 1108 360 imopgmi.exe imopgmi.exe PID 360 wrote to memory of 1108 360 imopgmi.exe imopgmi.exe PID 360 wrote to memory of 1108 360 imopgmi.exe imopgmi.exe PID 360 wrote to memory of 1108 360 imopgmi.exe imopgmi.exe PID 360 wrote to memory of 1108 360 imopgmi.exe imopgmi.exe PID 360 wrote to memory of 1108 360 imopgmi.exe imopgmi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe"C:\Users\Admin\AppData\Local\Temp\1d7b34e451017cab9eb200dbbd19150b13dd015193deb691027acad5ae2c3d1a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\kuaiboa.exe"C:\Users\Admin\AppData\Local\Temp\kuaiboa.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\5015.exe"C:\Users\Admin\AppData\Local\Temp\5015.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\ProgramData\DownloadSave\imopgmi.exe"C:\ProgramData\DownloadSave\imopgmi.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\ProgramData\DownloadSave\ imopgmi.exe"C:\ProgramData\DownloadSave\ imopgmi.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
260B
MD5624d1d7dfa2912638ae39817bce776c2
SHA1f13712f0c7d68ff97c147f061aabb015c450211e
SHA25651e01b42c8c3a6126f07b80f53a8e834a116353a816b3eee74d528b1edaaed15
SHA512fdcccde861fcf1d1cd29214666ac5cbf28d39b6eab8048d33ae113e28877cc032e4b64fbdf916842b64425c231ea5ade578a1f3c2d47aee90fd44bfa9696896a
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
32KB
MD56ce59e1bb6ca521b3ee118508a6a3030
SHA130bcf64377a2716f5dc6cc111cab0391eb113802
SHA25601a3df9b5bd06c67547d1491377ff941cebad25487ee04e40d48adc3cb3d9521
SHA512ef66fd1295c692081f46eecc0adc415c4709f2862aed8d9178e9918f70c6f265a98b214b9f0e70e7366acdedc75f946b55209a499939f4be9febe09de776f766
-
Filesize
32KB
MD56ce59e1bb6ca521b3ee118508a6a3030
SHA130bcf64377a2716f5dc6cc111cab0391eb113802
SHA25601a3df9b5bd06c67547d1491377ff941cebad25487ee04e40d48adc3cb3d9521
SHA512ef66fd1295c692081f46eecc0adc415c4709f2862aed8d9178e9918f70c6f265a98b214b9f0e70e7366acdedc75f946b55209a499939f4be9febe09de776f766
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
85KB
MD57f194b0222fb68ba977371144a8712d6
SHA11416935af16b097f771df457b31c3c91ad61273a
SHA2564ee34ffd07363be307ef2ae092abc8ba36894737284755d3d9a526d349f96136
SHA51222c73ec7fbd5a4348ef0694c829973e11ab2955d48f115aedaf849fba247185c75aa20208f2743d696f0a2657206a4b5f41d7fcb7e9d2be58593ab3f9ca9b448
-
Filesize
32KB
MD56ce59e1bb6ca521b3ee118508a6a3030
SHA130bcf64377a2716f5dc6cc111cab0391eb113802
SHA25601a3df9b5bd06c67547d1491377ff941cebad25487ee04e40d48adc3cb3d9521
SHA512ef66fd1295c692081f46eecc0adc415c4709f2862aed8d9178e9918f70c6f265a98b214b9f0e70e7366acdedc75f946b55209a499939f4be9febe09de776f766
-
Filesize
32KB
MD56ce59e1bb6ca521b3ee118508a6a3030
SHA130bcf64377a2716f5dc6cc111cab0391eb113802
SHA25601a3df9b5bd06c67547d1491377ff941cebad25487ee04e40d48adc3cb3d9521
SHA512ef66fd1295c692081f46eecc0adc415c4709f2862aed8d9178e9918f70c6f265a98b214b9f0e70e7366acdedc75f946b55209a499939f4be9febe09de776f766
-
Filesize
32KB
MD56ce59e1bb6ca521b3ee118508a6a3030
SHA130bcf64377a2716f5dc6cc111cab0391eb113802
SHA25601a3df9b5bd06c67547d1491377ff941cebad25487ee04e40d48adc3cb3d9521
SHA512ef66fd1295c692081f46eecc0adc415c4709f2862aed8d9178e9918f70c6f265a98b214b9f0e70e7366acdedc75f946b55209a499939f4be9febe09de776f766
-
Filesize
32KB
MD56ce59e1bb6ca521b3ee118508a6a3030
SHA130bcf64377a2716f5dc6cc111cab0391eb113802
SHA25601a3df9b5bd06c67547d1491377ff941cebad25487ee04e40d48adc3cb3d9521
SHA512ef66fd1295c692081f46eecc0adc415c4709f2862aed8d9178e9918f70c6f265a98b214b9f0e70e7366acdedc75f946b55209a499939f4be9febe09de776f766
-
Filesize
32KB
MD56ce59e1bb6ca521b3ee118508a6a3030
SHA130bcf64377a2716f5dc6cc111cab0391eb113802
SHA25601a3df9b5bd06c67547d1491377ff941cebad25487ee04e40d48adc3cb3d9521
SHA512ef66fd1295c692081f46eecc0adc415c4709f2862aed8d9178e9918f70c6f265a98b214b9f0e70e7366acdedc75f946b55209a499939f4be9febe09de776f766
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667