Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:30
Static task
static1
Behavioral task
behavioral1
Sample
fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe
Resource
win10v2004-20220812-en
General
-
Target
fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe
-
Size
376KB
-
MD5
344445e567c46fa7afb6a53bfb13ac3f
-
SHA1
d610a4649d9c47fb2efe12b16158ba5262398bdd
-
SHA256
fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642
-
SHA512
537205e5ad00625eebad5dddeda4b2cceb228be09d6a4209e9fb5b490560ffcb86fe280235ca37653fb8df94463aad6a30b5062a3a661c9826f5c12f61a92f63
-
SSDEEP
6144:KAwhHMZ1iPD9TRvA6HRpLCd2+CavQFX152HhPtH:K/hi1ipTu6xwpIFD2Ft
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exepid process 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exeExplorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\WegbaQfopi = "regsvr32.exe \"C:\\ProgramData\\WegbaQfopi\\WegbaQfopi.dat\"" fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\WegbaQfopi = "regsvr32.exe \"C:\\ProgramData\\WegbaQfopi\\WegbaQfopi.dat\"" Explorer.EXE -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" Explorer.EXE -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" Explorer.EXE -
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\TabProcGrowth = "0" Explorer.EXE -
Modifies registry class 6 IoCs
Processes:
Explorer.EXEfcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{1AAC033C-066C-44ED-B52C-156305541963} Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{1AAC033C-066C-44ED-B52C-156305541963}\{707D348B-42C0-45B4-BE11-337A513111E7} = ae017140 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{20104D6F-423F-45B5-8B94-276431210C0C}\#cert = 31 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{20104D6F-423F-45B5-8B94-276431210C0C} fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{20104D6F-423F-45B5-8B94-276431210C0C}\#sd = 433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c54656d705c666363613430386564386435316263356662383839303662323165633232336132376464663237396432613666303538396163353733356330643738653634322e65786500 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{20104D6F-423F-45B5-8B94-276431210C0C} Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exewmiprvse.exepid process 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe 1956 wmiprvse.exe 1956 wmiprvse.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exeExplorer.EXEdescription pid process Token: SeCreateGlobalPrivilege 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe Token: SeDebugPrivilege 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe Token: SeCreateGlobalPrivilege 1220 Explorer.EXE Token: SeShutdownPrivilege 1220 Explorer.EXE Token: SeDebugPrivilege 1220 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exepid process 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exedescription pid process target process PID 1944 wrote to memory of 1028 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe spoolsv.exe PID 1944 wrote to memory of 1028 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe spoolsv.exe PID 1944 wrote to memory of 1220 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe Explorer.EXE PID 1944 wrote to memory of 1220 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe Explorer.EXE PID 1944 wrote to memory of 984 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe sppsvc.exe PID 1944 wrote to memory of 984 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe sppsvc.exe PID 1944 wrote to memory of 1668 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe WMIADAP.EXE PID 1944 wrote to memory of 1668 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe WMIADAP.EXE PID 1944 wrote to memory of 1956 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe wmiprvse.exe PID 1944 wrote to memory of 1956 1944 fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe wmiprvse.exe
Processes
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1668
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe"C:\Users\Admin\AppData\Local\Temp\fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1944
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD5b4b7a9a783dbe7cc2bb0559ca9d48d58
SHA155e7adb825f6ef6c61494e19efaf9027f6f8a6cc
SHA2560102c0f39d8c7843cd734cec173c36d03218f5f08d52a30635dbb2aa77674806
SHA51276b0bd2217fb8207baaf752180c001a2ec2f3436c594d37a7c2e8305806168d92559bd3fe544950425d9af55786626800aecc3e154daef5c1a86f46a260bb7ba
-
Filesize
253KB
MD5b4b7a9a783dbe7cc2bb0559ca9d48d58
SHA155e7adb825f6ef6c61494e19efaf9027f6f8a6cc
SHA2560102c0f39d8c7843cd734cec173c36d03218f5f08d52a30635dbb2aa77674806
SHA51276b0bd2217fb8207baaf752180c001a2ec2f3436c594d37a7c2e8305806168d92559bd3fe544950425d9af55786626800aecc3e154daef5c1a86f46a260bb7ba