Analysis
-
max time kernel
146s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 17:04
Static task
static1
Behavioral task
behavioral1
Sample
f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe
Resource
win10v2004-20220812-en
General
-
Target
f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe
-
Size
328KB
-
MD5
8d1c6effa663ddc8782cc4cb56f81fb6
-
SHA1
970cb2ddfcf29b8aad2069b5d8a04be32e94903e
-
SHA256
f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e
-
SHA512
7202e4b9043e466c059a29186727e5e919370d58e699a97c71c93161ae59fa3b25abe0422217e14a75e63b80e8835e7a91b08de3fd729ae7e39750f9f63c62d4
-
SSDEEP
6144:PZw5bV+pDR66lNJzoVjPOKUA8E+ymkv+qFNXzgoEy:qKw6JzWWhm5vz
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
xpx.exepid process 1680 xpx.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
Processes:
xpx.exepid process 1680 xpx.exe -
Loads dropped DLL 2 IoCs
Processes:
f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exepid process 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exepid process 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 1224 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1224 explorer.exe Token: SeShutdownPrivilege 1224 explorer.exe Token: SeShutdownPrivilege 1224 explorer.exe Token: SeShutdownPrivilege 1224 explorer.exe Token: SeShutdownPrivilege 1224 explorer.exe Token: SeShutdownPrivilege 1224 explorer.exe Token: SeShutdownPrivilege 1224 explorer.exe Token: SeShutdownPrivilege 1224 explorer.exe Token: SeShutdownPrivilege 1224 explorer.exe Token: SeShutdownPrivilege 1224 explorer.exe Token: 33 1828 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1828 AUDIODG.EXE Token: 33 1828 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1828 AUDIODG.EXE Token: SeShutdownPrivilege 1224 explorer.exe Token: SeShutdownPrivilege 1224 explorer.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
explorer.exepid process 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe -
Suspicious use of SendNotifyMessage 21 IoCs
Processes:
explorer.exepid process 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe 1224 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exedescription pid process target process PID 1696 wrote to memory of 1680 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe xpx.exe PID 1696 wrote to memory of 1680 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe xpx.exe PID 1696 wrote to memory of 1680 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe xpx.exe PID 1696 wrote to memory of 1680 1696 f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe xpx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe"C:\Users\Admin\AppData\Local\Temp\f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\xpx.exe"C:\Users\Admin\AppData\Local\xpx.exe" -gav C:\Users\Admin\AppData\Local\Temp\f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e.exe2⤵
- Executes dropped EXE
- Deletes itself
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1b01⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\xpx.exeFilesize
328KB
MD58d1c6effa663ddc8782cc4cb56f81fb6
SHA1970cb2ddfcf29b8aad2069b5d8a04be32e94903e
SHA256f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e
SHA5127202e4b9043e466c059a29186727e5e919370d58e699a97c71c93161ae59fa3b25abe0422217e14a75e63b80e8835e7a91b08de3fd729ae7e39750f9f63c62d4
-
\Users\Admin\AppData\Local\xpx.exeFilesize
328KB
MD58d1c6effa663ddc8782cc4cb56f81fb6
SHA1970cb2ddfcf29b8aad2069b5d8a04be32e94903e
SHA256f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e
SHA5127202e4b9043e466c059a29186727e5e919370d58e699a97c71c93161ae59fa3b25abe0422217e14a75e63b80e8835e7a91b08de3fd729ae7e39750f9f63c62d4
-
\Users\Admin\AppData\Local\xpx.exeFilesize
328KB
MD58d1c6effa663ddc8782cc4cb56f81fb6
SHA1970cb2ddfcf29b8aad2069b5d8a04be32e94903e
SHA256f2af7cd5e26a8b937e29f30fdbce846f7dc01616fe711c74da474e284185f68e
SHA5127202e4b9043e466c059a29186727e5e919370d58e699a97c71c93161ae59fa3b25abe0422217e14a75e63b80e8835e7a91b08de3fd729ae7e39750f9f63c62d4
-
memory/1224-72-0x0000000002770000-0x0000000002780000-memory.dmpFilesize
64KB
-
memory/1224-70-0x000007FEFBDD1000-0x000007FEFBDD3000-memory.dmpFilesize
8KB
-
memory/1680-69-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB
-
memory/1680-62-0x0000000000000000-mapping.dmp
-
memory/1680-68-0x0000000001EF0000-0x00000000022FF000-memory.dmpFilesize
4.1MB
-
memory/1680-71-0x0000000001EF0000-0x00000000022FF000-memory.dmpFilesize
4.1MB
-
memory/1696-59-0x0000000000230000-0x000000000034D000-memory.dmpFilesize
1.1MB
-
memory/1696-58-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB
-
memory/1696-57-0x00000000020B0000-0x00000000024BF000-memory.dmpFilesize
4.1MB
-
memory/1696-64-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB
-
memory/1696-54-0x00000000766D1000-0x00000000766D3000-memory.dmpFilesize
8KB
-
memory/1696-56-0x0000000000401000-0x000000000045B000-memory.dmpFilesize
360KB
-
memory/1696-55-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB