Analysis
-
max time kernel
151s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe
Resource
win10v2004-20220812-en
General
-
Target
f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe
-
Size
108KB
-
MD5
192c76e94a971c5951b114ddee7c6152
-
SHA1
4f37224fe8cc8d1fec4037255868fe07718b4909
-
SHA256
f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8
-
SHA512
23efaf9051eb1aece14e4430fe145b4f6ed5677613a93ee4f27d350bfaa85c76238eee4136dd5e413d29297ffccf2628985f89fdaec0171705135cc86449d2c3
-
SSDEEP
1536:qo4Kalkc124vaaVKe1b2YdGSDBEfcCobsVqwRIJjtVInA0qbBlY4Zufpe:qtKa0NiKYdGS1iGcIBInv4BlSfpe
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\c:\windows\mdm.exe = "c:\\windows\\mdm.exe:*:Enabled:Microsoft Firevall Engine" f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe -
Executes dropped EXE 2 IoCs
pid Process 696 mdm.exe 1640 mdm.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1976 netsh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ mdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Firevall Engine = "c:\\windows\\mdm.exe" mdm.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ mdm.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Firevall Engine = "c:\\windows\\mdm.exe" mdm.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1256 set thread context of 1596 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 33 PID 696 set thread context of 1640 696 mdm.exe 41 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\mdm.exe mdm.exe File opened for modification \??\c:\windows\mdm.exe f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe File created \??\c:\windows\mdm.exe f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://enaricles.com" mdm.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 1640 mdm.exe 1640 mdm.exe 1640 mdm.exe 1640 mdm.exe 1640 mdm.exe 1640 mdm.exe 1640 mdm.exe 1640 mdm.exe 1640 mdm.exe 1640 mdm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe Token: SeDebugPrivilege 1640 mdm.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1264 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 27 PID 1256 wrote to memory of 1264 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 27 PID 1256 wrote to memory of 1264 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 27 PID 1256 wrote to memory of 1264 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 27 PID 1264 wrote to memory of 1648 1264 net.exe 29 PID 1264 wrote to memory of 1648 1264 net.exe 29 PID 1264 wrote to memory of 1648 1264 net.exe 29 PID 1264 wrote to memory of 1648 1264 net.exe 29 PID 1256 wrote to memory of 1620 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 30 PID 1256 wrote to memory of 1620 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 30 PID 1256 wrote to memory of 1620 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 30 PID 1256 wrote to memory of 1620 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 30 PID 1620 wrote to memory of 1568 1620 net.exe 32 PID 1620 wrote to memory of 1568 1620 net.exe 32 PID 1620 wrote to memory of 1568 1620 net.exe 32 PID 1620 wrote to memory of 1568 1620 net.exe 32 PID 1256 wrote to memory of 1596 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 33 PID 1256 wrote to memory of 1596 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 33 PID 1256 wrote to memory of 1596 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 33 PID 1256 wrote to memory of 1596 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 33 PID 1256 wrote to memory of 1596 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 33 PID 1256 wrote to memory of 1596 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 33 PID 1256 wrote to memory of 1596 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 33 PID 1256 wrote to memory of 1596 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 33 PID 1256 wrote to memory of 1596 1256 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 33 PID 1596 wrote to memory of 696 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 34 PID 1596 wrote to memory of 696 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 34 PID 1596 wrote to memory of 696 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 34 PID 1596 wrote to memory of 696 1596 f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe 34 PID 696 wrote to memory of 572 696 mdm.exe 35 PID 696 wrote to memory of 572 696 mdm.exe 35 PID 696 wrote to memory of 572 696 mdm.exe 35 PID 696 wrote to memory of 572 696 mdm.exe 35 PID 572 wrote to memory of 520 572 net.exe 37 PID 572 wrote to memory of 520 572 net.exe 37 PID 572 wrote to memory of 520 572 net.exe 37 PID 572 wrote to memory of 520 572 net.exe 37 PID 696 wrote to memory of 1804 696 mdm.exe 38 PID 696 wrote to memory of 1804 696 mdm.exe 38 PID 696 wrote to memory of 1804 696 mdm.exe 38 PID 696 wrote to memory of 1804 696 mdm.exe 38 PID 1804 wrote to memory of 428 1804 net.exe 40 PID 1804 wrote to memory of 428 1804 net.exe 40 PID 1804 wrote to memory of 428 1804 net.exe 40 PID 1804 wrote to memory of 428 1804 net.exe 40 PID 696 wrote to memory of 1640 696 mdm.exe 41 PID 696 wrote to memory of 1640 696 mdm.exe 41 PID 696 wrote to memory of 1640 696 mdm.exe 41 PID 696 wrote to memory of 1640 696 mdm.exe 41 PID 696 wrote to memory of 1640 696 mdm.exe 41 PID 696 wrote to memory of 1640 696 mdm.exe 41 PID 696 wrote to memory of 1640 696 mdm.exe 41 PID 696 wrote to memory of 1640 696 mdm.exe 41 PID 696 wrote to memory of 1640 696 mdm.exe 41 PID 1640 wrote to memory of 1976 1640 mdm.exe 42 PID 1640 wrote to memory of 1976 1640 mdm.exe 42 PID 1640 wrote to memory of 1976 1640 mdm.exe 42 PID 1640 wrote to memory of 1976 1640 mdm.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe"C:\Users\Admin\AppData\Local\Temp\f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\net.exenet stop2⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop3⤵PID:1648
-
-
-
C:\Windows\SysWOW64\net.exenet stop wuauclt.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauclt.exe3⤵PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exeC:\Users\Admin\AppData\Local\Temp\f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8.exe2⤵
- Modifies firewall policy service
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\windows\mdm.exec:\windows\mdm.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\net.exenet stop4⤵
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop5⤵PID:520
-
-
-
C:\Windows\SysWOW64\net.exenet stop wuauclt.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauclt.exe5⤵PID:428
-
-
-
\??\c:\windows\mdm.exec:\windows\mdm.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "c:\windows\mdm.exe" "MSN Messenger" ENABLE5⤵
- Modifies Windows Firewall
PID:1976
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5192c76e94a971c5951b114ddee7c6152
SHA14f37224fe8cc8d1fec4037255868fe07718b4909
SHA256f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8
SHA51223efaf9051eb1aece14e4430fe145b4f6ed5677613a93ee4f27d350bfaa85c76238eee4136dd5e413d29297ffccf2628985f89fdaec0171705135cc86449d2c3
-
Filesize
108KB
MD5192c76e94a971c5951b114ddee7c6152
SHA14f37224fe8cc8d1fec4037255868fe07718b4909
SHA256f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8
SHA51223efaf9051eb1aece14e4430fe145b4f6ed5677613a93ee4f27d350bfaa85c76238eee4136dd5e413d29297ffccf2628985f89fdaec0171705135cc86449d2c3
-
Filesize
108KB
MD5192c76e94a971c5951b114ddee7c6152
SHA14f37224fe8cc8d1fec4037255868fe07718b4909
SHA256f3b8625e35ba798d61208eb9d75e0ca83e0a0c142423a372455476030ef011c8
SHA51223efaf9051eb1aece14e4430fe145b4f6ed5677613a93ee4f27d350bfaa85c76238eee4136dd5e413d29297ffccf2628985f89fdaec0171705135cc86449d2c3