Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 13:00
Static task
static1
Behavioral task
behavioral1
Sample
2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe
Resource
win10v2004-20220901-en
General
-
Target
2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe
-
Size
204KB
-
MD5
e1551ae30787dc1917a3931c0a78eead
-
SHA1
7fa225695fb6a7cf8ed1fe9b6273dc6d2d4e49d6
-
SHA256
2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99
-
SHA512
5cf6dd99953ff002cb40f2a3216c23ebb4bd7bdc2b6128c361dc3efaa1e5950bbebfcd7a5a653cfb3698f1df6034ea46c80d6e0c4d7b6d480f92a31d16ee49d2
-
SSDEEP
6144:dfH74N0nUFxFFWYxofKx/8GcsMBvMCmJpw:pb5ngLFE+esTCmE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1288 ikenl.exe 604 ikenl.exe -
Deletes itself 1 IoCs
pid Process 1940 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run ikenl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{45820DC6-F01B-0DB9-C0DB-DAA71D23FA3D} = "C:\\Users\\Admin\\AppData\\Roaming\\Ivuvc\\ikenl.exe" ikenl.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe File opened for modification \??\PhysicalDrive0 ikenl.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1968 set thread context of 960 1968 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 27 PID 1288 set thread context of 604 1288 ikenl.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe 604 ikenl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe Token: SeSecurityPrivilege 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe Token: SeSecurityPrivilege 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 960 1968 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 27 PID 1968 wrote to memory of 960 1968 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 27 PID 1968 wrote to memory of 960 1968 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 27 PID 1968 wrote to memory of 960 1968 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 27 PID 1968 wrote to memory of 960 1968 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 27 PID 1968 wrote to memory of 960 1968 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 27 PID 1968 wrote to memory of 960 1968 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 27 PID 1968 wrote to memory of 960 1968 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 27 PID 1968 wrote to memory of 960 1968 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 27 PID 960 wrote to memory of 1288 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 28 PID 960 wrote to memory of 1288 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 28 PID 960 wrote to memory of 1288 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 28 PID 960 wrote to memory of 1288 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 28 PID 1288 wrote to memory of 604 1288 ikenl.exe 29 PID 1288 wrote to memory of 604 1288 ikenl.exe 29 PID 1288 wrote to memory of 604 1288 ikenl.exe 29 PID 1288 wrote to memory of 604 1288 ikenl.exe 29 PID 1288 wrote to memory of 604 1288 ikenl.exe 29 PID 1288 wrote to memory of 604 1288 ikenl.exe 29 PID 1288 wrote to memory of 604 1288 ikenl.exe 29 PID 1288 wrote to memory of 604 1288 ikenl.exe 29 PID 1288 wrote to memory of 604 1288 ikenl.exe 29 PID 604 wrote to memory of 1140 604 ikenl.exe 13 PID 604 wrote to memory of 1140 604 ikenl.exe 13 PID 604 wrote to memory of 1140 604 ikenl.exe 13 PID 604 wrote to memory of 1140 604 ikenl.exe 13 PID 604 wrote to memory of 1140 604 ikenl.exe 13 PID 604 wrote to memory of 1240 604 ikenl.exe 12 PID 604 wrote to memory of 1240 604 ikenl.exe 12 PID 604 wrote to memory of 1240 604 ikenl.exe 12 PID 604 wrote to memory of 1240 604 ikenl.exe 12 PID 604 wrote to memory of 1240 604 ikenl.exe 12 PID 604 wrote to memory of 1296 604 ikenl.exe 11 PID 604 wrote to memory of 1296 604 ikenl.exe 11 PID 604 wrote to memory of 1296 604 ikenl.exe 11 PID 604 wrote to memory of 1296 604 ikenl.exe 11 PID 604 wrote to memory of 1296 604 ikenl.exe 11 PID 604 wrote to memory of 960 604 ikenl.exe 27 PID 604 wrote to memory of 960 604 ikenl.exe 27 PID 604 wrote to memory of 960 604 ikenl.exe 27 PID 604 wrote to memory of 960 604 ikenl.exe 27 PID 604 wrote to memory of 960 604 ikenl.exe 27 PID 960 wrote to memory of 1940 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 30 PID 960 wrote to memory of 1940 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 30 PID 960 wrote to memory of 1940 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 30 PID 960 wrote to memory of 1940 960 2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe 30 PID 604 wrote to memory of 1940 604 ikenl.exe 30 PID 604 wrote to memory of 1940 604 ikenl.exe 30 PID 604 wrote to memory of 1940 604 ikenl.exe 30 PID 604 wrote to memory of 1940 604 ikenl.exe 30 PID 604 wrote to memory of 1940 604 ikenl.exe 30 PID 604 wrote to memory of 640 604 ikenl.exe 31 PID 604 wrote to memory of 1928 604 ikenl.exe 32 PID 604 wrote to memory of 1928 604 ikenl.exe 32 PID 604 wrote to memory of 1928 604 ikenl.exe 32 PID 604 wrote to memory of 1928 604 ikenl.exe 32 PID 604 wrote to memory of 1928 604 ikenl.exe 32 PID 604 wrote to memory of 1192 604 ikenl.exe 33 PID 604 wrote to memory of 1192 604 ikenl.exe 33 PID 604 wrote to memory of 1192 604 ikenl.exe 33 PID 604 wrote to memory of 1192 604 ikenl.exe 33 PID 604 wrote to memory of 1192 604 ikenl.exe 33 PID 604 wrote to memory of 900 604 ikenl.exe 34 PID 604 wrote to memory of 900 604 ikenl.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe"C:\Users\Admin\AppData\Local\Temp\2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exeC:\Users\Admin\AppData\Local\Temp\2b7d7ce067b9bd88ec725a5be9f1c0773071066df06a878a3a7b7af341e61c99.exe2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\Ivuvc\ikenl.exe"C:\Users\Admin\AppData\Roaming\Ivuvc\ikenl.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Roaming\Ivuvc\ikenl.exeC:\Users\Admin\AppData\Roaming\Ivuvc\ikenl.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:604
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpad87dd0c.bat"3⤵
- Deletes itself
PID:1940
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1296
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1240
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1140
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-594222987-1705384543-1246904202816142774-1906589764-5432774812129558536-74692761"1⤵PID:640
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1928
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1192
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:900
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5b5a386deeafd64ef86da38106ea2b49a
SHA19437ce7c9c49061b7f675c9eba462ef05542400f
SHA2565c666998840880f462769f5f28668823d49aebf1e8430182f059c62286947e5e
SHA512c36c0f8289fbc166478d2b086d243cc1a73250226eef33714a35f14851e74168ea5fe1743ebe6b67bf9a37abbe5e97245eaf73f6545b707cdc5131c3d252c33e
-
Filesize
204KB
MD5b74419611946ac01e9afcaf61c915a35
SHA10cb758b0919b38d445efbcf4346fd12ca493b7c4
SHA256b233427307bcd49b7992ddcb8db89b9ba7f95d4084cefa51a29b6711f4c4f64b
SHA512333aa7caafcd739de0dd56976d11b7e3761dd3b59d5ea2bc5220ff3887b80c3ebc3d13290909011273a85eef63cf139dab79f5fea4b4492a77d86a557f3d3bc3
-
Filesize
204KB
MD5b74419611946ac01e9afcaf61c915a35
SHA10cb758b0919b38d445efbcf4346fd12ca493b7c4
SHA256b233427307bcd49b7992ddcb8db89b9ba7f95d4084cefa51a29b6711f4c4f64b
SHA512333aa7caafcd739de0dd56976d11b7e3761dd3b59d5ea2bc5220ff3887b80c3ebc3d13290909011273a85eef63cf139dab79f5fea4b4492a77d86a557f3d3bc3
-
Filesize
204KB
MD5b74419611946ac01e9afcaf61c915a35
SHA10cb758b0919b38d445efbcf4346fd12ca493b7c4
SHA256b233427307bcd49b7992ddcb8db89b9ba7f95d4084cefa51a29b6711f4c4f64b
SHA512333aa7caafcd739de0dd56976d11b7e3761dd3b59d5ea2bc5220ff3887b80c3ebc3d13290909011273a85eef63cf139dab79f5fea4b4492a77d86a557f3d3bc3
-
Filesize
398B
MD5f6b9fe7dc425fd6f62460ffa8077f1d7
SHA185f72dbe7398edd7d00bae98498b1408252a8315
SHA256cfb91c98a1ca33406b26d59c9a2b1489da98da657e48e4d22ab3b6a5440b7a8c
SHA512f7f72579634acdc86ae60450498f388170f37cdfe661fbe5a7d3ef5641d99041e6030a510672d4f7a3593eeb0f3ed3f4023f6b0c16e2785632dc253759ce76d0
-
Filesize
204KB
MD5b74419611946ac01e9afcaf61c915a35
SHA10cb758b0919b38d445efbcf4346fd12ca493b7c4
SHA256b233427307bcd49b7992ddcb8db89b9ba7f95d4084cefa51a29b6711f4c4f64b
SHA512333aa7caafcd739de0dd56976d11b7e3761dd3b59d5ea2bc5220ff3887b80c3ebc3d13290909011273a85eef63cf139dab79f5fea4b4492a77d86a557f3d3bc3
-
Filesize
204KB
MD5b74419611946ac01e9afcaf61c915a35
SHA10cb758b0919b38d445efbcf4346fd12ca493b7c4
SHA256b233427307bcd49b7992ddcb8db89b9ba7f95d4084cefa51a29b6711f4c4f64b
SHA512333aa7caafcd739de0dd56976d11b7e3761dd3b59d5ea2bc5220ff3887b80c3ebc3d13290909011273a85eef63cf139dab79f5fea4b4492a77d86a557f3d3bc3