Analysis
-
max time kernel
58s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 17:28
Static task
static1
Behavioral task
behavioral1
Sample
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe
Resource
win7-20221111-en
General
-
Target
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe
-
Size
1.2MB
-
MD5
22fde0753062a2e7921d59fe64d6f7cc
-
SHA1
c6f1d83d64cfa541ea907d527bc79c698d337643
-
SHA256
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19
-
SHA512
a1e024571711dab2ca9eb33f9b8371eb277cd1b708668c6b7c87ed41beec640151f2b1f775b640ec8139b598c4b298fe5bae2d2b4253142fe7fdec3f2e2aaf04
-
SSDEEP
24576:LDFq/8wVCMozowl4as1Y+zijEJq95/T+f8hDZ9VMMwsR+jlL79VJoLwl/Q:LDFq/8KC1TUY+ziwq9ty0hDHVqJjB9Q/
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{S5AXLMRE-Q56P-4663-J742-I26482K73LJM} cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{S5AXLMRE-Q56P-4663-J742-I26482K73LJM}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe Restart" cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe -
Processes:
resource yara_rule behavioral1/memory/1520-71-0x0000000005120000-0x00000000051BD000-memory.dmp upx behavioral1/memory/1520-72-0x0000000005750000-0x00000000057ED000-memory.dmp upx behavioral1/memory/1520-73-0x00000000058F0000-0x000000000598D000-memory.dmp upx behavioral1/memory/1520-74-0x0000000005A90000-0x0000000005B2D000-memory.dmp upx behavioral1/memory/1520-75-0x0000000005C30000-0x0000000005CCD000-memory.dmp upx behavioral1/memory/1520-76-0x0000000005DD0000-0x0000000005E6D000-memory.dmp upx behavioral1/memory/1520-77-0x0000000005F70000-0x000000000600D000-memory.dmp upx behavioral1/memory/1520-79-0x0000000005120000-0x00000000051BD000-memory.dmp upx behavioral1/memory/1520-80-0x0000000005750000-0x00000000057ED000-memory.dmp upx behavioral1/memory/1520-81-0x00000000058F0000-0x000000000598D000-memory.dmp upx behavioral1/memory/1520-82-0x0000000005A90000-0x0000000005B2D000-memory.dmp upx behavioral1/memory/1520-83-0x0000000005C30000-0x0000000005CCD000-memory.dmp upx behavioral1/memory/1520-85-0x0000000005F70000-0x000000000600D000-memory.dmp upx behavioral1/memory/1520-84-0x0000000005DD0000-0x0000000005E6D000-memory.dmp upx -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Wine cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe -
Loads dropped DLL 3 IoCs
Processes:
WerFault.exepid process 960 WerFault.exe 960 WerFault.exe 960 WerFault.exe -
Processes:
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exedescription ioc process File opened for modification \??\PhysicalDrive0 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exepid process 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 960 1520 WerFault.exe cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exepid process 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exedescription pid process Token: SeDebugPrivilege 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe Token: SeDebugPrivilege 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe Token: SeDebugPrivilege 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe Token: SeDebugPrivilege 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exedescription pid process target process PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe PID 1520 wrote to memory of 1172 1520 cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe"C:\Users\Admin\AppData\Local\Temp\cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exe"1⤵
- Modifies Installed Components in the registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 7242⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exeFilesize
1.2MB
MD522fde0753062a2e7921d59fe64d6f7cc
SHA1c6f1d83d64cfa541ea907d527bc79c698d337643
SHA256cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19
SHA512a1e024571711dab2ca9eb33f9b8371eb277cd1b708668c6b7c87ed41beec640151f2b1f775b640ec8139b598c4b298fe5bae2d2b4253142fe7fdec3f2e2aaf04
-
\Users\Admin\AppData\Local\Temp\cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exeFilesize
1.2MB
MD522fde0753062a2e7921d59fe64d6f7cc
SHA1c6f1d83d64cfa541ea907d527bc79c698d337643
SHA256cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19
SHA512a1e024571711dab2ca9eb33f9b8371eb277cd1b708668c6b7c87ed41beec640151f2b1f775b640ec8139b598c4b298fe5bae2d2b4253142fe7fdec3f2e2aaf04
-
\Users\Admin\AppData\Local\Temp\cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19.exeFilesize
1.2MB
MD522fde0753062a2e7921d59fe64d6f7cc
SHA1c6f1d83d64cfa541ea907d527bc79c698d337643
SHA256cd8fdc43e7b00d9bd34d4f6fb477e66968b302692e8ccf040e6f180620ac5c19
SHA512a1e024571711dab2ca9eb33f9b8371eb277cd1b708668c6b7c87ed41beec640151f2b1f775b640ec8139b598c4b298fe5bae2d2b4253142fe7fdec3f2e2aaf04
-
memory/960-78-0x0000000000000000-mapping.dmp
-
memory/1520-72-0x0000000005750000-0x00000000057ED000-memory.dmpFilesize
628KB
-
memory/1520-81-0x00000000058F0000-0x000000000598D000-memory.dmpFilesize
628KB
-
memory/1520-54-0x0000000000400000-0x000000000063C000-memory.dmpFilesize
2.2MB
-
memory/1520-73-0x00000000058F0000-0x000000000598D000-memory.dmpFilesize
628KB
-
memory/1520-74-0x0000000005A90000-0x0000000005B2D000-memory.dmpFilesize
628KB
-
memory/1520-75-0x0000000005C30000-0x0000000005CCD000-memory.dmpFilesize
628KB
-
memory/1520-76-0x0000000005DD0000-0x0000000005E6D000-memory.dmpFilesize
628KB
-
memory/1520-77-0x0000000005F70000-0x000000000600D000-memory.dmpFilesize
628KB
-
memory/1520-63-0x0000000075C81000-0x0000000075C83000-memory.dmpFilesize
8KB
-
memory/1520-79-0x0000000005120000-0x00000000051BD000-memory.dmpFilesize
628KB
-
memory/1520-80-0x0000000005750000-0x00000000057ED000-memory.dmpFilesize
628KB
-
memory/1520-71-0x0000000005120000-0x00000000051BD000-memory.dmpFilesize
628KB
-
memory/1520-82-0x0000000005A90000-0x0000000005B2D000-memory.dmpFilesize
628KB
-
memory/1520-83-0x0000000005C30000-0x0000000005CCD000-memory.dmpFilesize
628KB
-
memory/1520-85-0x0000000005F70000-0x000000000600D000-memory.dmpFilesize
628KB
-
memory/1520-84-0x0000000005DD0000-0x0000000005E6D000-memory.dmpFilesize
628KB
-
memory/1520-86-0x0000000000400000-0x000000000063C000-memory.dmpFilesize
2.2MB
-
memory/1520-65-0x0000000004520000-0x0000000004589000-memory.dmpFilesize
420KB
-
memory/1520-64-0x0000000000400000-0x000000000063C000-memory.dmpFilesize
2.2MB
-
memory/1520-89-0x0000000000400000-0x000000000063C000-memory.dmpFilesize
2.2MB
-
memory/1520-56-0x0000000010410000-0x0000000010479000-memory.dmpFilesize
420KB