Analysis
-
max time kernel
153s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe
Resource
win10v2004-20221111-en
General
-
Target
c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe
-
Size
233KB
-
MD5
4cd8471d4b51c16727560afa50d57359
-
SHA1
ca34cad2e2052c696844d05422bb4e980b1d691a
-
SHA256
c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f
-
SHA512
a941a78c9464f473c63e6227de304d283007b698938f527200d80fc90317d96352502736d9ba62fe384bba2a31c39c71c272e9fdd4c8ee5d558c450e2baec990
-
SSDEEP
6144:DhczSK0xst01yWrWfZFykIn/dTTl+nqQp6SCDNYnrHb:+zpm1ZSfZFWVQcSfnDb
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1748 igo.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/1020-67-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/memory/1020-72-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/memory/1748-87-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/memory/1748-89-0x0000000000400000-0x00000000004F1000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1748 igo.exe -
Loads dropped DLL 2 IoCs
pid Process 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1804 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe Token: 33 2028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2028 AUDIODG.EXE Token: 33 2028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2028 AUDIODG.EXE Token: SeShutdownPrivilege 1804 explorer.exe Token: SeShutdownPrivilege 1804 explorer.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe 1804 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1020 wrote to memory of 1748 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 27 PID 1020 wrote to memory of 1748 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 27 PID 1020 wrote to memory of 1748 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 27 PID 1020 wrote to memory of 1748 1020 c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe"C:\Users\Admin\AppData\Local\Temp\c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\igo.exe"C:\Users\Admin\AppData\Local\igo.exe" -gav C:\Users\Admin\AppData\Local\Temp\c7fc42b14b4086d1bb74e315c694f512943528fb34e7607dbc529ce7bf79fc7f.exe2⤵
- Executes dropped EXE
- Deletes itself
PID:1748
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1804
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4801⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD5effa6b8eec2d5e6e83aa6ee31f422b0e
SHA17d82ec57980c855810462ba9e9b3b6ec400f8829
SHA256613ce5914ab693be064b13cdb2445bfb16249bbac9e63c12e500dd2450230869
SHA51211529a39d034564b57526755518db43a288dc511455c97e550a31a006f5b1a4b14b36af6d8d4d15c67478a44a11bb7be75063226706c25bf440e1874f673e574
-
Filesize
233KB
MD5effa6b8eec2d5e6e83aa6ee31f422b0e
SHA17d82ec57980c855810462ba9e9b3b6ec400f8829
SHA256613ce5914ab693be064b13cdb2445bfb16249bbac9e63c12e500dd2450230869
SHA51211529a39d034564b57526755518db43a288dc511455c97e550a31a006f5b1a4b14b36af6d8d4d15c67478a44a11bb7be75063226706c25bf440e1874f673e574
-
Filesize
233KB
MD5effa6b8eec2d5e6e83aa6ee31f422b0e
SHA17d82ec57980c855810462ba9e9b3b6ec400f8829
SHA256613ce5914ab693be064b13cdb2445bfb16249bbac9e63c12e500dd2450230869
SHA51211529a39d034564b57526755518db43a288dc511455c97e550a31a006f5b1a4b14b36af6d8d4d15c67478a44a11bb7be75063226706c25bf440e1874f673e574
-
Filesize
233KB
MD5effa6b8eec2d5e6e83aa6ee31f422b0e
SHA17d82ec57980c855810462ba9e9b3b6ec400f8829
SHA256613ce5914ab693be064b13cdb2445bfb16249bbac9e63c12e500dd2450230869
SHA51211529a39d034564b57526755518db43a288dc511455c97e550a31a006f5b1a4b14b36af6d8d4d15c67478a44a11bb7be75063226706c25bf440e1874f673e574