Analysis
-
max time kernel
152s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe
Resource
win10v2004-20220812-en
General
-
Target
b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe
-
Size
570KB
-
MD5
f734fb7c221da8b06a9f048f89158538
-
SHA1
251a023d9a1d4b2a22ddb22f756fc92bd9348732
-
SHA256
b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56
-
SHA512
a32e4b0cb39af565e50a8ad3453b651757998ad79e1a637508b4b07420d10c86179c3cf05c6ac5f122929ad73e7514c54e3e30eed2b836bc361b0226a1700707
-
SSDEEP
12288:YSSalsDSv+bwdr2ND2fn79tWZX1v0TpKXw8Jo0G24gw/PJf:PASGUxCDO7XsFvGoHo7Pt
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\iexplore.exe = "C:\\Users\\Admin\\AppData\\Roaming\\iexplore.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\bot.exe = "C:\\Users\\Admin\\AppData\\Roaming\\bot.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Executes dropped EXE 1 IoCs
pid Process 1516 iexplore.exe -
Loads dropped DLL 2 IoCs
pid Process 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Realtek = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 948 set thread context of 1516 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 28 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1068 reg.exe 1848 reg.exe 1388 reg.exe 576 reg.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe Token: 1 1516 iexplore.exe Token: SeCreateTokenPrivilege 1516 iexplore.exe Token: SeAssignPrimaryTokenPrivilege 1516 iexplore.exe Token: SeLockMemoryPrivilege 1516 iexplore.exe Token: SeIncreaseQuotaPrivilege 1516 iexplore.exe Token: SeMachineAccountPrivilege 1516 iexplore.exe Token: SeTcbPrivilege 1516 iexplore.exe Token: SeSecurityPrivilege 1516 iexplore.exe Token: SeTakeOwnershipPrivilege 1516 iexplore.exe Token: SeLoadDriverPrivilege 1516 iexplore.exe Token: SeSystemProfilePrivilege 1516 iexplore.exe Token: SeSystemtimePrivilege 1516 iexplore.exe Token: SeProfSingleProcessPrivilege 1516 iexplore.exe Token: SeIncBasePriorityPrivilege 1516 iexplore.exe Token: SeCreatePagefilePrivilege 1516 iexplore.exe Token: SeCreatePermanentPrivilege 1516 iexplore.exe Token: SeBackupPrivilege 1516 iexplore.exe Token: SeRestorePrivilege 1516 iexplore.exe Token: SeShutdownPrivilege 1516 iexplore.exe Token: SeDebugPrivilege 1516 iexplore.exe Token: SeAuditPrivilege 1516 iexplore.exe Token: SeSystemEnvironmentPrivilege 1516 iexplore.exe Token: SeChangeNotifyPrivilege 1516 iexplore.exe Token: SeRemoteShutdownPrivilege 1516 iexplore.exe Token: SeUndockPrivilege 1516 iexplore.exe Token: SeSyncAgentPrivilege 1516 iexplore.exe Token: SeEnableDelegationPrivilege 1516 iexplore.exe Token: SeManageVolumePrivilege 1516 iexplore.exe Token: SeImpersonatePrivilege 1516 iexplore.exe Token: SeCreateGlobalPrivilege 1516 iexplore.exe Token: 31 1516 iexplore.exe Token: 32 1516 iexplore.exe Token: 33 1516 iexplore.exe Token: 34 1516 iexplore.exe Token: 35 1516 iexplore.exe Token: SeDebugPrivilege 1516 iexplore.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1516 iexplore.exe 1516 iexplore.exe 1516 iexplore.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 948 wrote to memory of 1516 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 28 PID 948 wrote to memory of 1516 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 28 PID 948 wrote to memory of 1516 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 28 PID 948 wrote to memory of 1516 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 28 PID 948 wrote to memory of 1516 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 28 PID 948 wrote to memory of 1516 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 28 PID 948 wrote to memory of 1516 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 28 PID 948 wrote to memory of 1516 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 28 PID 948 wrote to memory of 1516 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 28 PID 948 wrote to memory of 1292 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 29 PID 948 wrote to memory of 1292 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 29 PID 948 wrote to memory of 1292 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 29 PID 948 wrote to memory of 1292 948 b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe 29 PID 1516 wrote to memory of 1352 1516 iexplore.exe 30 PID 1516 wrote to memory of 1352 1516 iexplore.exe 30 PID 1516 wrote to memory of 1352 1516 iexplore.exe 30 PID 1516 wrote to memory of 1352 1516 iexplore.exe 30 PID 1516 wrote to memory of 876 1516 iexplore.exe 32 PID 1516 wrote to memory of 876 1516 iexplore.exe 32 PID 1516 wrote to memory of 876 1516 iexplore.exe 32 PID 1516 wrote to memory of 876 1516 iexplore.exe 32 PID 1516 wrote to memory of 1560 1516 iexplore.exe 34 PID 1516 wrote to memory of 1560 1516 iexplore.exe 34 PID 1516 wrote to memory of 1560 1516 iexplore.exe 34 PID 1516 wrote to memory of 1560 1516 iexplore.exe 34 PID 1516 wrote to memory of 1356 1516 iexplore.exe 36 PID 1516 wrote to memory of 1356 1516 iexplore.exe 36 PID 1516 wrote to memory of 1356 1516 iexplore.exe 36 PID 1516 wrote to memory of 1356 1516 iexplore.exe 36 PID 1352 wrote to memory of 1068 1352 cmd.exe 37 PID 1352 wrote to memory of 1068 1352 cmd.exe 37 PID 1352 wrote to memory of 1068 1352 cmd.exe 37 PID 1352 wrote to memory of 1068 1352 cmd.exe 37 PID 876 wrote to memory of 1848 876 cmd.exe 39 PID 876 wrote to memory of 1848 876 cmd.exe 39 PID 876 wrote to memory of 1848 876 cmd.exe 39 PID 876 wrote to memory of 1848 876 cmd.exe 39 PID 1560 wrote to memory of 576 1560 cmd.exe 41 PID 1560 wrote to memory of 576 1560 cmd.exe 41 PID 1560 wrote to memory of 576 1560 cmd.exe 41 PID 1560 wrote to memory of 576 1560 cmd.exe 41 PID 1356 wrote to memory of 1388 1356 cmd.exe 40 PID 1356 wrote to memory of 1388 1356 cmd.exe 40 PID 1356 wrote to memory of 1388 1356 cmd.exe 40 PID 1356 wrote to memory of 1388 1356 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe"C:\Users\Admin\AppData\Local\Temp\b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Roaming\iexplore.exeC:\Users\Admin\AppData\Roaming\iexplore.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\iexplore.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\iexplore.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1388
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5642⤵PID:1292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bab201d78c1ac0441fa840d3523a3a94
SHA1fd41144091a1ed69ab0dc60010676775496543e3
SHA256117697d450605d92bee29e5b328044668de441f936bd7db5e12296bd043b65e6
SHA512fc7d46a31b14b2464716fbc70cbd6534aab1c6412caae5fbdedecb2047b646d9e972d7378d87efb31a3ec9ec99254eb05127ccee7df4ff14087ffefdf5adec3b
-
Filesize
1KB
MD5bab201d78c1ac0441fa840d3523a3a94
SHA1fd41144091a1ed69ab0dc60010676775496543e3
SHA256117697d450605d92bee29e5b328044668de441f936bd7db5e12296bd043b65e6
SHA512fc7d46a31b14b2464716fbc70cbd6534aab1c6412caae5fbdedecb2047b646d9e972d7378d87efb31a3ec9ec99254eb05127ccee7df4ff14087ffefdf5adec3b
-
Filesize
1KB
MD5bab201d78c1ac0441fa840d3523a3a94
SHA1fd41144091a1ed69ab0dc60010676775496543e3
SHA256117697d450605d92bee29e5b328044668de441f936bd7db5e12296bd043b65e6
SHA512fc7d46a31b14b2464716fbc70cbd6534aab1c6412caae5fbdedecb2047b646d9e972d7378d87efb31a3ec9ec99254eb05127ccee7df4ff14087ffefdf5adec3b
-
Filesize
1KB
MD5bab201d78c1ac0441fa840d3523a3a94
SHA1fd41144091a1ed69ab0dc60010676775496543e3
SHA256117697d450605d92bee29e5b328044668de441f936bd7db5e12296bd043b65e6
SHA512fc7d46a31b14b2464716fbc70cbd6534aab1c6412caae5fbdedecb2047b646d9e972d7378d87efb31a3ec9ec99254eb05127ccee7df4ff14087ffefdf5adec3b