Analysis
-
max time kernel
99s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe
Resource
win7-20220812-en
General
-
Target
ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe
-
Size
286KB
-
MD5
53498dc18399969e72d822725a51de4f
-
SHA1
66d13cb69a88262c70250a61cdff34efa9d97c92
-
SHA256
ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958
-
SHA512
be6e5fc813b9a2af3cdc3fe08b4c77a96fff8b661a564ba7b06f64d3f7a4b3a009b2653492273c9b3a0e1ab0709f618578f0350279084982be6001192e3b2e14
-
SSDEEP
6144:og1Ounb2ejB/7oTsjW6rN0Ubg67IlQOPscRueRnqn7:ljVBEAjWseTRnq
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 828 ECA1.tmp -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/1416-55-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1416-57-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1852-65-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1016-79-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\2BD.exe = "C:\\Program Files (x86)\\LP\\3C7E\\2BD.exe" ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\3C7E\2BD.exe ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe File opened for modification C:\Program Files (x86)\LP\3C7E\2BD.exe ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe File opened for modification C:\Program Files (x86)\LP\3C7E\ECA1.tmp ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1472 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 852 msiexec.exe Token: SeTakeOwnershipPrivilege 852 msiexec.exe Token: SeSecurityPrivilege 852 msiexec.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe Token: 33 1884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1884 AUDIODG.EXE Token: 33 1884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1884 AUDIODG.EXE Token: SeShutdownPrivilege 1472 explorer.exe Token: SeShutdownPrivilege 1472 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe 1472 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1852 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 31 PID 1416 wrote to memory of 1852 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 31 PID 1416 wrote to memory of 1852 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 31 PID 1416 wrote to memory of 1852 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 31 PID 1416 wrote to memory of 828 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 33 PID 1416 wrote to memory of 828 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 33 PID 1416 wrote to memory of 828 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 33 PID 1416 wrote to memory of 828 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 33 PID 1416 wrote to memory of 1016 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 34 PID 1416 wrote to memory of 1016 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 34 PID 1416 wrote to memory of 1016 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 34 PID 1416 wrote to memory of 1016 1416 ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe 34 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe"C:\Users\Admin\AppData\Local\Temp\ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exeC:\Users\Admin\AppData\Local\Temp\ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe startC:\Users\Admin\AppData\Roaming\E3E62\72B3C.exe%C:\Users\Admin\AppData\Roaming\E3E622⤵PID:1852
-
-
C:\Program Files (x86)\LP\3C7E\ECA1.tmp"C:\Program Files (x86)\LP\3C7E\ECA1.tmp"2⤵
- Executes dropped EXE
PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exeC:\Users\Admin\AppData\Local\Temp\ddbd836477e90bee0cd2313f241982ab02cfb2532054d8ea1a047cb30d600958.exe startC:\Program Files (x86)\62E93\lvvm.exe%C:\Program Files (x86)\62E932⤵PID:1016
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:852
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1472
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5cb16a66b993b390f22b1d27172b1c6c4
SHA1b1ca81cf610806db8c6b9c3e438bec6dbe322237
SHA256313e3e8871c869a745b1d116e6b8361610690f209fb28498553bada6dac4010a
SHA512a776c7ca7c1a58a5e10c6f926d470b0a725eac07a9e9281f3c6901d32eecc3a19105c7a463972613150d794c64bdef04da29cf0e573367f2c0a92938c36366f8
-
Filesize
102KB
MD5cb16a66b993b390f22b1d27172b1c6c4
SHA1b1ca81cf610806db8c6b9c3e438bec6dbe322237
SHA256313e3e8871c869a745b1d116e6b8361610690f209fb28498553bada6dac4010a
SHA512a776c7ca7c1a58a5e10c6f926d470b0a725eac07a9e9281f3c6901d32eecc3a19105c7a463972613150d794c64bdef04da29cf0e573367f2c0a92938c36366f8
-
Filesize
102KB
MD5cb16a66b993b390f22b1d27172b1c6c4
SHA1b1ca81cf610806db8c6b9c3e438bec6dbe322237
SHA256313e3e8871c869a745b1d116e6b8361610690f209fb28498553bada6dac4010a
SHA512a776c7ca7c1a58a5e10c6f926d470b0a725eac07a9e9281f3c6901d32eecc3a19105c7a463972613150d794c64bdef04da29cf0e573367f2c0a92938c36366f8