Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe
-
Size
81KB
-
MD5
30cf084eeeb56ee7c01a2e214f348d76
-
SHA1
2b43dfd8c398a4925ea66653d351f84af669d3e3
-
SHA256
917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62
-
SHA512
f94dc5a93122999ad35dd3c07bc0db08cfd88ad0e4dc55c7768b3d75e441f290d5a259237cf5401cbc407d50223eb513b03eb3d45f891872b0ff49be2f423f16
-
SSDEEP
384:PJG14lR/NpKAN+UJfo8vJh/7neuwyv3ZUKcreuDreuwyv3ZUKcreuDz:RFtFe8vJtDeunUreufeunUreuf
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsys = "C:\\Windows\\system32\\winsock.exe /wininit" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win32 = "C:\\Windows\\system32\\winkernel32.exe /system" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Micromerde Windobe Xnaze" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Vous utilisez Super Winmerde" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LogonPrompt = "Entre ton passss !" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Welcome = "Salut pti blairo !" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winsock.exe attrib.exe File created C:\Windows\SysWOW64\winkernel32.exe 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe File opened for modification C:\Windows\SysWOW64\winkernel32.exe attrib.exe File created C:\Windows\SysWOW64\winsock.exe 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "Vive Les Marmottes qui chantent !" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.webfmdr.com/B/" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 576 shutdown.exe Token: SeRemoteShutdownPrivilege 576 shutdown.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1700 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 27 PID 1368 wrote to memory of 1700 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 27 PID 1368 wrote to memory of 1700 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 27 PID 1368 wrote to memory of 1700 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 27 PID 1700 wrote to memory of 976 1700 cmd.exe 29 PID 1700 wrote to memory of 976 1700 cmd.exe 29 PID 1700 wrote to memory of 976 1700 cmd.exe 29 PID 1700 wrote to memory of 976 1700 cmd.exe 29 PID 1368 wrote to memory of 892 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 30 PID 1368 wrote to memory of 892 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 30 PID 1368 wrote to memory of 892 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 30 PID 1368 wrote to memory of 892 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 30 PID 892 wrote to memory of 1504 892 cmd.exe 32 PID 892 wrote to memory of 1504 892 cmd.exe 32 PID 892 wrote to memory of 1504 892 cmd.exe 32 PID 892 wrote to memory of 1504 892 cmd.exe 32 PID 1368 wrote to memory of 664 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 33 PID 1368 wrote to memory of 664 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 33 PID 1368 wrote to memory of 664 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 33 PID 1368 wrote to memory of 664 1368 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe 33 PID 664 wrote to memory of 576 664 cmd.exe 35 PID 664 wrote to memory of 576 664 cmd.exe 35 PID 664 wrote to memory of 576 664 cmd.exe 35 PID 664 wrote to memory of 576 664 cmd.exe 35 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoColorChoice = "1" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoSizeChoice = "1" 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 976 attrib.exe 1504 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe"C:\Users\Admin\AppData\Local\Temp\917fa5baf49e22e84efaded9489bae51466b4be3823118dadd5f3d6835b6ac62.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "C:\Windows\system32\winsock.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\attrib.exeattrib +h +s "C:\Windows\system32\winsock.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "C:\Windows\system32\winkernel32.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\attrib.exeattrib +h +s "C:\Windows\system32\winkernel32.exe"3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shutdown -r2⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r3⤵
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1744
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD538d23b46f6efcba0291d0fcd8749b9c4
SHA122c78b4a3ca543dddb7fad0df9bc8e35a1a13052
SHA25615345a6500084d3f25591384991a183f7757563eee03b337ccafa84bd3249392
SHA512b2251e39da2e6a0932509d1129ef4d5a3494b758550e85dc0e6fdce584f60f638a52dc9744dc0833e34b7961a15c7fda4c66ca5ceca4e10ff04982238be62a53
-
Filesize
83KB
MD51ebbff278064ece069d0d2024c802401
SHA1559aaef53f89b25a4cb15f54fea4ce57d2305dea
SHA256a9f5debfffb59f5ca5c478cdc252683623ce4d7de7603b0219f51e7edfb351d9
SHA512281564e3ba114a6d5fb64f47ef1b882e85c099e031bff906839f6e28075431eee56eeb40d7b1e25786ce4d8df40bf1de6b8451f67393eed64f0327b4eeb9bd85