Analysis
-
max time kernel
206s -
max time network
198s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe
Resource
win10v2004-20221111-en
General
-
Target
f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe
-
Size
288KB
-
MD5
78295195ce50c917ecdfa4e49b108d67
-
SHA1
c679bb9be1f010f8f5f4dcfb4c420b184827caad
-
SHA256
f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550
-
SHA512
42fc7bcaef2e94bb2f84946f0f4dd9dbb029d5de5ca6ff92705f16c00be43c756cd79e062bd38c065a80ecb52af033d4fb1a752ab44d56b23980b8d5c3edd206
-
SSDEEP
6144:hwTiB0lUhepAxq/0Ta+8/iNoC8r6axpu4+pVRo8X1e:hwTiB0uepGq/kwiWvuxVRo8le
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\Content Type = "application/x-msdownload" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\DefaultIcon txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\DefaultIcon\ = "%1" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\txq.exe\" -a \"%1\" %*" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\ = "Application" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" txq.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2016 txq.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2016 txq.exe -
Loads dropped DLL 2 IoCs
pid Process 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" txq.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\DefaultIcon\ = "%1" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\start\command txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\ = "Application" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\ = "exefile" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\txq.exe\" -a \"%1\" %*" txq.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\Content Type = "application/x-msdownload" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\open txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\open\command txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\runas txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\open\command txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\runas\command txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\DefaultIcon\ = "%1" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\DefaultIcon txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\txq.exe\" -a \"%1\" %*" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\.exe\shell\start txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\Content Type = "application/x-msdownload" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\DefaultIcon txq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" txq.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\exefile\shell\start txq.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 2016 txq.exe 2016 txq.exe 2016 txq.exe 2016 txq.exe 2016 txq.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: 33 1780 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1780 AUDIODG.EXE Token: 33 1780 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1780 AUDIODG.EXE Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe Token: SeShutdownPrivilege 772 explorer.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 2016 txq.exe 772 explorer.exe 772 explorer.exe 2016 txq.exe 772 explorer.exe 772 explorer.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 772 explorer.exe 2016 txq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2016 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 28 PID 1372 wrote to memory of 2016 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 28 PID 1372 wrote to memory of 2016 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 28 PID 1372 wrote to memory of 2016 1372 f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe"C:\Users\Admin\AppData\Local\Temp\f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\txq.exe"C:\Users\Admin\AppData\Local\txq.exe" -gav C:\Users\Admin\AppData\Local\Temp\f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2016
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:772
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD578295195ce50c917ecdfa4e49b108d67
SHA1c679bb9be1f010f8f5f4dcfb4c420b184827caad
SHA256f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550
SHA51242fc7bcaef2e94bb2f84946f0f4dd9dbb029d5de5ca6ff92705f16c00be43c756cd79e062bd38c065a80ecb52af033d4fb1a752ab44d56b23980b8d5c3edd206
-
Filesize
288KB
MD578295195ce50c917ecdfa4e49b108d67
SHA1c679bb9be1f010f8f5f4dcfb4c420b184827caad
SHA256f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550
SHA51242fc7bcaef2e94bb2f84946f0f4dd9dbb029d5de5ca6ff92705f16c00be43c756cd79e062bd38c065a80ecb52af033d4fb1a752ab44d56b23980b8d5c3edd206
-
Filesize
288KB
MD578295195ce50c917ecdfa4e49b108d67
SHA1c679bb9be1f010f8f5f4dcfb4c420b184827caad
SHA256f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550
SHA51242fc7bcaef2e94bb2f84946f0f4dd9dbb029d5de5ca6ff92705f16c00be43c756cd79e062bd38c065a80ecb52af033d4fb1a752ab44d56b23980b8d5c3edd206
-
Filesize
288KB
MD578295195ce50c917ecdfa4e49b108d67
SHA1c679bb9be1f010f8f5f4dcfb4c420b184827caad
SHA256f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550
SHA51242fc7bcaef2e94bb2f84946f0f4dd9dbb029d5de5ca6ff92705f16c00be43c756cd79e062bd38c065a80ecb52af033d4fb1a752ab44d56b23980b8d5c3edd206