Analysis
-
max time kernel
156s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe
Resource
win10v2004-20220812-en
General
-
Target
b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe
-
Size
281KB
-
MD5
446f8bcad7cac827b481de667d13bc00
-
SHA1
738655a87f106533be3298916dcac11b9bd7b214
-
SHA256
b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251
-
SHA512
1397a715f9402ebcdae9cc700dacd136c91e4e736c58da74a94dd6ca5df04b943269032036ca132e2572fd105a1a5533bff9109f241a657d89544785b6ed4a35
-
SSDEEP
6144:hCSZsDWddorJUDGCFB22uaHzW/nYo54HTbGPw1IN8/PhwTMC:IesDKo+82uaToY1HTCBSwT5
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1228 cpg.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1228 cpg.exe -
Loads dropped DLL 2 IoCs
pid Process 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 1228 cpg.exe 1136 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1136 explorer.exe Token: SeShutdownPrivilege 1136 explorer.exe Token: SeShutdownPrivilege 1136 explorer.exe Token: SeShutdownPrivilege 1136 explorer.exe Token: SeShutdownPrivilege 1136 explorer.exe Token: SeShutdownPrivilege 1136 explorer.exe Token: SeShutdownPrivilege 1136 explorer.exe Token: SeShutdownPrivilege 1136 explorer.exe Token: SeShutdownPrivilege 1136 explorer.exe Token: SeShutdownPrivilege 1136 explorer.exe Token: 33 1160 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1160 AUDIODG.EXE Token: 33 1160 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1160 AUDIODG.EXE Token: SeShutdownPrivilege 1136 explorer.exe Token: SeShutdownPrivilege 1136 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1228 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 28 PID 1192 wrote to memory of 1228 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 28 PID 1192 wrote to memory of 1228 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 28 PID 1192 wrote to memory of 1228 1192 b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe"C:\Users\Admin\AppData\Local\Temp\b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\cpg.exe"C:\Users\Admin\AppData\Local\cpg.exe" -gav C:\Users\Admin\AppData\Local\Temp\b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: GetForegroundWindowSpam
PID:1228
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1136
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x57c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5446f8bcad7cac827b481de667d13bc00
SHA1738655a87f106533be3298916dcac11b9bd7b214
SHA256b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251
SHA5121397a715f9402ebcdae9cc700dacd136c91e4e736c58da74a94dd6ca5df04b943269032036ca132e2572fd105a1a5533bff9109f241a657d89544785b6ed4a35
-
Filesize
281KB
MD5446f8bcad7cac827b481de667d13bc00
SHA1738655a87f106533be3298916dcac11b9bd7b214
SHA256b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251
SHA5121397a715f9402ebcdae9cc700dacd136c91e4e736c58da74a94dd6ca5df04b943269032036ca132e2572fd105a1a5533bff9109f241a657d89544785b6ed4a35
-
Filesize
281KB
MD5446f8bcad7cac827b481de667d13bc00
SHA1738655a87f106533be3298916dcac11b9bd7b214
SHA256b6f84f49c1520af0ac33e463e971a8b8cff50fe9d28e6e67e770709e00f1f251
SHA5121397a715f9402ebcdae9cc700dacd136c91e4e736c58da74a94dd6ca5df04b943269032036ca132e2572fd105a1a5533bff9109f241a657d89544785b6ed4a35