Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe
Resource
win10v2004-20220812-en
General
-
Target
813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe
-
Size
296KB
-
MD5
07e6507e1a454951d92043133e0ae6f4
-
SHA1
fed146d6fff888cbb8f66d696799c046cbfaa35a
-
SHA256
813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f
-
SHA512
7b97fe203dfee4c9fb138fda720a881da182c1434dc1c9e48deb44b251124e15d1adbe14066fd5894d9cb51640386bf736b9d698d922a2b7b25a6ef858761879
-
SSDEEP
6144:yx+pdQKTZfeyRYUh/GgtnmJxzUH2zvP6srbUxhaV3P2N6rP:yx+pdQUxeyRzdGgtmJxzs2rP6q6oV3P5
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\DefaultIcon mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\runas\command mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\start mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\Content Type = "application/x-msdownload" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\open mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\ = "Application" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\mxi.exe\" -a \"%1\" %*" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\runas mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\start\command mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\DefaultIcon\ = "%1" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\open\command mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" mxi.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1720 mxi.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1720 mxi.exe -
Loads dropped DLL 2 IoCs
pid Process 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" mxi.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\Content Type = "application/x-msdownload" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\mxi.exe\" -a \"%1\" %*" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\open\command mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\start\command mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\Content Type = "application/x-msdownload" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\open mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\DefaultIcon mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\DefaultIcon\ = "%1" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\mxi.exe\" -a \"%1\" %*" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\runas mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\DefaultIcon mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\start\command mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\runas\command mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\start mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\ = "Application" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\ = "exefile" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\DefaultIcon\ = "%1" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\runas\command mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\open mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\open\command mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\start mxi.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe mxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" mxi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\exefile\shell\runas mxi.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 1720 mxi.exe 1720 mxi.exe 1720 mxi.exe 1720 mxi.exe 1720 mxi.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: 33 1788 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1788 AUDIODG.EXE Token: 33 1788 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1788 AUDIODG.EXE Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1720 mxi.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1720 mxi.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1976 explorer.exe 1720 mxi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1720 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 26 PID 1492 wrote to memory of 1720 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 26 PID 1492 wrote to memory of 1720 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 26 PID 1492 wrote to memory of 1720 1492 813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe"C:\Users\Admin\AppData\Local\Temp\813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\mxi.exe"C:\Users\Admin\AppData\Local\mxi.exe" -gav C:\Users\Admin\AppData\Local\Temp\813a52b61ed1b12cc5161ad72165fd63a1a96bd8ba4169a999eca120c965df9f.exe2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1720
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1976
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5ce7fec089e664c21c23fca669b7d9aa2
SHA10cda6a87df3d37f65518309d6d12bdfef498f966
SHA256b367e62495277ef15fb0874f9b802cd5c72b6c25e8e82d92b290b11cad24b97f
SHA512f65a9a87464ac67efab85ed1b83b958afcb8d3beaaae0a5692266b8f8f559b427d1361d002645052051226986d8eb7899caa1020ab3c1494d037508c978ec87c
-
Filesize
296KB
MD5ce7fec089e664c21c23fca669b7d9aa2
SHA10cda6a87df3d37f65518309d6d12bdfef498f966
SHA256b367e62495277ef15fb0874f9b802cd5c72b6c25e8e82d92b290b11cad24b97f
SHA512f65a9a87464ac67efab85ed1b83b958afcb8d3beaaae0a5692266b8f8f559b427d1361d002645052051226986d8eb7899caa1020ab3c1494d037508c978ec87c
-
Filesize
296KB
MD5ce7fec089e664c21c23fca669b7d9aa2
SHA10cda6a87df3d37f65518309d6d12bdfef498f966
SHA256b367e62495277ef15fb0874f9b802cd5c72b6c25e8e82d92b290b11cad24b97f
SHA512f65a9a87464ac67efab85ed1b83b958afcb8d3beaaae0a5692266b8f8f559b427d1361d002645052051226986d8eb7899caa1020ab3c1494d037508c978ec87c
-
Filesize
296KB
MD5ce7fec089e664c21c23fca669b7d9aa2
SHA10cda6a87df3d37f65518309d6d12bdfef498f966
SHA256b367e62495277ef15fb0874f9b802cd5c72b6c25e8e82d92b290b11cad24b97f
SHA512f65a9a87464ac67efab85ed1b83b958afcb8d3beaaae0a5692266b8f8f559b427d1361d002645052051226986d8eb7899caa1020ab3c1494d037508c978ec87c