Analysis
-
max time kernel
162s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe
Resource
win7-20221111-en
General
-
Target
500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe
-
Size
286KB
-
MD5
19a7cc1c7df73ef6a82b05f1d7df30f0
-
SHA1
871880b63c0c9f19c63552344d26e2053e534bb8
-
SHA256
500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d
-
SHA512
bff8a44fdda621c523438f2923638b79249f5db20f5b13c6f8da2bb6df8768c17239dba9b3c526316a78c2d59365da90eba078fc94b61868b90d28a271035a0d
-
SSDEEP
6144:/s3RgIaGI/JeI9hWf8ze9fEXiTLPYBTDU08he2SkrfI4g1:CRvI/JeV8S96obYB808hVSt
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1808 B896.tmp -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/960-56-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1080-63-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1080-65-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/696-76-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\632.exe = "C:\\Program Files (x86)\\LP\\9F28\\632.exe" 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\9F28\632.exe 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe File opened for modification C:\Program Files (x86)\LP\9F28\B896.tmp 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe File created C:\Program Files (x86)\LP\9F28\632.exe 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1488 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeSecurityPrivilege 560 msiexec.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: 33 652 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 652 AUDIODG.EXE Token: 33 652 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 652 AUDIODG.EXE Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 960 wrote to memory of 1080 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 32 PID 960 wrote to memory of 1080 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 32 PID 960 wrote to memory of 1080 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 32 PID 960 wrote to memory of 1080 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 32 PID 960 wrote to memory of 1808 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 34 PID 960 wrote to memory of 1808 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 34 PID 960 wrote to memory of 1808 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 34 PID 960 wrote to memory of 1808 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 34 PID 960 wrote to memory of 696 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 35 PID 960 wrote to memory of 696 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 35 PID 960 wrote to memory of 696 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 35 PID 960 wrote to memory of 696 960 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe"C:\Users\Admin\AppData\Local\Temp\500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:960 -
C:\Users\Admin\AppData\Local\Temp\500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exeC:\Users\Admin\AppData\Local\Temp\500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe startC:\Users\Admin\AppData\Roaming\8B143\5FB9F.exe%C:\Users\Admin\AppData\Roaming\8B1432⤵PID:1080
-
-
C:\Program Files (x86)\LP\9F28\B896.tmp"C:\Program Files (x86)\LP\9F28\B896.tmp"2⤵
- Executes dropped EXE
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exeC:\Users\Admin\AppData\Local\Temp\500c316ca9f08d10e6228630adaed9de7db7b5e34c0ce351ffa5086b41c52d2d.exe startC:\Program Files (x86)\4307A\lvvm.exe%C:\Program Files (x86)\4307A2⤵PID:696
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:560
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1488
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5881⤵
- Suspicious use of AdjustPrivilegeToken
PID:652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5bade879866519356dfbcd83d542a6412
SHA131e08efddce3b594648f0a106c8d137b82c15759
SHA25655fcaaaa7d7f33b7329957c3203eb5d9f607e9742d34fb055de84e5264bb75fc
SHA5124c914acd148c1ba5113900d294cc28f1ebaf0ce08c0d914ed5efebb227241df5decdbc6e9fe4180e6ff18ac2e8692da203edac2d1f6d7a1bd90357b0f214a1aa
-
Filesize
101KB
MD5bade879866519356dfbcd83d542a6412
SHA131e08efddce3b594648f0a106c8d137b82c15759
SHA25655fcaaaa7d7f33b7329957c3203eb5d9f607e9742d34fb055de84e5264bb75fc
SHA5124c914acd148c1ba5113900d294cc28f1ebaf0ce08c0d914ed5efebb227241df5decdbc6e9fe4180e6ff18ac2e8692da203edac2d1f6d7a1bd90357b0f214a1aa
-
Filesize
101KB
MD5bade879866519356dfbcd83d542a6412
SHA131e08efddce3b594648f0a106c8d137b82c15759
SHA25655fcaaaa7d7f33b7329957c3203eb5d9f607e9742d34fb055de84e5264bb75fc
SHA5124c914acd148c1ba5113900d294cc28f1ebaf0ce08c0d914ed5efebb227241df5decdbc6e9fe4180e6ff18ac2e8692da203edac2d1f6d7a1bd90357b0f214a1aa