Analysis
-
max time kernel
150s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
Build6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Build6.exe
Resource
win10v2004-20230220-en
General
-
Target
Build6.exe
-
Size
701KB
-
MD5
b6fc37fce8c66b811adcb11e2a588913
-
SHA1
f623733af2c004fb9489ee0723574fa01d1d2097
-
SHA256
50c741e252a93f02d0d96bf0f5faa200c425a7cced7de84d6b56144bb9eca8ad
-
SHA512
7b2e72eb5f8cd84033e5ce19707b5a11005b27750ca9b7041b564bf125e85dc6852e8d4d3af7e3e8104030af2a565d423afaa7840cccb8e3a0a0667e0dfad59b
-
SSDEEP
6144:57A/MmJMsENIsRctX5rUvQSNj0LZOWM8yucn:5U/MmrrU1Nj0LZOd8yus
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 2040 Svchost.exe 932 Svchost.exe 1416 Svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 844 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1368 set thread context of 1112 1368 Build6.exe 30 PID 2040 set thread context of 1416 2040 Svchost.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 684 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1700 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1112 Build6.exe 1112 Build6.exe 1112 Build6.exe 2040 Svchost.exe 2040 Svchost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 876 explorer.exe Token: SeShutdownPrivilege 876 explorer.exe Token: SeShutdownPrivilege 876 explorer.exe Token: SeShutdownPrivilege 876 explorer.exe Token: SeShutdownPrivilege 876 explorer.exe Token: SeShutdownPrivilege 876 explorer.exe Token: SeShutdownPrivilege 876 explorer.exe Token: SeShutdownPrivilege 876 explorer.exe Token: 33 272 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 272 AUDIODG.EXE Token: 33 272 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 272 AUDIODG.EXE Token: SeShutdownPrivilege 876 explorer.exe Token: SeShutdownPrivilege 876 explorer.exe Token: SeDebugPrivilege 1112 Build6.exe Token: SeDebugPrivilege 2040 Svchost.exe Token: SeDebugPrivilege 1416 Svchost.exe Token: SeShutdownPrivilege 876 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe 876 explorer.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1368 wrote to memory of 876 1368 Build6.exe 27 PID 1368 wrote to memory of 876 1368 Build6.exe 27 PID 1368 wrote to memory of 876 1368 Build6.exe 27 PID 1368 wrote to memory of 876 1368 Build6.exe 27 PID 876 wrote to memory of 1208 876 explorer.exe 28 PID 876 wrote to memory of 1208 876 explorer.exe 28 PID 876 wrote to memory of 1208 876 explorer.exe 28 PID 1368 wrote to memory of 1112 1368 Build6.exe 30 PID 1368 wrote to memory of 1112 1368 Build6.exe 30 PID 1368 wrote to memory of 1112 1368 Build6.exe 30 PID 1368 wrote to memory of 1112 1368 Build6.exe 30 PID 1368 wrote to memory of 1112 1368 Build6.exe 30 PID 1368 wrote to memory of 1112 1368 Build6.exe 30 PID 1368 wrote to memory of 1112 1368 Build6.exe 30 PID 1368 wrote to memory of 1112 1368 Build6.exe 30 PID 1368 wrote to memory of 1112 1368 Build6.exe 30 PID 1112 wrote to memory of 1456 1112 Build6.exe 32 PID 1112 wrote to memory of 1456 1112 Build6.exe 32 PID 1112 wrote to memory of 1456 1112 Build6.exe 32 PID 1112 wrote to memory of 1456 1112 Build6.exe 32 PID 1112 wrote to memory of 844 1112 Build6.exe 34 PID 1112 wrote to memory of 844 1112 Build6.exe 34 PID 1112 wrote to memory of 844 1112 Build6.exe 34 PID 1112 wrote to memory of 844 1112 Build6.exe 34 PID 1456 wrote to memory of 684 1456 cmd.exe 36 PID 1456 wrote to memory of 684 1456 cmd.exe 36 PID 1456 wrote to memory of 684 1456 cmd.exe 36 PID 1456 wrote to memory of 684 1456 cmd.exe 36 PID 844 wrote to memory of 1700 844 cmd.exe 37 PID 844 wrote to memory of 1700 844 cmd.exe 37 PID 844 wrote to memory of 1700 844 cmd.exe 37 PID 844 wrote to memory of 1700 844 cmd.exe 37 PID 844 wrote to memory of 2040 844 cmd.exe 38 PID 844 wrote to memory of 2040 844 cmd.exe 38 PID 844 wrote to memory of 2040 844 cmd.exe 38 PID 844 wrote to memory of 2040 844 cmd.exe 38 PID 2040 wrote to memory of 1600 2040 Svchost.exe 39 PID 2040 wrote to memory of 1600 2040 Svchost.exe 39 PID 2040 wrote to memory of 1600 2040 Svchost.exe 39 PID 2040 wrote to memory of 1600 2040 Svchost.exe 39 PID 2040 wrote to memory of 932 2040 Svchost.exe 40 PID 2040 wrote to memory of 932 2040 Svchost.exe 40 PID 2040 wrote to memory of 932 2040 Svchost.exe 40 PID 2040 wrote to memory of 932 2040 Svchost.exe 40 PID 2040 wrote to memory of 1416 2040 Svchost.exe 41 PID 2040 wrote to memory of 1416 2040 Svchost.exe 41 PID 2040 wrote to memory of 1416 2040 Svchost.exe 41 PID 2040 wrote to memory of 1416 2040 Svchost.exe 41 PID 2040 wrote to memory of 1416 2040 Svchost.exe 41 PID 2040 wrote to memory of 1416 2040 Svchost.exe 41 PID 2040 wrote to memory of 1416 2040 Svchost.exe 41 PID 2040 wrote to memory of 1416 2040 Svchost.exe 41 PID 2040 wrote to memory of 1416 2040 Svchost.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Build6.exe"C:\Users\Admin\AppData\Local\Temp\Build6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Build6.exe"C:\Users\Admin\AppData\Local\Temp\Build6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Svchost" /tr '"C:\Users\Admin\AppData\Roaming\Svchost.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Svchost" /tr '"C:\Users\Admin\AppData\Roaming\Svchost.exe"'4⤵
- Creates scheduled task(s)
PID:684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6817.tmp.bat""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1700
-
-
C:\Users\Admin\AppData\Roaming\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"5⤵PID:1600
-
-
C:\Users\Admin\AppData\Roaming\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost.exe"5⤵
- Executes dropped EXE
PID:932
-
-
C:\Users\Admin\AppData\Roaming\Svchost.exe"C:\Users\Admin\AppData\Roaming\Svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x56c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD52fa89354a8cbbb1ec99ba3628babea59
SHA1700b16e52f9cc857621fff9af40aba85b54f29d2
SHA25664f9d5f9ae009d0b32ecdfd09a794157adcc0316ee56703306236cd90452acdb
SHA512fa1f02475b09f961d54417259a2688ff704f5c6e2bea4601ffc51c9fd49ac82b00c7bdc1c33bcac2440b44ffbff09711b850722d9e165fb01a03ccd29853f526
-
Filesize
151B
MD52fa89354a8cbbb1ec99ba3628babea59
SHA1700b16e52f9cc857621fff9af40aba85b54f29d2
SHA25664f9d5f9ae009d0b32ecdfd09a794157adcc0316ee56703306236cd90452acdb
SHA512fa1f02475b09f961d54417259a2688ff704f5c6e2bea4601ffc51c9fd49ac82b00c7bdc1c33bcac2440b44ffbff09711b850722d9e165fb01a03ccd29853f526
-
Filesize
701KB
MD5b6fc37fce8c66b811adcb11e2a588913
SHA1f623733af2c004fb9489ee0723574fa01d1d2097
SHA25650c741e252a93f02d0d96bf0f5faa200c425a7cced7de84d6b56144bb9eca8ad
SHA5127b2e72eb5f8cd84033e5ce19707b5a11005b27750ca9b7041b564bf125e85dc6852e8d4d3af7e3e8104030af2a565d423afaa7840cccb8e3a0a0667e0dfad59b
-
Filesize
701KB
MD5b6fc37fce8c66b811adcb11e2a588913
SHA1f623733af2c004fb9489ee0723574fa01d1d2097
SHA25650c741e252a93f02d0d96bf0f5faa200c425a7cced7de84d6b56144bb9eca8ad
SHA5127b2e72eb5f8cd84033e5ce19707b5a11005b27750ca9b7041b564bf125e85dc6852e8d4d3af7e3e8104030af2a565d423afaa7840cccb8e3a0a0667e0dfad59b
-
Filesize
701KB
MD5b6fc37fce8c66b811adcb11e2a588913
SHA1f623733af2c004fb9489ee0723574fa01d1d2097
SHA25650c741e252a93f02d0d96bf0f5faa200c425a7cced7de84d6b56144bb9eca8ad
SHA5127b2e72eb5f8cd84033e5ce19707b5a11005b27750ca9b7041b564bf125e85dc6852e8d4d3af7e3e8104030af2a565d423afaa7840cccb8e3a0a0667e0dfad59b
-
Filesize
701KB
MD5b6fc37fce8c66b811adcb11e2a588913
SHA1f623733af2c004fb9489ee0723574fa01d1d2097
SHA25650c741e252a93f02d0d96bf0f5faa200c425a7cced7de84d6b56144bb9eca8ad
SHA5127b2e72eb5f8cd84033e5ce19707b5a11005b27750ca9b7041b564bf125e85dc6852e8d4d3af7e3e8104030af2a565d423afaa7840cccb8e3a0a0667e0dfad59b
-
Filesize
701KB
MD5b6fc37fce8c66b811adcb11e2a588913
SHA1f623733af2c004fb9489ee0723574fa01d1d2097
SHA25650c741e252a93f02d0d96bf0f5faa200c425a7cced7de84d6b56144bb9eca8ad
SHA5127b2e72eb5f8cd84033e5ce19707b5a11005b27750ca9b7041b564bf125e85dc6852e8d4d3af7e3e8104030af2a565d423afaa7840cccb8e3a0a0667e0dfad59b