Analysis
-
max time kernel
283s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2023, 07:55
Behavioral task
behavioral1
Sample
693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe
Resource
win7-20230220-en
General
-
Target
693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe
-
Size
35KB
-
MD5
2cb6d3f3cbe226c62608f0ed56087a0d
-
SHA1
2bde7e70f1043d83988c90b0dae045c3326e4a41
-
SHA256
693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6
-
SHA512
cd574c096f1b05046e83aa65e85120b4b390fdf90e7aeb11c3e3de0406bf77afbbf2140bc47f6a1e41ffda1b424e76632971126734dc67a27ac59e0747c79917
-
SSDEEP
384:jNg8ssvG79ki23FNxPLenxM9+OTTwNfbXmXzvsVgtFMA4P6NLTBZw/RZIvK9IkEX:emW98enxM9twMNFWP39gazOMh99QoU
Malware Config
Extracted
xworm
tienichxanh.vinaddns.com:7000
Ajv3D1sSpOst7unB
-
install_file
USB.exe
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.lnk 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.lnk 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe Token: SeDebugPrivilege 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe Token: SeDebugPrivilege 4052 taskmgr.exe Token: SeSystemProfilePrivilege 4052 taskmgr.exe Token: SeCreateGlobalPrivilege 4052 taskmgr.exe Token: 33 4052 taskmgr.exe Token: SeIncBasePriorityPrivilege 4052 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe 4052 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3032 693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe"C:\Users\Admin\AppData\Local\Temp\693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3032
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1312
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD52cb6d3f3cbe226c62608f0ed56087a0d
SHA12bde7e70f1043d83988c90b0dae045c3326e4a41
SHA256693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6
SHA512cd574c096f1b05046e83aa65e85120b4b390fdf90e7aeb11c3e3de0406bf77afbbf2140bc47f6a1e41ffda1b424e76632971126734dc67a27ac59e0747c79917
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\693bbd8e6b779770cf39730d0d8ecaf4ba18f2669f65b77bf1dcb1f658b853b6.lnk
Filesize1KB
MD59970966fa050a147d6c642b58c346f29
SHA1c378684f17c343ccf328e8494581412d918e251d
SHA2561bc4b489e6bdef8e39a6dcba4999e26813543a8d384df128bb0361ae2b8a6878
SHA5124f9d134f97a8bc0667fef0f92edcc21dfc77a3fcdc5d8377024512be9fec10c1e5bd835b0e1a83e4c0fc5b6df2eb891c36956aab11806db6e6077547fdc74fd9