Analysis
-
max time kernel
16s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2023, 06:55 UTC
Static task
static1
Behavioral task
behavioral1
Sample
09490699.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
09490699.exe
Resource
win10v2004-20230220-en
Errors
General
-
Target
09490699.exe
-
Size
4.2MB
-
MD5
3aab057312f4f899b322f3f282eba2f3
-
SHA1
53907d8c91acd85e53c058562a7f61e998bd9002
-
SHA256
d69ab6b8780792026dc20e123afbb0e8eab342cbe19b705cb2e1e03d19551986
-
SHA512
fc0a9d718e0d6a7e2f03add1ec9511d38c9d13a7ed10afa974f63d7db8ff09e1a6b79f0a6e025d15a1993451d93177932fa5b6868a9f886324d71af040b128d5
-
SSDEEP
98304:l7uFXK3RGjr6hbrFjuj6gOzZPuGjr6hbrFjuj6gOzZP:lIK3Q36tpjuj6gYP736tpjuj6gYP
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\dcrypt.sys dcinst.exe File created C:\Windows\system32\drivers\dcrypt.sys dcinst.exe -
Executes dropped EXE 2 IoCs
pid Process 1980 13.exe 3440 dcinst.exe -
Loads dropped DLL 2 IoCs
pid Process 1980 13.exe 3440 dcinst.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "87" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 1980 13.exe Token: 35 1980 13.exe Token: SeSecurityPrivilege 1980 13.exe Token: SeSecurityPrivilege 1980 13.exe Token: SeShutdownPrivilege 4076 shutdown.exe Token: SeRemoteShutdownPrivilege 4076 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4672 LogonUI.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3376 wrote to memory of 1544 3376 09490699.exe 85 PID 3376 wrote to memory of 1544 3376 09490699.exe 85 PID 3376 wrote to memory of 1544 3376 09490699.exe 85 PID 1544 wrote to memory of 2036 1544 cmd.exe 86 PID 1544 wrote to memory of 2036 1544 cmd.exe 86 PID 1544 wrote to memory of 2036 1544 cmd.exe 86 PID 2036 wrote to memory of 364 2036 net.exe 87 PID 2036 wrote to memory of 364 2036 net.exe 87 PID 2036 wrote to memory of 364 2036 net.exe 87 PID 544 wrote to memory of 1228 544 09490699.exe 89 PID 544 wrote to memory of 1228 544 09490699.exe 89 PID 544 wrote to memory of 1228 544 09490699.exe 89 PID 1228 wrote to memory of 1980 1228 cmd.exe 91 PID 1228 wrote to memory of 1980 1228 cmd.exe 91 PID 1228 wrote to memory of 1980 1228 cmd.exe 91 PID 544 wrote to memory of 1696 544 09490699.exe 93 PID 544 wrote to memory of 1696 544 09490699.exe 93 PID 544 wrote to memory of 1696 544 09490699.exe 93 PID 544 wrote to memory of 3440 544 09490699.exe 94 PID 544 wrote to memory of 3440 544 09490699.exe 94 PID 544 wrote to memory of 4076 544 09490699.exe 95 PID 544 wrote to memory of 4076 544 09490699.exe 95 PID 544 wrote to memory of 4076 544 09490699.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\09490699.exe"C:\Users\Admin\AppData\Local\Temp\09490699.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net start "Hard-to-Destroy Reptile"2⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\net.exenet start "Hard-to-Destroy Reptile"3⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Hard-to-Destroy Reptile"4⤵PID:364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\09490699.exeC:\Users\Admin\AppData\Local\Temp\09490699.exe1⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 13.exe x -y 502⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Disgusting\13.exe13.exe x -y 503⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist %windir%\Sysnative\drivers\dcrypt.sys (echo 1) else (echo 0)2⤵PID:1696
-
-
C:\Disgusting\dcinst.exedcinst.exe -setup2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
PID:3440
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 0 -f2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39f4855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4672
Network
-
Remote address:8.8.8.8:53Request176.122.125.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.97.242.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request74.32.126.40.in-addr.arpaIN PTRResponse
-
46 B 1
-
46 B 1
-
46 B 1
-
138 B 3
-
144 B 92 B 3 2
-
46 B 1
-
73 B 159 B 1 1
DNS Request
176.122.125.40.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.97.242.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
74.32.126.40.in-addr.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5a42b35f975d88c1370a7aff084ee57a7
SHA1bee1408fe0b15f6f719f003e46aee5ec424cf608
SHA25656cc9e7e3767c0cffae8161bf0ad13457487c1b422e2879b897dbd4bab115776
SHA512b92d05515e18277db660118934e70678ee2a3bb66005bad19bb417ffaedb22a63727a5a697ca3ac0f6c48f6f5593ba45ab80f4ebdc0eaed10d80b7af04d45b23
-
Filesize
127KB
MD517001c4b91ccfae0d737f2d368566541
SHA129609a5b3e73d86000093282b0ec8ec33f027393
SHA25611e5b46bb38e0dbed53de6bb67f777a5cb57f81f2011a14a55bd2bb25644f569
SHA512ce16012abd13bca5610006676a41b7f090fd1dda9e538d01b05fe82feb0dd39d36f4309540b511f9ee52654af5e1c5f358bc735c01e4e6320d95639c5c910671
-
Filesize
1.1MB
MD58915c81b1da3f8e9ac6d9cb7f9b7c105
SHA14f9f117eab2e75df3c2cd85bbad307d58990657d
SHA25692f6e97c9177361ee5425826585e6e4470052a36bb4e0d0e8667e83b41652c2f
SHA5128f4440fc3028a16f76deee8b14bab3e973bc4e66e9cefa0fb862d3c010465ae0d1d1a592b6f97d18f4fa123379d85d6c15081f67a8383eb19d96fb84771fdbb7
-
Filesize
1.1MB
MD58915c81b1da3f8e9ac6d9cb7f9b7c105
SHA14f9f117eab2e75df3c2cd85bbad307d58990657d
SHA25692f6e97c9177361ee5425826585e6e4470052a36bb4e0d0e8667e83b41652c2f
SHA5128f4440fc3028a16f76deee8b14bab3e973bc4e66e9cefa0fb862d3c010465ae0d1d1a592b6f97d18f4fa123379d85d6c15081f67a8383eb19d96fb84771fdbb7
-
Filesize
211KB
MD56299e7f901517d7167d3aff5fa66a30b
SHA169e4d05a36e2e925050a72d532cce0da3091bf8c
SHA2568688ea09e4b59a50c983ff9a27ab4476ab0498c504b227c58a5afc3713bfdab2
SHA512cf1f4aea47b6b192f44849503c681787c24711fe1a8293b7d68150654a37cb9adfe0d469cb5721251c080a9ac8c784541aad53cea5aad25efd8dae7dcf97f862
-
Filesize
211KB
MD56299e7f901517d7167d3aff5fa66a30b
SHA169e4d05a36e2e925050a72d532cce0da3091bf8c
SHA2568688ea09e4b59a50c983ff9a27ab4476ab0498c504b227c58a5afc3713bfdab2
SHA512cf1f4aea47b6b192f44849503c681787c24711fe1a8293b7d68150654a37cb9adfe0d469cb5721251c080a9ac8c784541aad53cea5aad25efd8dae7dcf97f862
-
Filesize
9KB
MD5ff5f598d99fd00f998ffa8dac3bb620a
SHA14b2210a64025ec0e3ec74990a4433d28a22abb37
SHA256f2a45d08fe2b4cff2d68c1ad2c204ec221428230f98d250b612eb0f27d92a636
SHA5128d7dc9ecb18cdfdbd5da947e25b781c96e1d9a65bcf423958d73affafeba09340b5a7f193269ba6abf0d92875702aa0dfea34636e9fb4c7349c52954bd5522c8
-
Filesize
9KB
MD5ff5f598d99fd00f998ffa8dac3bb620a
SHA14b2210a64025ec0e3ec74990a4433d28a22abb37
SHA256f2a45d08fe2b4cff2d68c1ad2c204ec221428230f98d250b612eb0f27d92a636
SHA5128d7dc9ecb18cdfdbd5da947e25b781c96e1d9a65bcf423958d73affafeba09340b5a7f193269ba6abf0d92875702aa0dfea34636e9fb4c7349c52954bd5522c8
-
Filesize
205KB
MD5edb72f4a46c39452d1a5414f7d26454a
SHA108f94684e83a27f2414f439975b7f8a6d61fc056
SHA2560b2f863f4119dc88a22cc97c0a136c88a0127cb026751303b045f7322a8972f6
SHA512d62a19436aba8b2d181c065076b4ab54d7d8159d71237f83f1aff8c3d132a80290af39a8142708acb468d78958c64f338ba6ad0cab9fbac001a6a0bddc0e4faa