Analysis
-
max time kernel
141s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
24-06-2023 18:22
Behavioral task
behavioral1
Sample
d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe
Resource
win10v2004-20230621-en
General
-
Target
d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe
-
Size
174KB
-
MD5
5a19ec0f319a07c35a90ada4b8723789
-
SHA1
3ac7afc2e5c7f5aa27c1fd4e5367bbbd3dd7f94b
-
SHA256
d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74
-
SHA512
c1b30b49619cadc625c275950478faba283250a93cfe81ac4ed0deb97beba87d00c282b82bab078378bf38af0df53b2a2ef5c51c968245eeb099b6b62746b2e8
-
SSDEEP
3072:CYOoXSH2e5kqL7RJsgQKxF//tUPzsFst3rJ/g/9J5B+oQc5O1/EY7:CYfSr5khgQKD//C4FS3dg/XD+RTxE
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exepid process 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 624 explorer.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exeexplorer.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe Token: SeDebugPrivilege 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe Token: 33 1952 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1952 AUDIODG.EXE Token: 33 1952 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1952 AUDIODG.EXE Token: SeShutdownPrivilege 624 explorer.exe Token: SeShutdownPrivilege 624 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid process 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
explorer.exepid process 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe 624 explorer.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exedescription pid process target process PID 2036 wrote to memory of 1264 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe regsvr32.exe PID 2036 wrote to memory of 1264 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe regsvr32.exe PID 2036 wrote to memory of 1264 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe regsvr32.exe PID 2036 wrote to memory of 1264 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe regsvr32.exe PID 2036 wrote to memory of 1264 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe regsvr32.exe PID 2036 wrote to memory of 1264 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe regsvr32.exe PID 2036 wrote to memory of 1264 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe regsvr32.exe PID 2036 wrote to memory of 624 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe explorer.exe PID 2036 wrote to memory of 624 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe explorer.exe PID 2036 wrote to memory of 624 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe explorer.exe PID 2036 wrote to memory of 624 2036 d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe"C:\Users\Admin\AppData\Local\Temp\d433da552e145a3e3cfa424d7b9f3437bb86e4abf3e7141a7bd113f0d3248b74.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s "C:\Users\HiteVision\AppData\Local\YunPan\Bin\x64\YuWangExt.dll"2⤵PID:1264
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:624
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5701⤵
- Suspicious use of AdjustPrivilegeToken
PID:1952