Analysis
-
max time kernel
131s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
92b01ffa083eefexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
92b01ffa083eefexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
92b01ffa083eefexeexeexeex.exe
-
Size
327KB
-
MD5
92b01ffa083eefa04d07dcdaa6151ac7
-
SHA1
ee00de951e1a72a5b0eac16614d959f7944ef08f
-
SHA256
928506ecb9b66ce68dff03fe4ea675c0b9670b81d95f7dbab4e5271fe082b38f
-
SHA512
fa473fcdbd7116cc11d44be5a58ef3e54fc5cbe68be247bbde93db27d0db6be522501f41192b81fba099b8e3416c3764cc653decfbaa45cf430dbdda7d559fdc
-
SSDEEP
6144:C2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:C2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 840 taskhostsys.exe 3028 taskhostsys.exe -
Loads dropped DLL 3 IoCs
pid Process 2532 92b01ffa083eefexeexeexeex.exe 2532 92b01ffa083eefexeexeexeex.exe 2532 92b01ffa083eefexeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\Content-Type = "application/x-msdownload" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\shell 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\shell\open 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\taskhostsys.exe\" /START \"%1\" %*" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\DefaultIcon\ = "%1" 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\ = "jitc" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\shell 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\shell\runas 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\ = "Application" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\DefaultIcon 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\shell\runas\command 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\shell\runas\command\ = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\shell\open\command 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\DefaultIcon\ = "%1" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\shell\open\command 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\DefaultIcon 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\taskhostsys.exe\" /START \"%1\" %*" 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\shell\runas\command 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\jitc\shell\runas 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\shell\open 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 840 taskhostsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2532 wrote to memory of 840 2532 92b01ffa083eefexeexeexeex.exe 29 PID 2532 wrote to memory of 840 2532 92b01ffa083eefexeexeexeex.exe 29 PID 2532 wrote to memory of 840 2532 92b01ffa083eefexeexeexeex.exe 29 PID 2532 wrote to memory of 840 2532 92b01ffa083eefexeexeexeex.exe 29 PID 840 wrote to memory of 3028 840 taskhostsys.exe 30 PID 840 wrote to memory of 3028 840 taskhostsys.exe 30 PID 840 wrote to memory of 3028 840 taskhostsys.exe 30 PID 840 wrote to memory of 3028 840 taskhostsys.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\92b01ffa083eefexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\92b01ffa083eefexeexeexeex.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:3028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD58b70b00c399aeb69efd9dd7c3019c96e
SHA1f742f0d8490c4bef67a4a763ce1ce896ebc58dac
SHA2569b0941d2052d11b7fef4e093b58f548fc139a210c56917def8fd3f774855f326
SHA5126d1f8a0be884332a73d15f41a50d2f3865321c9766c5568db15ce4f604f0c32711de364ec241e3d2980b27e634eb4876a27fd7392a541ed06be834373a53721c
-
Filesize
327KB
MD58b70b00c399aeb69efd9dd7c3019c96e
SHA1f742f0d8490c4bef67a4a763ce1ce896ebc58dac
SHA2569b0941d2052d11b7fef4e093b58f548fc139a210c56917def8fd3f774855f326
SHA5126d1f8a0be884332a73d15f41a50d2f3865321c9766c5568db15ce4f604f0c32711de364ec241e3d2980b27e634eb4876a27fd7392a541ed06be834373a53721c
-
Filesize
327KB
MD58b70b00c399aeb69efd9dd7c3019c96e
SHA1f742f0d8490c4bef67a4a763ce1ce896ebc58dac
SHA2569b0941d2052d11b7fef4e093b58f548fc139a210c56917def8fd3f774855f326
SHA5126d1f8a0be884332a73d15f41a50d2f3865321c9766c5568db15ce4f604f0c32711de364ec241e3d2980b27e634eb4876a27fd7392a541ed06be834373a53721c
-
Filesize
327KB
MD58b70b00c399aeb69efd9dd7c3019c96e
SHA1f742f0d8490c4bef67a4a763ce1ce896ebc58dac
SHA2569b0941d2052d11b7fef4e093b58f548fc139a210c56917def8fd3f774855f326
SHA5126d1f8a0be884332a73d15f41a50d2f3865321c9766c5568db15ce4f604f0c32711de364ec241e3d2980b27e634eb4876a27fd7392a541ed06be834373a53721c
-
Filesize
327KB
MD58b70b00c399aeb69efd9dd7c3019c96e
SHA1f742f0d8490c4bef67a4a763ce1ce896ebc58dac
SHA2569b0941d2052d11b7fef4e093b58f548fc139a210c56917def8fd3f774855f326
SHA5126d1f8a0be884332a73d15f41a50d2f3865321c9766c5568db15ce4f604f0c32711de364ec241e3d2980b27e634eb4876a27fd7392a541ed06be834373a53721c
-
Filesize
327KB
MD58b70b00c399aeb69efd9dd7c3019c96e
SHA1f742f0d8490c4bef67a4a763ce1ce896ebc58dac
SHA2569b0941d2052d11b7fef4e093b58f548fc139a210c56917def8fd3f774855f326
SHA5126d1f8a0be884332a73d15f41a50d2f3865321c9766c5568db15ce4f604f0c32711de364ec241e3d2980b27e634eb4876a27fd7392a541ed06be834373a53721c
-
Filesize
327KB
MD58b70b00c399aeb69efd9dd7c3019c96e
SHA1f742f0d8490c4bef67a4a763ce1ce896ebc58dac
SHA2569b0941d2052d11b7fef4e093b58f548fc139a210c56917def8fd3f774855f326
SHA5126d1f8a0be884332a73d15f41a50d2f3865321c9766c5568db15ce4f604f0c32711de364ec241e3d2980b27e634eb4876a27fd7392a541ed06be834373a53721c