Analysis
-
max time kernel
123s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23-07-2023 17:33
Static task
static1
Behavioral task
behavioral1
Sample
NA_NA_1ca9fd6d1782ddexeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_NA_1ca9fd6d1782ddexeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
NA_NA_1ca9fd6d1782ddexeexe_JC.exe
-
Size
280KB
-
MD5
1ca9fd6d1782dd240f32b121b947065e
-
SHA1
2ad6ba1f1881f8d83f197549f43ee56c1311f57f
-
SHA256
398e11e41cb7415cbbfb79bd47be8dfab34699897061076d18ab633ba403b39b
-
SHA512
9e61c5d40263c34f5cb5a0869c9dde1f5c05aae391c5a5a2071145314d5ea27ec788e3b40b0b0842d79febeb8d99863cf8fd6e941b706a2d872cc4fd5881a905
-
SSDEEP
6144:GTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:GTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1676 lsassys.exe 2804 lsassys.exe -
Loads dropped DLL 3 IoCs
pid Process 2220 NA_NA_1ca9fd6d1782ddexeexe_JC.exe 2220 NA_NA_1ca9fd6d1782ddexeexe_JC.exe 2220 NA_NA_1ca9fd6d1782ddexeexe_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\shell\runas\command NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\shell\runas\command\ = "\"%1\" %*" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\DefaultIcon\ = "%1" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\lsassys.exe\" /START \"%1\" %*" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\shell\open NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\open NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\shell\open\command NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\DefaultIcon\ = "%1" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\ = "halnt" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\DefaultIcon NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\ = "Application" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\Content-Type = "application/x-msdownload" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\DefaultIcon NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\lsassys.exe\" /START \"%1\" %*" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\runas NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\shell NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\open\command NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\runas\command NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" NA_NA_1ca9fd6d1782ddexeexe_JC.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\halnt\shell\runas NA_NA_1ca9fd6d1782ddexeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" NA_NA_1ca9fd6d1782ddexeexe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1676 lsassys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1676 2220 NA_NA_1ca9fd6d1782ddexeexe_JC.exe 28 PID 2220 wrote to memory of 1676 2220 NA_NA_1ca9fd6d1782ddexeexe_JC.exe 28 PID 2220 wrote to memory of 1676 2220 NA_NA_1ca9fd6d1782ddexeexe_JC.exe 28 PID 2220 wrote to memory of 1676 2220 NA_NA_1ca9fd6d1782ddexeexe_JC.exe 28 PID 1676 wrote to memory of 2804 1676 lsassys.exe 29 PID 1676 wrote to memory of 2804 1676 lsassys.exe 29 PID 1676 wrote to memory of 2804 1676 lsassys.exe 29 PID 1676 wrote to memory of 2804 1676 lsassys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1ca9fd6d1782ddexeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_1ca9fd6d1782ddexeexe_JC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\lsassys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\lsassys.exe"3⤵
- Executes dropped EXE
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD58e6f85360c464738662e8298d6cb9a0d
SHA10565ee46e99e2a5daa2ab842294bc08f522bdf59
SHA25656316af1ad273c63b39460e7d13b77d15d60431b04f1a784023b25e4eb7dbc28
SHA512316c01b925463713550582c6c04439801e89e97e9bd0fda8892e4bf951c837cd166e1e3bf6657808f43bf076784c4980476b269ba1d2b8bf800ac66d6518f961
-
Filesize
280KB
MD58e6f85360c464738662e8298d6cb9a0d
SHA10565ee46e99e2a5daa2ab842294bc08f522bdf59
SHA25656316af1ad273c63b39460e7d13b77d15d60431b04f1a784023b25e4eb7dbc28
SHA512316c01b925463713550582c6c04439801e89e97e9bd0fda8892e4bf951c837cd166e1e3bf6657808f43bf076784c4980476b269ba1d2b8bf800ac66d6518f961
-
Filesize
280KB
MD58e6f85360c464738662e8298d6cb9a0d
SHA10565ee46e99e2a5daa2ab842294bc08f522bdf59
SHA25656316af1ad273c63b39460e7d13b77d15d60431b04f1a784023b25e4eb7dbc28
SHA512316c01b925463713550582c6c04439801e89e97e9bd0fda8892e4bf951c837cd166e1e3bf6657808f43bf076784c4980476b269ba1d2b8bf800ac66d6518f961
-
Filesize
280KB
MD58e6f85360c464738662e8298d6cb9a0d
SHA10565ee46e99e2a5daa2ab842294bc08f522bdf59
SHA25656316af1ad273c63b39460e7d13b77d15d60431b04f1a784023b25e4eb7dbc28
SHA512316c01b925463713550582c6c04439801e89e97e9bd0fda8892e4bf951c837cd166e1e3bf6657808f43bf076784c4980476b269ba1d2b8bf800ac66d6518f961
-
Filesize
280KB
MD58e6f85360c464738662e8298d6cb9a0d
SHA10565ee46e99e2a5daa2ab842294bc08f522bdf59
SHA25656316af1ad273c63b39460e7d13b77d15d60431b04f1a784023b25e4eb7dbc28
SHA512316c01b925463713550582c6c04439801e89e97e9bd0fda8892e4bf951c837cd166e1e3bf6657808f43bf076784c4980476b269ba1d2b8bf800ac66d6518f961
-
Filesize
280KB
MD58e6f85360c464738662e8298d6cb9a0d
SHA10565ee46e99e2a5daa2ab842294bc08f522bdf59
SHA25656316af1ad273c63b39460e7d13b77d15d60431b04f1a784023b25e4eb7dbc28
SHA512316c01b925463713550582c6c04439801e89e97e9bd0fda8892e4bf951c837cd166e1e3bf6657808f43bf076784c4980476b269ba1d2b8bf800ac66d6518f961
-
Filesize
280KB
MD58e6f85360c464738662e8298d6cb9a0d
SHA10565ee46e99e2a5daa2ab842294bc08f522bdf59
SHA25656316af1ad273c63b39460e7d13b77d15d60431b04f1a784023b25e4eb7dbc28
SHA512316c01b925463713550582c6c04439801e89e97e9bd0fda8892e4bf951c837cd166e1e3bf6657808f43bf076784c4980476b269ba1d2b8bf800ac66d6518f961