Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2023 11:33
Behavioral task
behavioral1
Sample
b66f351c35212c7a265272d27aa09656.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b66f351c35212c7a265272d27aa09656.exe
Resource
win10v2004-20230703-en
General
-
Target
b66f351c35212c7a265272d27aa09656.exe
-
Size
4.4MB
-
MD5
b66f351c35212c7a265272d27aa09656
-
SHA1
c2994b2969f315b189a151d545b35a2c8ed6a2f9
-
SHA256
ba4c8e065f601de46ae7844e81921c68726d09345f3db13fb6e3f5ea2d413dde
-
SHA512
82ac249a9024085be3bd071682d15054696b0cd61a8b8a85d77c7ff4cd7703124ab07a3446b1b7b69015b5a30643f88030bef908644c88256d1784f992207fcb
-
SSDEEP
98304:sParA5bJxdz0l3YIMFQxMKsVCyGPPUpGieNjBVTRB7OQ8TZMQ7caYS3u:6a6rwlLSQxMKeiVRpSnYvIu
Malware Config
Signatures
-
Downloads MZ/PE file
-
Processes:
resource yara_rule behavioral2/memory/1976-133-0x00007FF71CC80000-0x00007FF71D891000-memory.dmp upx behavioral2/memory/1976-146-0x00007FF71CC80000-0x00007FF71D891000-memory.dmp upx behavioral2/memory/1412-209-0x0000000140000000-0x0000000140A62000-memory.dmp upx behavioral2/memory/1412-211-0x0000000140000000-0x0000000140A62000-memory.dmp upx behavioral2/memory/1412-213-0x0000000140000000-0x0000000140A62000-memory.dmp upx behavioral2/memory/1412-215-0x0000000140000000-0x0000000140A62000-memory.dmp upx behavioral2/memory/1412-214-0x0000000140000000-0x0000000140A62000-memory.dmp upx behavioral2/memory/1412-216-0x0000000140000000-0x0000000140A62000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
lguplus.exelguplus.exedescription pid process target process PID 3440 set thread context of 1412 3440 lguplus.exe svchost.exe PID 1856 set thread context of 2300 1856 lguplus.exe svchost.exe -
Executes dropped EXE 3 IoCs
Processes:
nPandaVPN.exelguplus.exelguplus.exepid process 952 nPandaVPN.exe 3440 lguplus.exe 1856 lguplus.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b66f351c35212c7a265272d27aa09656.exepid process 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe 1976 b66f351c35212c7a265272d27aa09656.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
b66f351c35212c7a265272d27aa09656.exenotepad.exenotepad.exepowershell.exepowershell.exelguplus.exesvchost.exepowershell.exepowershell.exelguplus.exesvchost.exedescription pid process Token: SeDebugPrivilege 1976 b66f351c35212c7a265272d27aa09656.exe Token: SeDebugPrivilege 3996 notepad.exe Token: SeDebugPrivilege 3196 notepad.exe Token: SeDebugPrivilege 1900 powershell.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 3440 lguplus.exe Token: SeDebugPrivilege 1412 svchost.exe Token: SeDebugPrivilege 1304 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 1856 lguplus.exe Token: SeDebugPrivilege 2300 svchost.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
b66f351c35212c7a265272d27aa09656.execmd.exenotepad.exenotepad.execmd.exelguplus.exepowershell.exepowershell.exelguplus.exedescription pid process target process PID 1976 wrote to memory of 3324 1976 b66f351c35212c7a265272d27aa09656.exe cmd.exe PID 1976 wrote to memory of 3324 1976 b66f351c35212c7a265272d27aa09656.exe cmd.exe PID 3324 wrote to memory of 952 3324 cmd.exe nPandaVPN.exe PID 3324 wrote to memory of 952 3324 cmd.exe nPandaVPN.exe PID 3324 wrote to memory of 952 3324 cmd.exe nPandaVPN.exe PID 1976 wrote to memory of 3996 1976 b66f351c35212c7a265272d27aa09656.exe notepad.exe PID 1976 wrote to memory of 3996 1976 b66f351c35212c7a265272d27aa09656.exe notepad.exe PID 1976 wrote to memory of 3996 1976 b66f351c35212c7a265272d27aa09656.exe notepad.exe PID 1976 wrote to memory of 3996 1976 b66f351c35212c7a265272d27aa09656.exe notepad.exe PID 3996 wrote to memory of 3196 3996 notepad.exe notepad.exe PID 3996 wrote to memory of 3196 3996 notepad.exe notepad.exe PID 3996 wrote to memory of 3196 3996 notepad.exe notepad.exe PID 3196 wrote to memory of 1900 3196 notepad.exe powershell.exe PID 3196 wrote to memory of 1900 3196 notepad.exe powershell.exe PID 3196 wrote to memory of 2956 3196 notepad.exe powershell.exe PID 3196 wrote to memory of 2956 3196 notepad.exe powershell.exe PID 3196 wrote to memory of 3368 3196 notepad.exe cmd.exe PID 3196 wrote to memory of 3368 3196 notepad.exe cmd.exe PID 3368 wrote to memory of 3440 3368 cmd.exe lguplus.exe PID 3368 wrote to memory of 3440 3368 cmd.exe lguplus.exe PID 3440 wrote to memory of 1412 3440 lguplus.exe svchost.exe PID 3440 wrote to memory of 1412 3440 lguplus.exe svchost.exe PID 3440 wrote to memory of 1412 3440 lguplus.exe svchost.exe PID 3440 wrote to memory of 1412 3440 lguplus.exe svchost.exe PID 3440 wrote to memory of 1412 3440 lguplus.exe svchost.exe PID 3440 wrote to memory of 1412 3440 lguplus.exe svchost.exe PID 3440 wrote to memory of 1412 3440 lguplus.exe svchost.exe PID 1304 wrote to memory of 2872 1304 powershell.exe powershell.exe PID 1304 wrote to memory of 2872 1304 powershell.exe powershell.exe PID 2872 wrote to memory of 1856 2872 powershell.exe lguplus.exe PID 2872 wrote to memory of 1856 2872 powershell.exe lguplus.exe PID 1856 wrote to memory of 2300 1856 lguplus.exe svchost.exe PID 1856 wrote to memory of 2300 1856 lguplus.exe svchost.exe PID 1856 wrote to memory of 2300 1856 lguplus.exe svchost.exe PID 1856 wrote to memory of 2300 1856 lguplus.exe svchost.exe PID 1856 wrote to memory of 2300 1856 lguplus.exe svchost.exe PID 1856 wrote to memory of 2300 1856 lguplus.exe svchost.exe PID 1856 wrote to memory of 2300 1856 lguplus.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b66f351c35212c7a265272d27aa09656.exe"C:\Users\Admin\AppData\Local\Temp\b66f351c35212c7a265272d27aa09656.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\cmd.execmd /C nPandaVPN.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\nPandaVPN.exenPandaVPN.exe3⤵
- Executes dropped EXE
PID:952 -
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
\??\c:\windows\system32\notepad.exec:\windows\system32\notepad.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "((Get-WMIObject -ClassName Win32_ComputerSystem).Username).Split('\')[1]"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NonInteractive " Write-host -ForegroundColor Yellow \"Set PowerShell Job...\" Start-Sleep 2 $trigger = New-JobTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 60) -RepetitionDuration ([TimeSpan]::MaxValue) $options = New-ScheduledJobOption –HideInTaskScheduler Register-ScheduledJob –Name \"Updates\" -ScriptBlock {C:\Users\\.local\share\lguplus.exe} –Trigger $trigger –ScheduledJobOption $options Write-host -ForegroundColor Green \"Done!\" "4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\system32\cmd.execmd /C C:\Users\\.local\share\lguplus.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\.local\share\lguplus.exeC:\Users\\.local\share\lguplus.exe5⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\windows\system32\svchost.exeC:\windows\system32\svchost.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -NonInteractive -WindowStyle Hidden -Command "Import-Module PSScheduledJob; $jobDef = [Microsoft.PowerShell.ScheduledJob.ScheduledJobDefinition]::LoadFromStore('Updates', 'C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ScheduledJobs'); $jobDef.Run()"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\.local\share\lguplus.exe"C:\Users\.local\share\lguplus.exe"3⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\windows\system32\svchost.exeC:\windows\system32\svchost.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD542496ddabff1b31c7c8fcbe54dcfbd65
SHA18f01d9d0cef6990aba295f51724916e8116cb210
SHA256a15d8d1958aa4fb1d9e661b9f29400ac3a5d4f04d5be4b12decef77391bf4ab1
SHA51295941ee945194e4f05e075c2d7c3cbf8fe31b858918f2282d980a7d127266263bc9db09450e43dd23ac3400063d181cf8830ef7227366e57d28ac181466f3154
-
Filesize
19KB
MD542496ddabff1b31c7c8fcbe54dcfbd65
SHA18f01d9d0cef6990aba295f51724916e8116cb210
SHA256a15d8d1958aa4fb1d9e661b9f29400ac3a5d4f04d5be4b12decef77391bf4ab1
SHA51295941ee945194e4f05e075c2d7c3cbf8fe31b858918f2282d980a7d127266263bc9db09450e43dd23ac3400063d181cf8830ef7227366e57d28ac181466f3154
-
Filesize
19KB
MD542496ddabff1b31c7c8fcbe54dcfbd65
SHA18f01d9d0cef6990aba295f51724916e8116cb210
SHA256a15d8d1958aa4fb1d9e661b9f29400ac3a5d4f04d5be4b12decef77391bf4ab1
SHA51295941ee945194e4f05e075c2d7c3cbf8fe31b858918f2282d980a7d127266263bc9db09450e43dd23ac3400063d181cf8830ef7227366e57d28ac181466f3154
-
Filesize
847B
MD566a0a4aa01208ed3d53a5e131a8d030a
SHA1ef5312ba2b46b51a4d04b574ca1789ac4ff4a6b1
SHA256f0ab05c32d6af3c2b559dbce4dec025ce3e730655a2430ade520e89a557cace8
SHA512626f0dcf0c6bcdc0fef25dc7da058003cf929fd9a39a9f447b79fb139a417532a46f8bca1ff2dbde09abfcd70f5fb4f8d059b1fe91977c377df2f5f751c84c5c
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ScheduledJobs\Updates\ScheduledJobDefinition.xml
Filesize7KB
MD5576d340baa81fb628eb1f4a87467d18d
SHA186b2c7af7bd8cd2f18427e426b103b67537a554b
SHA25644cd83a7ac06b1e3f4a2c3e66bee522a05307a483926fe51fb21cc452fbacc66
SHA51269532f8413a8dcde1a69e44dc568871d088ba1b38dcaa6a70b72646a18ba6c8b446dcf35fd62cc6c59d1fa69dc87a52b0d54fc90b0a5a30fbc09b388003328bc
-
Filesize
1KB
MD5dedd980f0c3cf1a56b3749d138a358e0
SHA13faa12db8c3c3606550b5708b2afb5990ab8d668
SHA25640fd1a1b6acba46c1d3e5d2706cb6ffac9fff54153505010b4ec4343de3a1bf8
SHA5123607065b8b7755c0e4db19d100614ea923412c26fed215f56099e176d8d9521a904cc6d19b08fdbd5505df9ff8b0e11eab9c443e1df80c95d0136b9781cdcccf
-
Filesize
1KB
MD5c7f5825c13a911fe0212232347cac388
SHA1bcc14d76a0c583797a3bb888d010f2c48f5a1574
SHA256ecc7ba62a46d9108129327e701e9fc0a92e22f24590e384e65a63a0ad6c59d16
SHA512eab49d09c6831f19ae94d0202c3430392802049f865f68efb5566235aede808b1989a7c73128aafdc573c2ad49256ea96c1931ae4fb2b7f586ddfecbeade2f75
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD5c83323d126469b0eaab04876edd391a3
SHA1dc9b1aeb0535cc30eff5f298e81de1476ec8e02a
SHA256318f8b901a0c9226f41409e97c4167cdf1836508f969ab13b8e004b4f6c9caac
SHA512edde3c33d83b5ba1d527073afbf99568737a82d1142003b7163d5c037e536761a7472b0245a85e0dcab9c89790a82a7470a57b2f1829e75875a92b8495825487
-
Filesize
2.1MB
MD5c83323d126469b0eaab04876edd391a3
SHA1dc9b1aeb0535cc30eff5f298e81de1476ec8e02a
SHA256318f8b901a0c9226f41409e97c4167cdf1836508f969ab13b8e004b4f6c9caac
SHA512edde3c33d83b5ba1d527073afbf99568737a82d1142003b7163d5c037e536761a7472b0245a85e0dcab9c89790a82a7470a57b2f1829e75875a92b8495825487