Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2023 09:49
Behavioral task
behavioral1
Sample
7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe
Resource
win10v2004-20230703-en
General
-
Target
7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe
-
Size
108KB
-
MD5
7856c463dafa41e9ee8057c2a53b8f5f
-
SHA1
414659752d234ea615756ebe527a18dceba408f6
-
SHA256
7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984
-
SHA512
cd947cc251a6b30b936bc2d056b152925a5c4e848c495b7f2b2a7da2278a4ef16b61603d2875a5f36999f784a22ec23b44b5b26449aed054f746b22d62455c5f
-
SSDEEP
3072:7iQpRQqbfY7QRPVAziuhArAy72GRSQIrD:RRQqbfYePV6iuhAr5KGiD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 768 Sec.exe -
resource yara_rule behavioral2/memory/1404-133-0x0000000000400000-0x000000000044C000-memory.dmp vmprotect behavioral2/memory/1404-134-0x0000000000400000-0x000000000044C000-memory.dmp vmprotect behavioral2/memory/1404-143-0x0000000000400000-0x000000000044C000-memory.dmp vmprotect behavioral2/files/0x00060000000231f1-382.dat vmprotect behavioral2/memory/768-383-0x0000000000400000-0x000000000044D000-memory.dmp vmprotect behavioral2/files/0x00060000000231f1-384.dat vmprotect behavioral2/memory/768-385-0x0000000000400000-0x000000000044D000-memory.dmp vmprotect behavioral2/memory/1404-388-0x0000000000400000-0x000000000044C000-memory.dmp vmprotect behavioral2/files/0x00060000000231f8-390.dat vmprotect behavioral2/memory/768-395-0x0000000000400000-0x000000000044D000-memory.dmp vmprotect -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Sec.FileAssoc\ 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Sec.FileAssoc\shell 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Sec.FileAssoc\shell\ = "open" 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Sec.FileAssoc\shell\open 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sec 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sec\ = "Sec.FileAssoc" 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Sec.FileAssoc 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Sec.FileAssoc\DefaultIcon 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Sec.FileAssoc\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe,0" 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Sec.FileAssoc\shell\open\command 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Sec.FileAssoc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe\" %1" 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 28 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 768 Sec.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1404 wrote to memory of 4968 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 89 PID 1404 wrote to memory of 4968 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 89 PID 1404 wrote to memory of 4968 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 89 PID 1404 wrote to memory of 3688 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 93 PID 1404 wrote to memory of 3688 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 93 PID 1404 wrote to memory of 3688 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 93 PID 1404 wrote to memory of 4396 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 95 PID 1404 wrote to memory of 4396 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 95 PID 1404 wrote to memory of 4396 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 95 PID 1404 wrote to memory of 2156 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 97 PID 1404 wrote to memory of 2156 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 97 PID 1404 wrote to memory of 2156 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 97 PID 1404 wrote to memory of 1996 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 99 PID 1404 wrote to memory of 1996 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 99 PID 1404 wrote to memory of 1996 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 99 PID 1404 wrote to memory of 1012 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 101 PID 1404 wrote to memory of 1012 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 101 PID 1404 wrote to memory of 1012 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 101 PID 1404 wrote to memory of 3092 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 103 PID 1404 wrote to memory of 3092 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 103 PID 1404 wrote to memory of 3092 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 103 PID 1404 wrote to memory of 768 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 106 PID 1404 wrote to memory of 768 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 106 PID 1404 wrote to memory of 768 1404 7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe"C:\Users\Admin\AppData\Local\Temp\7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\expand.exeexpand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec.exe.zip C:\Users\Admin\AppData\Local\Temp\2⤵
- Drops file in Windows directory
PID:4968
-
-
C:\Windows\SysWOW64\expand.exeexpand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec.ini.zip C:\Users\Admin\AppData\Local\Temp\2⤵
- Drops file in Windows directory
PID:3688
-
-
C:\Windows\SysWOW64\expand.exeexpand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec1.exe.zip C:\Users\Admin\AppData\Local\Temp\2⤵
- Drops file in Windows directory
PID:4396
-
-
C:\Windows\SysWOW64\expand.exeexpand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\UpLog.txt.zip C:\Users\Admin\AppData\Local\Temp\2⤵
- Drops file in Windows directory
PID:2156
-
-
C:\Windows\SysWOW64\expand.exeexpand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\inc\GUI.inc.zip C:\Users\Admin\AppData\Local\Temp\inc\2⤵
- Drops file in Windows directory
PID:1996
-
-
C:\Windows\SysWOW64\expand.exeexpand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\inc\lib\gdi32.lib.zip C:\Users\Admin\AppData\Local\Temp\inc\lib\2⤵
- Drops file in Windows directory
PID:1012
-
-
C:\Windows\SysWOW64\expand.exeexpand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\code\crc32.sec.zip C:\Users\Admin\AppData\Local\Temp\code\2⤵
- Drops file in Windows directory
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\Sec.exeSec.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5dfa1023dace7cf6736ca42933f143761
SHA1780a85fb446106f21bc8f2c9cecdc5af1c38f3e3
SHA256722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7
SHA51226aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726
-
Filesize
108KB
MD5dfa1023dace7cf6736ca42933f143761
SHA1780a85fb446106f21bc8f2c9cecdc5af1c38f3e3
SHA256722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7
SHA51226aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726
-
Filesize
180KB
MD5dc71242c827305ef9608362bd8f7ae7f
SHA19cd2b8efd0a38c29fc309b1ca80a54cb1139998a
SHA25608de077504ff3f9453e6dcd789c41feebaf24d335e9eec7f054a80faae63d2bc
SHA5129bc733260dc4176bc5102a6b0a6d47857f065af28f6b752af576093e883cbdcc70a3fa5b80f9101a0d210fe8c80c9bfe969348d55ba7b95293cdc37a48f4e1b0
-
Filesize
96KB
MD5ce3d32362fb1c2e7fbba72cce95c3b0c
SHA1a48c44ef67e0cf711733509e4233401f4f17380b
SHA25676613df11b82f958b79783212b240701b12871db27a2050d32b4c6ae0d4dca1c
SHA512d88e4b06893f7616a035f287c24115d666fc87d7319292a74534af0d29c7e2a8530b6da900266df43e47cb6224bfb7b4f1adba6dc5ad26ddf46dc7bda698ae93
-
Filesize
28KB
MD5ed0e0c142c05e3b4cb97929e8c045cf3
SHA1734b648c9a6ab53a4eaba12668f545bdc0869212
SHA2564f97c5f1be90b7cbed7bd3075561d09cb05cbb1e78d969fc06a152cbaac4f0d8
SHA512efead23df6f778e0a02a991eaee164fd9cbe2d8638a317965367d30880e38fda6fce365e982109465d22eb7f8777b5f9c3d47088fb5f55a0129ee10d0f00d412
-
Filesize
1KB
MD5b5413b8724dc740d100d83c5fb5474d6
SHA13d590964b543cc4fa5500fbff768fa2d0bf301de
SHA2561acb643a84354be82518eece323c498c983236dd27001e9422c68d6c567cc65e
SHA512b42f9b042db52e874b4e75f49fe90ba1a35573d734f8a43dc50c807129501821f263d8380b456cc4b0138c78519216ec64b3a356caac06fa393de195bd860b25
-
Filesize
1KB
MD55d089846fdf9551981b4caa959168746
SHA1efd43083b8b0fe656ed2ec9034bb82c38d50c86a
SHA2562be5e2ff8dbfd24e189219de350550aa429e85aab9161daadeb0a25f91124204
SHA512d54ba11884a3ba0a70280578ab2a16a8f7b0c3bc33ddd4d6d17e8b20b00b407f6834c531270e2a6d4ea3d28e18e6bdeccd2d61af1079547fedf93674567dadfd
-
Filesize
14KB
MD528aa70c6d418cad7d09f72672682370b
SHA142f3903717183c6d6c7ab9d2d9b9cfe9c517dca6
SHA2562c7c868dce813c91382b7d5d5414849019312abcd1996ee45946656f462b96e2
SHA51215659d9b0225c2e6e02c02c771e8ae97568a415aa456217687e817fb8a92bb00f6c2afed245e83c2b78d7069aa310750f0cd4395f07a6fa086dde59d5859c539
-
Filesize
168KB
MD5c6116ba71b3478911ace16f6f9c152a0
SHA1c4b0052d014657d42297322649e68d59ea8b0913
SHA256b64b7278dfd0e1a00c87ac34a383376d9bf3055bf2c571a4d6578c754e66aa43
SHA512afe5149c5b40969f2be0f29565fd162aeac9c110a3cbaa7324410a7a7616075808ca59fbd7fd86ee109d9b9e74fafcc7b5cfc45dbfd4740e7929080ca399b175
-
Filesize
169KB
MD53729fc8ef0b4d757d7104993a957a3f0
SHA1c574ad50a366d69b85f617c65c01faf4528271d0
SHA25648f9680f6250c1342f8c1431be6928b894dfb155ac08d5310b9b14e9cbfb904d
SHA5126a5756e044edfb8cc38d19ce96f310ec0089e6790a2cfd825849751f9b9564e1430138d200cb48ba3477b6d75e0c7c1192e3daf730ba323be9aae7758f48c43c
-
Filesize
170KB
MD5d0cf3212f1b0fb8133f9fcecb084f3e9
SHA15119290476bee78ee6abbbad04c7bf0e1dd0370e
SHA256339ba4741c2549c68e388625df34ef207ac2c8e94b8099ddd476817d10297f24
SHA5125f2cb2441e40673a5348ba6129427e027c14fc8757303db122d3852ed798652403dbd4d2729baec9ab031363ec66de1c014bde29a787a0f1e928086561c003c8
-
Filesize
172KB
MD5a5d41bb7501dfe74882a2ed913578774
SHA10fe99e24a7a4995bde2e5c192ca75523b32f01a8
SHA256040f651d228e2d1c2b618e7afd795aea02c487b07f709d26ea5480201382c023
SHA512631ee167a36cba068899f8f2b355a632919ee5762ecdc0fc02589018dfd1d196d0f990153d38476ad2b83d3fdd9d4983a7d27f181fe172ecc90c81f17bef7e52
-
Filesize
173KB
MD54d78aa841608495d398041d7da5691c5
SHA1869a93065b7f713dad6b3c14ae6ce7d44cde2f07
SHA256ad2f6903f7a84679c16432ccaa43fd9532e5f45889d466ef9ba22d05bb66e481
SHA512966e17213b402f63c923ac8862fceba3d4a08583ca8cb38e6e2290cd338a4e0028ba33b3889ba693ef66ba2080379ddc3f05d255694167f34c2adec909d5a480
-
Filesize
174KB
MD5cd3aaf7acfc831640153fe71bb0e35b8
SHA19f71f338a899506a855c3d7955ff8dbe8b08457e
SHA256ef6114f7a3865f0eb1a5a4475f58f34a78d8fc0a48a5a14180f05c7cf89e201d
SHA51291bf0db9e9820b14994e7490cc3d0fe64b4734552c3625d6514b3ce676f6ebbe5b877ded14fa8882f51b40be29b26232bc261bd5d8e04dd8a211c53852d51d34
-
Filesize
172KB
MD5d2c6b1f1adc2ec1f47b35c44b5692e16
SHA1a0921f1373043383bec61dabc25765ecbe687e81
SHA256c64a8003e066cd446d94504d9bd73c86be3e0fb80a5e8e40dda86ecf7ed09eea
SHA512fbbdfd27fdecb4c889b295480187c256be7ac88bbd8f5378aa18abedb515708ec855e60428235b162dd989cb69e57beeb40cc99029ae56caacab44bfcef1b6f8
-
Filesize
29KB
MD59f79488a0f0832ba5621385bcdbe051e
SHA17464579e2ba57ffcbb54018141beadb3a075f244
SHA2565c91cc63de571e770ba733fdfa3028544060085323733fce23201385016e5edf
SHA512e8cb7ded1f169bf9c1c3fe408a1d7c2bbb5e6ef6351a9044830b2508cb70cfdb2546ab0f0ee38b731a1a3d046587ad04769c72d92cb0c53cfe07a61a79512881
-
Filesize
3KB
MD5198419d819d8746e075c7c6dd4cc53ae
SHA1abb10e479deb20ed13c153a241b8b9b70ad2fac2
SHA2561f4d749d507f68ab6d970704dfffbcfc5d7a26f080adfe0541bfa5dda4b42669
SHA5123057edd296a87a5b795a1190d6b7d849061d1e0075f5fd323de123e8229d039fe99b142ec30f7fb565b2f44aab2b235d1129872254f9a21e8c4283d35e3b2c6d
-
Filesize
58KB
MD554860c094c7e7a8379665548641462d0
SHA19f1eaad74a62875d308f2a947946b756281210a9
SHA25604b147dad1441b40fd76f6e2b6be5942bea7846740f0ed4f0cb307e032cb004c
SHA512325793327e6137f8467e91e2f9a294ca3356e0885421cf8a9d2098bcddfd09af31a217de5c7a628d5f038aeb82dc9f4f68b9dd12cffcb12b2a763188926f40a6
-
Filesize
93KB
MD54abd64e89f08637f7b5a09e664d5022f
SHA1f0fb5640cbae362da5df7250d3b1fdf1f2c1f99e
SHA256099681aa51fdd7bff43d36ad495e23e1403cfbb51869ca97b536a87fba8eb11c
SHA512e5c7f749c4ae6d1282a224b2781f7a9e702fbbbdc8de150aa2042ee974d7f34f57cc99a0e6a10e363fbec2b69ab9a19037d2cb21ec181d49872d9e78eb4b173d
-
Filesize
68KB
MD5d501cd96aaba0649aacf8e36f4d23618
SHA1ed87bf5ab1ffc115f82431ca82706e114742a572
SHA256c5f4f979127e973f333b15b8bee09fa97125e25501aad7f2ad69568bd77e6d0d
SHA5124a319ef1dc00f09a4566c324a318e87174fa96d6a322f59f4896db8048934236837493bf82abb1e8e45aacf2d4fb513c94daa2a1152b2a2bf6189dfa3834065e
-
Filesize
79KB
MD5d085984d31845ee1481453980cb27330
SHA1c807bf7fe564d8b0ce6c443fe5b03b74e849ed33
SHA25680c2c7bba4315f170997d4f8fa4a977951dd3ca80ec0fcc7a8425d8eb429ce89
SHA51231022f557c57aff90a86d3bc5f55ed71226b8d08f1bfb1b8d93b206f2e91883747653d813d5660b1dd1c99cd80af25d5e97e5242a680582e6021bffd5893895c
-
Filesize
9KB
MD53899bb128e5b294440bb8eecbcf5ac14
SHA1a00b56c237e40ab7885bf694d98496de5623317c
SHA256fae642716dfca375674fc5cae925f8156c0b65f1d146877525ebdff69fcdad02
SHA51202f67ef5b9c8788dbaded76ed2b76680beed49cfb3c51ac2248ab4c1b266a66cba662e66fcfa8359c8a7e087f4f546215d7356ac32416d19acd05cdb281f7661