Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24-08-2023 08:16
Static task
static1
Behavioral task
behavioral1
Sample
Scrip.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Scrip.exe
Resource
win10v2004-20230703-en
General
-
Target
Scrip.exe
-
Size
192KB
-
MD5
81cbb0338bea846c1163fc19b5a9c174
-
SHA1
9a9ea1ff3704166d4b76838b17159987e30207e8
-
SHA256
b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
-
SHA512
3bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8
-
SSDEEP
3072:ObhQVe2GRs9ABW7z0QrTauJFFco5cAIp9BAVf2SR3b:HwFs9AsEQfC9jBAVfh
Malware Config
Extracted
buer
https://165.232.118.210/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\9667bc9d886215d21fb7\\gennt.exe\"" gennt.exe -
resource yara_rule behavioral1/memory/1080-0-0x0000000000270000-0x000000000027F000-memory.dmp buer behavioral1/memory/1080-2-0x0000000000220000-0x000000000022D000-memory.dmp buer behavioral1/memory/1080-5-0x0000000040000000-0x000000004000C000-memory.dmp buer behavioral1/memory/2256-16-0x0000000000280000-0x000000000028F000-memory.dmp buer -
Deletes itself 1 IoCs
pid Process 2256 gennt.exe -
Executes dropped EXE 1 IoCs
pid Process 2256 gennt.exe -
Loads dropped DLL 2 IoCs
pid Process 1080 Scrip.exe 1080 Scrip.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: gennt.exe File opened (read-only) \??\Q: gennt.exe File opened (read-only) \??\T: gennt.exe File opened (read-only) \??\B: gennt.exe File opened (read-only) \??\E: gennt.exe File opened (read-only) \??\N: gennt.exe File opened (read-only) \??\S: gennt.exe File opened (read-only) \??\U: gennt.exe File opened (read-only) \??\V: gennt.exe File opened (read-only) \??\X: gennt.exe File opened (read-only) \??\Y: gennt.exe File opened (read-only) \??\A: gennt.exe File opened (read-only) \??\Z: gennt.exe File opened (read-only) \??\L: gennt.exe File opened (read-only) \??\P: gennt.exe File opened (read-only) \??\R: gennt.exe File opened (read-only) \??\H: gennt.exe File opened (read-only) \??\I: gennt.exe File opened (read-only) \??\J: gennt.exe File opened (read-only) \??\K: gennt.exe File opened (read-only) \??\M: gennt.exe File opened (read-only) \??\W: gennt.exe File opened (read-only) \??\G: gennt.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2920 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2920 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2256 1080 Scrip.exe 30 PID 1080 wrote to memory of 2256 1080 Scrip.exe 30 PID 1080 wrote to memory of 2256 1080 Scrip.exe 30 PID 1080 wrote to memory of 2256 1080 Scrip.exe 30 PID 2256 wrote to memory of 2920 2256 gennt.exe 31 PID 2256 wrote to memory of 2920 2256 gennt.exe 31 PID 2256 wrote to memory of 2920 2256 gennt.exe 31 PID 2256 wrote to memory of 2920 2256 gennt.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scrip.exe"C:\Users\Admin\AppData\Local\Temp\Scrip.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\ProgramData\9667bc9d886215d21fb7\gennt.exeC:\ProgramData\9667bc9d886215d21fb7\gennt.exe "C:\Users\Admin\AppData\Local\Temp\Scrip.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Deletes itself
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\9667bc9d886215d21fb7}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD581cbb0338bea846c1163fc19b5a9c174
SHA19a9ea1ff3704166d4b76838b17159987e30207e8
SHA256b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
SHA5123bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8
-
Filesize
192KB
MD581cbb0338bea846c1163fc19b5a9c174
SHA19a9ea1ff3704166d4b76838b17159987e30207e8
SHA256b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
SHA5123bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8
-
Filesize
192KB
MD581cbb0338bea846c1163fc19b5a9c174
SHA19a9ea1ff3704166d4b76838b17159987e30207e8
SHA256b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
SHA5123bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8
-
Filesize
192KB
MD581cbb0338bea846c1163fc19b5a9c174
SHA19a9ea1ff3704166d4b76838b17159987e30207e8
SHA256b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
SHA5123bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8
-
Filesize
192KB
MD581cbb0338bea846c1163fc19b5a9c174
SHA19a9ea1ff3704166d4b76838b17159987e30207e8
SHA256b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
SHA5123bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8