Analysis
-
max time kernel
86s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2023 13:24
Static task
static1
Behavioral task
behavioral1
Sample
BackUpDongle.exe
Resource
win10v2004-20230703-en
General
-
Target
BackUpDongle.exe
-
Size
2.4MB
-
MD5
1f00ebec1f321ab83b3816338b4afbc6
-
SHA1
03ca0085bcf19aa6cbb9703aae58301864d093ea
-
SHA256
97a602f1a2b1c4c0ad3fc9cf7ed620c374ee23663aa419ec76349607538865c8
-
SHA512
0a7aa88cfe5bb97975fc806a1b79305ad883389a66c528425313cf6e1021a8da24ad7cc0067acdc38f24d38abe8a984c5c5d873524f3f793cd5740bc74b2dac8
-
SSDEEP
24576:Q4nXubIQGyxbPV0db26SoBk7YvOf66CXBiNnajc7DOfyeJLRh7zsDBSnk25cbPy/:Qqe3f69Gf63sao7DkLRVz2w5qjnpxsb
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3600 BackUpDongle.tmp 840 devcon.exe 3180 devcon.exe 4516 devcon.exe 1232 devcon.exe 3456 devcon.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{86df303f-1eab-f149-b94a-75c3a12a0f10}\SETBF1A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{86df303f-1eab-f149-b94a-75c3a12a0f10}\SETBF3B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{86df303f-1eab-f149-b94a-75c3a12a0f10} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{86df303f-1eab-f149-b94a-75c3a12a0f10}\SETBF1A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{86df303f-1eab-f149-b94a-75c3a12a0f10}\Mkbus.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{86df303f-1eab-f149-b94a-75c3a12a0f10}\SETBF3A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{86df303f-1eab-f149-b94a-75c3a12a0f10}\SETBF3A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{86df303f-1eab-f149-b94a-75c3a12a0f10}\mkbus.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{86df303f-1eab-f149-b94a-75c3a12a0f10}\SETBF3B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{86df303f-1eab-f149-b94a-75c3a12a0f10}\Mkbuz.sys DrvInst.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log devcon.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3600 BackUpDongle.tmp 3600 BackUpDongle.tmp -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeAuditPrivilege 2408 svchost.exe Token: SeSecurityPrivilege 2408 svchost.exe Token: SeLoadDriverPrivilege 3456 devcon.exe Token: SeLoadDriverPrivilege 2232 DrvInst.exe Token: SeLoadDriverPrivilege 2232 DrvInst.exe Token: SeLoadDriverPrivilege 2232 DrvInst.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3600 BackUpDongle.tmp -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2032 wrote to memory of 3600 2032 BackUpDongle.exe 82 PID 2032 wrote to memory of 3600 2032 BackUpDongle.exe 82 PID 2032 wrote to memory of 3600 2032 BackUpDongle.exe 82 PID 3600 wrote to memory of 840 3600 BackUpDongle.tmp 90 PID 3600 wrote to memory of 840 3600 BackUpDongle.tmp 90 PID 3600 wrote to memory of 3180 3600 BackUpDongle.tmp 92 PID 3600 wrote to memory of 3180 3600 BackUpDongle.tmp 92 PID 3600 wrote to memory of 4516 3600 BackUpDongle.tmp 94 PID 3600 wrote to memory of 4516 3600 BackUpDongle.tmp 94 PID 3600 wrote to memory of 1232 3600 BackUpDongle.tmp 96 PID 3600 wrote to memory of 1232 3600 BackUpDongle.tmp 96 PID 3600 wrote to memory of 3456 3600 BackUpDongle.tmp 98 PID 3600 wrote to memory of 3456 3600 BackUpDongle.tmp 98 PID 2408 wrote to memory of 2204 2408 svchost.exe 101 PID 2408 wrote to memory of 2204 2408 svchost.exe 101 PID 2408 wrote to memory of 2232 2408 svchost.exe 102 PID 2408 wrote to memory of 2232 2408 svchost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\BackUpDongle.exe"C:\Users\Admin\AppData\Local\Temp\BackUpDongle.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\is-PH66Q.tmp\BackUpDongle.tmp"C:\Users\Admin\AppData\Local\Temp\is-PH66Q.tmp\BackUpDongle.tmp" /SL5="$701EA,1620061,1337344,C:\Users\Admin\AppData\Local\Temp\BackUpDongle.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\is-MP7BJ.tmp\devcon.exe"C:\Users\Admin\AppData\Local\Temp\is-MP7BJ.tmp\devcon.exe" remove root\multikey3⤵
- Executes dropped EXE
PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\is-MP7BJ.tmp\devcon.exe"C:\Users\Admin\AppData\Local\Temp\is-MP7BJ.tmp\devcon.exe" disable root\Mkbus3⤵
- Executes dropped EXE
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\is-MP7BJ.tmp\devcon.exe"C:\Users\Admin\AppData\Local\Temp\is-MP7BJ.tmp\devcon.exe" disable root\Mkbuz3⤵
- Executes dropped EXE
PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\is-MP7BJ.tmp\devcon.exe"C:\Users\Admin\AppData\Local\Temp\is-MP7BJ.tmp\devcon.exe" remove root\Mkbus3⤵
- Executes dropped EXE
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\is-MP7BJ.tmp\devcon.exe"C:\Users\Admin\AppData\Local\Temp\is-MP7BJ.tmp\devcon.exe" install Mkbus.inf root\Mkbus3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{932c79bf-7892-ef4a-9d33-d47e1c4fe55e}\mkbus.inf" "9" "4200a6b1b" "0000000000000158" "WinSta0\Default" "0000000000000100" "208" "c:\users\admin\appdata\local\temp\is-mp7bj.tmp"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2204
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "3" "1" "ROOT\SYSTEM\0001" "" "" "4200a6b1b" "0000000000000158"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD524fa055a86ceea072292ebfb70855806
SHA1ef00cf44dcb3878031bc61c950140fd57d333e45
SHA256f34fec14b7798861296322d72d147ce9081e0e37bd8cead7797c98d123544804
SHA51202d8e284bdc01d96c7dc899d1652535a38d323b88207bd0b24ba87adec5373bb9b0a9d994a2bf60fd8c7a593d99cd305ce9e3ff85d44a9bfd65fb7fdc71ed8a9
-
Filesize
81KB
MD5816c4e245b286b4e4903131f75a94948
SHA1eda70c1fc8a461efb0e376d42e35a72b96175e4d
SHA256aca1bda08690dcca930254f96f9185c776671a85a58ffa1b59cf16017546f218
SHA512d0dc74956c57403c0638e6595aaf1c2eb75233997a15170b064261a5d3f1f525a3e35e13fef04c36cc20fd1d5d1cf000a5fb7a646bf2cf1cea73817e5d3335b3
-
Filesize
81KB
MD5816c4e245b286b4e4903131f75a94948
SHA1eda70c1fc8a461efb0e376d42e35a72b96175e4d
SHA256aca1bda08690dcca930254f96f9185c776671a85a58ffa1b59cf16017546f218
SHA512d0dc74956c57403c0638e6595aaf1c2eb75233997a15170b064261a5d3f1f525a3e35e13fef04c36cc20fd1d5d1cf000a5fb7a646bf2cf1cea73817e5d3335b3
-
Filesize
81KB
MD5816c4e245b286b4e4903131f75a94948
SHA1eda70c1fc8a461efb0e376d42e35a72b96175e4d
SHA256aca1bda08690dcca930254f96f9185c776671a85a58ffa1b59cf16017546f218
SHA512d0dc74956c57403c0638e6595aaf1c2eb75233997a15170b064261a5d3f1f525a3e35e13fef04c36cc20fd1d5d1cf000a5fb7a646bf2cf1cea73817e5d3335b3
-
Filesize
81KB
MD5816c4e245b286b4e4903131f75a94948
SHA1eda70c1fc8a461efb0e376d42e35a72b96175e4d
SHA256aca1bda08690dcca930254f96f9185c776671a85a58ffa1b59cf16017546f218
SHA512d0dc74956c57403c0638e6595aaf1c2eb75233997a15170b064261a5d3f1f525a3e35e13fef04c36cc20fd1d5d1cf000a5fb7a646bf2cf1cea73817e5d3335b3
-
Filesize
81KB
MD5816c4e245b286b4e4903131f75a94948
SHA1eda70c1fc8a461efb0e376d42e35a72b96175e4d
SHA256aca1bda08690dcca930254f96f9185c776671a85a58ffa1b59cf16017546f218
SHA512d0dc74956c57403c0638e6595aaf1c2eb75233997a15170b064261a5d3f1f525a3e35e13fef04c36cc20fd1d5d1cf000a5fb7a646bf2cf1cea73817e5d3335b3
-
Filesize
81KB
MD5816c4e245b286b4e4903131f75a94948
SHA1eda70c1fc8a461efb0e376d42e35a72b96175e4d
SHA256aca1bda08690dcca930254f96f9185c776671a85a58ffa1b59cf16017546f218
SHA512d0dc74956c57403c0638e6595aaf1c2eb75233997a15170b064261a5d3f1f525a3e35e13fef04c36cc20fd1d5d1cf000a5fb7a646bf2cf1cea73817e5d3335b3
-
Filesize
3.4MB
MD5e024835477eb922c12d453fd28d943a3
SHA1ae50777e1fb17616063ef60d7f88ab8ba834f516
SHA2565aea88f4df80da0c97bc8d5d08fba59b4c862359b65875a6508545ac32b88a9e
SHA5125512231052d87191d59e998da54eca2be0458aa004b55628da81adcc39fbc46eb01e608cfe1022b6d62b2fa38a91c750975e2ffbc59dbd41ab6bf3bbde79f704
-
Filesize
2KB
MD58aa6a0572cc918591ecbdf71aaaa749a
SHA1e9faff5dd36bb14957b86ed8bf4162b2f2c01425
SHA256227a95aa5fb730a37206249a195f04e973c45bea3bcdac2e016b892c129cb7d9
SHA5126e3d26190fb311705816d23e62f9ba10d8ada98a55e7ddcaa6e66412c6ca229d12c636e588081b2eb8cbe1763616421290dd4897c4ea9d389841c243c94c2df9
-
Filesize
50KB
MD5cedf5ecdec3cf71408a7084b1631dd9a
SHA1f1eb4641bb4ef0530862ba98f2c99251cbb821e7
SHA256645bd9acbe06c8f4862934e8107a92af33e097b3ee40a6c55420781f8cc4c13a
SHA51270101e83fe6ccce8861ad9d3624ec9979623a46ae5de7be2888257a49ff3a68359f47809d6e409023ff7e2a0f9ab30275a03cc91a40473d5089e05c39c5aa0b5
-
Filesize
2KB
MD58aa6a0572cc918591ecbdf71aaaa749a
SHA1e9faff5dd36bb14957b86ed8bf4162b2f2c01425
SHA256227a95aa5fb730a37206249a195f04e973c45bea3bcdac2e016b892c129cb7d9
SHA5126e3d26190fb311705816d23e62f9ba10d8ada98a55e7ddcaa6e66412c6ca229d12c636e588081b2eb8cbe1763616421290dd4897c4ea9d389841c243c94c2df9
-
Filesize
50KB
MD5cedf5ecdec3cf71408a7084b1631dd9a
SHA1f1eb4641bb4ef0530862ba98f2c99251cbb821e7
SHA256645bd9acbe06c8f4862934e8107a92af33e097b3ee40a6c55420781f8cc4c13a
SHA51270101e83fe6ccce8861ad9d3624ec9979623a46ae5de7be2888257a49ff3a68359f47809d6e409023ff7e2a0f9ab30275a03cc91a40473d5089e05c39c5aa0b5
-
Filesize
1KB
MD524fa055a86ceea072292ebfb70855806
SHA1ef00cf44dcb3878031bc61c950140fd57d333e45
SHA256f34fec14b7798861296322d72d147ce9081e0e37bd8cead7797c98d123544804
SHA51202d8e284bdc01d96c7dc899d1652535a38d323b88207bd0b24ba87adec5373bb9b0a9d994a2bf60fd8c7a593d99cd305ce9e3ff85d44a9bfd65fb7fdc71ed8a9
-
Filesize
1KB
MD524fa055a86ceea072292ebfb70855806
SHA1ef00cf44dcb3878031bc61c950140fd57d333e45
SHA256f34fec14b7798861296322d72d147ce9081e0e37bd8cead7797c98d123544804
SHA51202d8e284bdc01d96c7dc899d1652535a38d323b88207bd0b24ba87adec5373bb9b0a9d994a2bf60fd8c7a593d99cd305ce9e3ff85d44a9bfd65fb7fdc71ed8a9
-
Filesize
2KB
MD58aa6a0572cc918591ecbdf71aaaa749a
SHA1e9faff5dd36bb14957b86ed8bf4162b2f2c01425
SHA256227a95aa5fb730a37206249a195f04e973c45bea3bcdac2e016b892c129cb7d9
SHA5126e3d26190fb311705816d23e62f9ba10d8ada98a55e7ddcaa6e66412c6ca229d12c636e588081b2eb8cbe1763616421290dd4897c4ea9d389841c243c94c2df9
-
Filesize
50KB
MD5cedf5ecdec3cf71408a7084b1631dd9a
SHA1f1eb4641bb4ef0530862ba98f2c99251cbb821e7
SHA256645bd9acbe06c8f4862934e8107a92af33e097b3ee40a6c55420781f8cc4c13a
SHA51270101e83fe6ccce8861ad9d3624ec9979623a46ae5de7be2888257a49ff3a68359f47809d6e409023ff7e2a0f9ab30275a03cc91a40473d5089e05c39c5aa0b5