Analysis
-
max time kernel
228s -
max time network
255s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2023 17:29
Static task
static1
Behavioral task
behavioral1
Sample
levelcomputer/levelcomputer.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
levelcomputer/levelcomputer.exe
Resource
win10v2004-20230703-en
General
-
Target
levelcomputer/levelcomputer.exe
-
Size
192.4MB
-
MD5
760e4dfcad56f67f80ec4b2def63de69
-
SHA1
0af7b525ac681f37e6e2d80864a5884d1ff76711
-
SHA256
86a046300c03712f3d07e9c0e50369937b77a7e8183f3e40574da5de7fc5ce6e
-
SHA512
bdfeb7e1ce7dc861c853708675024f16ef301081f1cb1e8dc31d7f772d8950984b13e973fbbf1d5ca9b10a28b3e8d6de4da5ef33a6f729be462d2d7119acc705
-
SSDEEP
6291456:RwNK18un4nZCbavGsedutVPsHdPa1UlcF:6NK6tZ6avyutVmd0U
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
BCUninstaller_5_6_setup_1.exeBCUninstaller_5_6_setup_1.exeBCUninstaller_5_6_setup_1.exeAlwaysMouseWheel_11.exepid process 4396 BCUninstaller_5_6_setup_1.exe 4976 BCUninstaller_5_6_setup_1.exe 1836 BCUninstaller_5_6_setup_1.exe 656 AlwaysMouseWheel_11.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
levelcomputer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" levelcomputer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
BCUninstaller_5_6_setup_1.exedescription pid process target process PID 4396 set thread context of 1836 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1484 1836 WerFault.exe BCUninstaller_5_6_setup_1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
BCUninstaller_5_6_setup_1.exepid process 4396 BCUninstaller_5_6_setup_1.exe 4396 BCUninstaller_5_6_setup_1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
BCUninstaller_5_6_setup_1.exeAlwaysMouseWheel_11.exedescription pid process Token: SeDebugPrivilege 4396 BCUninstaller_5_6_setup_1.exe Token: SeDebugPrivilege 656 AlwaysMouseWheel_11.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
levelcomputer.exeBCUninstaller_5_6_setup_1.exedescription pid process target process PID 4392 wrote to memory of 4396 4392 levelcomputer.exe BCUninstaller_5_6_setup_1.exe PID 4392 wrote to memory of 4396 4392 levelcomputer.exe BCUninstaller_5_6_setup_1.exe PID 4392 wrote to memory of 4396 4392 levelcomputer.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 4976 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 4976 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 4976 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 1836 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 1836 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 1836 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 1836 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 1836 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 1836 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 1836 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 1836 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4396 wrote to memory of 1836 4396 BCUninstaller_5_6_setup_1.exe BCUninstaller_5_6_setup_1.exe PID 4392 wrote to memory of 656 4392 levelcomputer.exe AlwaysMouseWheel_11.exe PID 4392 wrote to memory of 656 4392 levelcomputer.exe AlwaysMouseWheel_11.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\levelcomputer\levelcomputer.exe"C:\Users\Admin\AppData\Local\Temp\levelcomputer\levelcomputer.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BCUninstaller_5_6_setup_1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BCUninstaller_5_6_setup_1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BCUninstaller_5_6_setup_1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BCUninstaller_5_6_setup_1.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BCUninstaller_5_6_setup_1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BCUninstaller_5_6_setup_1.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 13204⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AlwaysMouseWheel_11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AlwaysMouseWheel_11.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1836 -ip 18361⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AlwaysMouseWheel_11.exeFilesize
97.1MB
MD5844237faf062b40db4f3a4ea9e6af10f
SHA1459cbe03e3ff110a1b678e1a3ec8de51ae1da167
SHA2569c901e9994b0ae477c4d202fd004c84977281602f50a98f80f4480389f195c6a
SHA512d6d9f94e0f2846b18649738dd48fa455ca6e169231a1eda310cd7006371c022f15b89ab94ac43862e5c8311c151beff5d88d7bad71774dbe50bc997e674fe826
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AlwaysMouseWheel_11.exeFilesize
97.1MB
MD5844237faf062b40db4f3a4ea9e6af10f
SHA1459cbe03e3ff110a1b678e1a3ec8de51ae1da167
SHA2569c901e9994b0ae477c4d202fd004c84977281602f50a98f80f4480389f195c6a
SHA512d6d9f94e0f2846b18649738dd48fa455ca6e169231a1eda310cd7006371c022f15b89ab94ac43862e5c8311c151beff5d88d7bad71774dbe50bc997e674fe826
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BCUninstaller_5_6_setup_1.exeFilesize
95.2MB
MD51edc7e9e4c0c5663920395836d17ec82
SHA1f68a7c5495ca3561c22a75cc998e3854608f6f38
SHA2563c92c0a47becd2efa579fb3eaa06dd711a55f4a2cdb9a0311492da2205b1e446
SHA512d595dfdfac98a135c27bb8acea7b8e67d40cec785a51d1b1256d7bdfaff7940372918faa55b93280aca96c45cc7c05264b135acc51ebade24d3523e92469f2a3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BCUninstaller_5_6_setup_1.exeFilesize
95.2MB
MD51edc7e9e4c0c5663920395836d17ec82
SHA1f68a7c5495ca3561c22a75cc998e3854608f6f38
SHA2563c92c0a47becd2efa579fb3eaa06dd711a55f4a2cdb9a0311492da2205b1e446
SHA512d595dfdfac98a135c27bb8acea7b8e67d40cec785a51d1b1256d7bdfaff7940372918faa55b93280aca96c45cc7c05264b135acc51ebade24d3523e92469f2a3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BCUninstaller_5_6_setup_1.exeFilesize
95.2MB
MD51edc7e9e4c0c5663920395836d17ec82
SHA1f68a7c5495ca3561c22a75cc998e3854608f6f38
SHA2563c92c0a47becd2efa579fb3eaa06dd711a55f4a2cdb9a0311492da2205b1e446
SHA512d595dfdfac98a135c27bb8acea7b8e67d40cec785a51d1b1256d7bdfaff7940372918faa55b93280aca96c45cc7c05264b135acc51ebade24d3523e92469f2a3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BCUninstaller_5_6_setup_1.exeFilesize
95.2MB
MD51edc7e9e4c0c5663920395836d17ec82
SHA1f68a7c5495ca3561c22a75cc998e3854608f6f38
SHA2563c92c0a47becd2efa579fb3eaa06dd711a55f4a2cdb9a0311492da2205b1e446
SHA512d595dfdfac98a135c27bb8acea7b8e67d40cec785a51d1b1256d7bdfaff7940372918faa55b93280aca96c45cc7c05264b135acc51ebade24d3523e92469f2a3
-
memory/656-1073-0x00007FFAD3C10000-0x00007FFAD46D1000-memory.dmpFilesize
10.8MB
-
memory/656-2121-0x00000253EB240000-0x00000253EB241000-memory.dmpFilesize
4KB
-
memory/656-1076-0x00000253EB230000-0x00000253EB240000-memory.dmpFilesize
64KB
-
memory/656-1072-0x00000253EB230000-0x00000253EB240000-memory.dmpFilesize
64KB
-
memory/656-1071-0x00000253E4B90000-0x00000253EACAC000-memory.dmpFilesize
97.1MB
-
memory/656-1069-0x00007FFAD3C10000-0x00007FFAD46D1000-memory.dmpFilesize
10.8MB
-
memory/1836-1065-0x0000000000400000-0x0000000000464000-memory.dmpFilesize
400KB
-
memory/1836-1070-0x0000000000400000-0x0000000000464000-memory.dmpFilesize
400KB
-
memory/4396-40-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-58-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-20-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-22-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-24-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-26-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-28-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-30-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-32-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-34-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-36-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-38-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-16-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-42-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-44-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-46-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-48-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-50-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-52-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-54-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-56-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-18-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-60-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-62-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-64-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-66-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-68-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-70-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-72-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-74-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-175-0x000000000AC30000-0x000000000AC40000-memory.dmpFilesize
64KB
-
memory/4396-14-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-11-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-12-0x000000000BFB0000-0x000000000C092000-memory.dmpFilesize
904KB
-
memory/4396-10-0x0000000074AB0000-0x0000000075260000-memory.dmpFilesize
7.7MB
-
memory/4396-9-0x000000000AC30000-0x000000000AC40000-memory.dmpFilesize
64KB
-
memory/4396-8-0x00000000002B0000-0x00000000061F4000-memory.dmpFilesize
95.3MB
-
memory/4396-7-0x0000000074AB0000-0x0000000075260000-memory.dmpFilesize
7.7MB
-
memory/4396-1056-0x000000000B4F0000-0x000000000B4F1000-memory.dmpFilesize
4KB
-
memory/4396-1057-0x000000000CBF0000-0x000000000D194000-memory.dmpFilesize
5.6MB
-
memory/4396-1064-0x0000000074AB0000-0x0000000075260000-memory.dmpFilesize
7.7MB