Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe
Resource
win10v2004-20230831-en
General
-
Target
637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe
-
Size
10.4MB
-
MD5
84796e07282372bae2ed1aa21affcbd3
-
SHA1
67e222d75dd5c883d63657e4ced70b61d51c8ca6
-
SHA256
637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081
-
SHA512
061fdf2cdaef086aeff025847c8ad4db51327ce9a5216c30ffafea1ea10ea53ae3ec0e6538244fff9c7147bc5149de5ed458ee5d045b155459465787c56be1ff
-
SSDEEP
196608:2wrl5k649Or44vZMlBNb6OaPsP5H7JPAqNleWcqgfIDWdkPgDF/DBmWx91QZclZ:vx504hMlBN2HPYVyWM4sQQxBmWycl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2540 sg.tmp 1344 start.exe -
Loads dropped DLL 11 IoCs
pid Process 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 2952 WerFault.exe 2952 WerFault.exe 2952 WerFault.exe 2952 WerFault.exe 2952 WerFault.exe 2952 WerFault.exe 2952 WerFault.exe 2952 WerFault.exe 2952 WerFault.exe -
resource yara_rule behavioral1/files/0x00080000000193ac-26.dat vmprotect behavioral1/files/0x00080000000193ac-27.dat vmprotect behavioral1/memory/2304-29-0x0000000002DB0000-0x00000000036A5000-memory.dmp vmprotect behavioral1/files/0x00080000000193ac-28.dat vmprotect behavioral1/memory/1344-30-0x0000000000400000-0x0000000000CF5000-memory.dmp vmprotect behavioral1/memory/1344-31-0x0000000000400000-0x0000000000CF5000-memory.dmp vmprotect behavioral1/memory/1344-32-0x0000000000400000-0x0000000000CF5000-memory.dmp vmprotect behavioral1/memory/1344-33-0x0000000000400000-0x0000000000CF5000-memory.dmp vmprotect behavioral1/memory/1344-34-0x0000000000400000-0x0000000000CF5000-memory.dmp vmprotect behavioral1/memory/1344-35-0x0000000000400000-0x0000000000CF5000-memory.dmp vmprotect behavioral1/memory/1344-36-0x0000000000400000-0x0000000000CF5000-memory.dmp vmprotect behavioral1/memory/1344-37-0x0000000000400000-0x0000000000CF5000-memory.dmp vmprotect behavioral1/files/0x00080000000193ac-45.dat vmprotect behavioral1/files/0x00080000000193ac-44.dat vmprotect behavioral1/files/0x00080000000193ac-43.dat vmprotect behavioral1/files/0x00080000000193ac-42.dat vmprotect behavioral1/files/0x00080000000193ac-41.dat vmprotect behavioral1/files/0x00080000000193ac-40.dat vmprotect behavioral1/files/0x00080000000193ac-39.dat vmprotect behavioral1/files/0x00080000000193ac-38.dat vmprotect behavioral1/files/0x00080000000193ac-46.dat vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1344 start.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Silverlighte 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe File opened for modification C:\Program Files (x86)\Microsoft Silverlighte\medge.exe sg.tmp File created C:\Program Files (x86)\Microsoft Silverlighte\SmadHook32.dll sg.tmp File opened for modification C:\Program Files (x86)\Microsoft Silverlighte\start.exe sg.tmp File opened for modification C:\Program Files (x86)\Microsoft Silverlighte\SmadHook32.dll 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe File created C:\Program Files (x86)\Microsoft Silverlighte\medge.exe sg.tmp File opened for modification C:\Program Files (x86)\Microsoft Silverlighte\SmadHook32.dll sg.tmp File created C:\Program Files (x86)\Microsoft Silverlighte\start.exe sg.tmp File opened for modification C:\Program Files (x86)\Microsoft Silverlighte\medge.exe 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe File opened for modification C:\Program Files (x86)\Microsoft Silverlighte\start.exe 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2952 1344 WerFault.exe 33 -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS start.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer start.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Wow6432Node\Interface\{335D7791-3407-3911-3A45-37DF20D5318E} start.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Wow6432Node start.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Wow6432Node\Interface start.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Wow6432Node\Interface\{335D7791-3407-3911-3A45-37DF20D5318E}\ = "JcNbNckQCYkZeKNvyCpc4hHS0U/kukq1ZuCOEf4JPCCN1CfF6m78mz68UjXEEAiJGXiLb6oquN8qy8hP37pJtWbgdhHgCZgdjdQnxepu/JuiASUE72sitTaXOUHc70JM" start.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\Wow6432Node\Interface\{335D7791-3407-3911-3A45-37DF20D5318E}\ = "JcNbNckQCYkZeKNvyCpc4hHS0U/kukq1ZuCOEf4JPCCO1CfF6m78mz68UjXEEAiJGXiLb6oquN8qy8hP37pJtWbgdhHgCZgdjdQnxepu/Jt0N3W6VcJztoqWr4kpzZLp" start.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeBackupPrivilege 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeRestorePrivilege 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: 33 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeIncBasePriorityPrivilege 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeCreateGlobalPrivilege 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: 33 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeIncBasePriorityPrivilege 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: 33 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeIncBasePriorityPrivilege 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeBackupPrivilege 2604 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeRestorePrivilege 2604 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: 33 2604 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeIncBasePriorityPrivilege 2604 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: 33 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeIncBasePriorityPrivilege 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeRestorePrivilege 2540 sg.tmp Token: 35 2540 sg.tmp Token: SeSecurityPrivilege 2540 sg.tmp Token: SeSecurityPrivilege 2540 sg.tmp Token: 33 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe Token: SeIncBasePriorityPrivilege 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2292 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 28 PID 2304 wrote to memory of 2292 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 28 PID 2304 wrote to memory of 2292 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 28 PID 2304 wrote to memory of 2292 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 28 PID 2304 wrote to memory of 2604 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 30 PID 2304 wrote to memory of 2604 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 30 PID 2304 wrote to memory of 2604 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 30 PID 2304 wrote to memory of 2604 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 30 PID 2304 wrote to memory of 2540 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 31 PID 2304 wrote to memory of 2540 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 31 PID 2304 wrote to memory of 2540 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 31 PID 2304 wrote to memory of 2540 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 31 PID 2304 wrote to memory of 1344 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 33 PID 2304 wrote to memory of 1344 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 33 PID 2304 wrote to memory of 1344 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 33 PID 2304 wrote to memory of 1344 2304 637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe 33 PID 1344 wrote to memory of 2952 1344 start.exe 34 PID 1344 wrote to memory of 2952 1344 start.exe 34 PID 1344 wrote to memory of 2952 1344 start.exe 34 PID 1344 wrote to memory of 2952 1344 start.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe"C:\Users\Admin\AppData\Local\Temp\637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\cmd.execmd.exe /c set2⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exePECMD**pecmd-cmd* PUTF -dd -skipb=1451520 -len=9436312 "C:\Users\Admin\AppData\Local\Temp\~4461100765006391441.tmp",,C:\Users\Admin\AppData\Local\Temp\637d62d016af674a34e693a9f7228a918fb990810e4093129c316d83f9761081.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\~2468798888837998473~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~4461100765006391441.tmp" -y -aos -o"C:\Program Files (x86)\Microsoft Silverlighte" -prfhujhfud46565752⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Program Files (x86)\Microsoft Silverlighte\start.exe"C:\Program Files (x86)\Microsoft Silverlighte\start.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 2243⤵
- Loads dropped DLL
- Program crash
PID:2952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD53e2572a78b02cb604c7238630f3e9bb1
SHA194f03a5e119db20d788461674fb83b65fa6ccfbb
SHA25668629a8f89577a69e84d91d868fc42e70c19da6f8e2b0be084c769f22cdc01dd
SHA5123f2653911a68df4ef653417fadf6aeec25f68a1cd401728e9a6c7f2b9abdbdb30e00cd40b7e868a6b3d9e18eab5257f92510e142cdf7c80b6305a789efce59d7
-
Filesize
77KB
MD5b830cd1b49bd31bcdb6192c20cf0b141
SHA1b9629fdd735956772e9a3ceedcdb829bba6f8a43
SHA25621d34a02ec28e9bd6f7b2f96ac7921f5ef08d291416b38a3fc8cf651f11fc820
SHA5120ffef5b2681e57d3586b878bbf174a667423cd30e75a7f4ef60910922b2f9e3e02af309a7c3f15b70a42b747445513df43ce651dcb85bec7b94bfed6a7704ccd
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
9.0MB
MD526d6134ea429400bc03b54218f29d702
SHA1800b2c06dde16cb8cb52f53a1df0dacac503e4ff
SHA256e73fdf3bd6f73256eb40c60d853bce2c0f2be7992c84f32a33bd91d66525099b
SHA5122fbd2f4fbd617d613d0f18982b98a63819585522dde3aed9f658554f390923b25f7df59d613a9d64be5a6abd0ad16bbff6ef170b21d201c7b7dd9d871074928d
-
Filesize
9.0MB
MD526d6134ea429400bc03b54218f29d702
SHA1800b2c06dde16cb8cb52f53a1df0dacac503e4ff
SHA256e73fdf3bd6f73256eb40c60d853bce2c0f2be7992c84f32a33bd91d66525099b
SHA5122fbd2f4fbd617d613d0f18982b98a63819585522dde3aed9f658554f390923b25f7df59d613a9d64be5a6abd0ad16bbff6ef170b21d201c7b7dd9d871074928d
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
3.3MB
MD533212f515d53d7e6e0ff01fa1e3e1691
SHA1ca4fdb8661429226a3df0a8332fc3296795c1d9b
SHA256bc31fe85fc56b1bf6d0f71f23e1f9f543eafa73a26269af364334cd478df2345
SHA5125dfe4335c97b3efd589adaf14ac46d3034b1640d3191f94cfe3307680011621768b67743a7c4d088240a7605f1506608ace8bd0a84231761d5bec120c3b79b18
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516