Analysis
-
max time kernel
5s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe
Resource
win10v2004-20230915-en
Errors
General
-
Target
9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe
-
Size
744KB
-
MD5
bcbd139349f71c511ce0760279b1a094
-
SHA1
cb0ce2640bd02cadbaf8970e496fabb133eb325c
-
SHA256
9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722
-
SHA512
9b4c9a31387cbd802cd4de6e1e23e8f937f66284ed5dcc515999ac2e1d28b51692a63d26cc2628964b6414a2187afb7a67fd7380c028777e3b3b142b10923832
-
SSDEEP
12288:xYJx0jKaBhqIflDmOSXDl1IfZXxqzWBL:xYJxqK0hdFjSTbIf1xqzW
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Loads dropped DLL 1 IoCs
pid Process 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe -
Kills process with taskkill 7 IoCs
pid Process 3044 taskkill.exe 2188 taskkill.exe 2276 taskkill.exe 2120 taskkill.exe 3004 taskkill.exe 1816 taskkill.exe 1944 taskkill.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.txt\ = "jpegfile" 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.inf\ = "jpegfile" 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "jpegfile" 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "jpegfile" 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe Token: SeShutdownPrivilege 2164 shutdown.exe Token: SeRemoteShutdownPrivilege 2164 shutdown.exe Token: SeDebugPrivilege 3004 taskkill.exe Token: SeDebugPrivilege 1944 taskkill.exe Token: SeDebugPrivilege 3044 taskkill.exe Token: SeDebugPrivilege 2276 taskkill.exe Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 2188 taskkill.exe Token: SeDebugPrivilege 2120 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2356 wrote to memory of 3004 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 28 PID 2356 wrote to memory of 3004 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 28 PID 2356 wrote to memory of 3004 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 28 PID 2356 wrote to memory of 3004 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 28 PID 2356 wrote to memory of 3044 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 32 PID 2356 wrote to memory of 3044 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 32 PID 2356 wrote to memory of 3044 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 32 PID 2356 wrote to memory of 3044 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 32 PID 2356 wrote to memory of 1816 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 30 PID 2356 wrote to memory of 1816 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 30 PID 2356 wrote to memory of 1816 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 30 PID 2356 wrote to memory of 1816 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 30 PID 2356 wrote to memory of 1944 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 31 PID 2356 wrote to memory of 1944 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 31 PID 2356 wrote to memory of 1944 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 31 PID 2356 wrote to memory of 1944 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 31 PID 2356 wrote to memory of 2188 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 36 PID 2356 wrote to memory of 2188 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 36 PID 2356 wrote to memory of 2188 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 36 PID 2356 wrote to memory of 2188 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 36 PID 2356 wrote to memory of 2276 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 37 PID 2356 wrote to memory of 2276 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 37 PID 2356 wrote to memory of 2276 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 37 PID 2356 wrote to memory of 2276 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 37 PID 2356 wrote to memory of 2120 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 39 PID 2356 wrote to memory of 2120 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 39 PID 2356 wrote to memory of 2120 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 39 PID 2356 wrote to memory of 2120 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 39 PID 2356 wrote to memory of 2164 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 42 PID 2356 wrote to memory of 2164 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 42 PID 2356 wrote to memory of 2164 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 42 PID 2356 wrote to memory of 2164 2356 9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe"C:\Users\Admin\AppData\Local\Temp\9882f4e0b1f0e5077870b39437a7d4260d6ffeefe6229291972cf5127a1e3722.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im kavsvc.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rav.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ravmon.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im KVXP.kxp2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Mcshield.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im VsTskMgr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown -s -f2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2664
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5c3b7e89f0988eaaf4ff13a9efa34b4ac
SHA1d72a764135883636329b60d704b0355843a7dd48
SHA256ed4ffb194370b886c22f97bf53250475632933526c62ef35f1b5cd8b538901f3
SHA512dc4b0e7981bc1d3f2107b46ffbeaf60297f54601234fdd1662de55e2043d791c7ab1b3b2748177d52ebfe799ff9317b1ebc3b017fab4dd6b3b912c696148a185