Analysis
-
max time kernel
179s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe
Resource
win10v2004-20230915-en
General
-
Target
3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe
-
Size
2.1MB
-
MD5
6e55bd680d8801e4f1ec51dc92d1b3c1
-
SHA1
1268967150ccc4485376bd5d2c7cdf7cdff84a52
-
SHA256
3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09
-
SHA512
9ae4b6f817503249988c151f9e8650d7aeb0e93d19c50faa5a658edf09a06984572dbcc43575461986589eeb132c85a8605c74a2813ac8cf98a0c0cbefbc0a88
-
SSDEEP
49152:2SPTEU5sy5LLIklMAZxOQ2k3cgJu825o2:2cT5XlskTZxOfIzJu/C2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2328 x64.exe -
Loads dropped DLL 2 IoCs
pid Process 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 2672 Process not Found -
resource yara_rule behavioral1/memory/1612-8694-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1612-8708-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1612-8722-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1612-8720-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1612-8727-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1612-8741-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1612-8743-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1612-8745-0x0000000000AC0000-0x0000000000ACB000-memory.dmp upx behavioral1/memory/1612-8756-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1612-8758-0x0000000000AC0000-0x0000000000ACB000-memory.dmp upx behavioral1/memory/3020-17461-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17465-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17468-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17471-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17474-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17477-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17480-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17483-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17489-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17491-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17495-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17498-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17501-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17504-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17507-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17510-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17513-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17516-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17519-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17523-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17525-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17526-0x0000000000960000-0x000000000096B000-memory.dmp upx behavioral1/memory/3020-17530-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3020-17532-0x0000000000960000-0x000000000096B000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Multimedia\DrawDib 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Multimedia\DrawDib\ 1280x720x32(BGR 0) = "31,31,31,31" 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\DrawDib 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe Key created \REGISTRY\USER\.DEFAULT\Software 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Multimedia 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 2328 x64.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 3020 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2328 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 29 PID 1612 wrote to memory of 2328 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 29 PID 1612 wrote to memory of 2328 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 29 PID 1612 wrote to memory of 2328 1612 3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe 29 PID 2328 wrote to memory of 420 2328 x64.exe 22 PID 2328 wrote to memory of 420 2328 x64.exe 22 PID 2328 wrote to memory of 420 2328 x64.exe 22 PID 2328 wrote to memory of 420 2328 x64.exe 22 PID 420 wrote to memory of 3020 420 winlogon.exe 31 PID 420 wrote to memory of 3020 420 winlogon.exe 31 PID 420 wrote to memory of 3020 420 winlogon.exe 31 PID 420 wrote to memory of 3020 420 winlogon.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe"C:\Users\Admin\AppData\Local\Temp\3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\x64.exeC:\Users\Admin\AppData\Local\Temp\x64.exe "C:\Users\Admin\AppData\Local\Temp\3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Users\Admin\AppData\Local\Temp\3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exeC:\Users\Admin\AppData\Local\Temp\3fea26b42c6bb87f225fa7b0e65d945708c841c29f40a1509611a304dd45ad09.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD52c938bf20d360971bae15b57e27d86d8
SHA1772398deb3d1b2df3e435cc09096a076fefbc75a
SHA25612aff77ff794ebc5c0d4de2db60c5196ff9c833be7ae28cb71d10713eaf0ae57
SHA512d74550d4915900c3438cb7d5fe161237647638350f961fca23d812eededbb5fc2bb91543bd680c2af8c074ff64fc8015eed49c5774eb520cfcdca5a5303ea629
-
Filesize
16KB
MD52c938bf20d360971bae15b57e27d86d8
SHA1772398deb3d1b2df3e435cc09096a076fefbc75a
SHA25612aff77ff794ebc5c0d4de2db60c5196ff9c833be7ae28cb71d10713eaf0ae57
SHA512d74550d4915900c3438cb7d5fe161237647638350f961fca23d812eededbb5fc2bb91543bd680c2af8c074ff64fc8015eed49c5774eb520cfcdca5a5303ea629
-
Filesize
16KB
MD52c938bf20d360971bae15b57e27d86d8
SHA1772398deb3d1b2df3e435cc09096a076fefbc75a
SHA25612aff77ff794ebc5c0d4de2db60c5196ff9c833be7ae28cb71d10713eaf0ae57
SHA512d74550d4915900c3438cb7d5fe161237647638350f961fca23d812eededbb5fc2bb91543bd680c2af8c074ff64fc8015eed49c5774eb520cfcdca5a5303ea629