Analysis
-
max time kernel
151s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 03:35
Behavioral task
behavioral1
Sample
f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe
Resource
win10v2004-20231020-en
General
-
Target
f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe
-
Size
4.3MB
-
MD5
6f100fd99236d88d87408239b808695d
-
SHA1
8c8a22a6c5274285ef86308fcea772407b7dcb1c
-
SHA256
f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3
-
SHA512
7fc3b46eafec82359c0bf539cb8bf798f9f2f9dcc956d44cb37c5313e91b16aff3ef6964418d4485400a6ea24094d7651c8dff382312335f733b9b1440970008
-
SSDEEP
49152:OQ6nZ5QZuTtS0rQMYOQ+q8CEvQ6ngQ6nx9KFeMkFd////z9qw:B6ZWsM0r1QnJ6X6x0FefFd////z9qw
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\8ahuD8kDM.sys pcalua.exe -
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 pcalua.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\ \Windows\System32\utobdru.sys pcalua.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\bc05op.sys pcalua.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2892 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\New Windows\Allow pcalua.exe Set value (data) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\New Windows\Allow\www.hao774.com pcalua.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 pcalua.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 pcalua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1228 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Token: SeTcbPrivilege 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Token: SeDebugPrivilege 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Token: SeDebugPrivilege 1228 Explorer.EXE Token: SeDebugPrivilege 1228 Explorer.EXE Token: SeDebugPrivilege 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Token: SeDebugPrivilege 2744 pcalua.exe Token: SeDebugPrivilege 2744 pcalua.exe Token: SeDebugPrivilege 2744 pcalua.exe Token: SeIncBasePriorityPrivilege 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Token: SeDebugPrivilege 2744 pcalua.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe 2744 pcalua.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2744 pcalua.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1228 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 14 PID 2052 wrote to memory of 1228 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 14 PID 2052 wrote to memory of 1228 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 14 PID 2052 wrote to memory of 1228 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 14 PID 2052 wrote to memory of 1228 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 14 PID 1228 wrote to memory of 2744 1228 Explorer.EXE 28 PID 1228 wrote to memory of 2744 1228 Explorer.EXE 28 PID 1228 wrote to memory of 2744 1228 Explorer.EXE 28 PID 1228 wrote to memory of 2744 1228 Explorer.EXE 28 PID 1228 wrote to memory of 2744 1228 Explorer.EXE 28 PID 1228 wrote to memory of 2744 1228 Explorer.EXE 28 PID 1228 wrote to memory of 2744 1228 Explorer.EXE 28 PID 1228 wrote to memory of 2744 1228 Explorer.EXE 28 PID 2052 wrote to memory of 420 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 3 PID 2052 wrote to memory of 420 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 3 PID 2052 wrote to memory of 420 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 3 PID 2052 wrote to memory of 420 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 3 PID 2052 wrote to memory of 420 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 3 PID 2052 wrote to memory of 2540 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 32 PID 2052 wrote to memory of 2540 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 32 PID 2052 wrote to memory of 2540 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 32 PID 2052 wrote to memory of 2540 2052 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 32 PID 2540 wrote to memory of 2892 2540 cmd.exe 34 PID 2540 wrote to memory of 2892 2540 cmd.exe 34 PID 2540 wrote to memory of 2892 2540 cmd.exe 34 PID 2540 wrote to memory of 2892 2540 cmd.exe 34 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14 PID 2744 wrote to memory of 1228 2744 pcalua.exe 14
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe"C:\Users\Admin\AppData\Local\Temp\f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe"2⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:2892
-
-
-
-
C:\pcalua.exe"C:\pcalua.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56921ea732fc80242cc48fc41ae25254f
SHA152cab49748521ba319eecfbfd0b850d97d359711
SHA256340f53c0727aa63b11f1de3bf5e448db303fc1fd4f7f8cd96dd354c2a617fc6d
SHA5125e6f422bb10eefcba587f21fd7c124d76b80c7024ec736ed2b00c2b533b4bc8ee36d143b9994525139382be7f7a40792843a5f15df870df7b65a54ca1a3944ef
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
9KB
MD52549089234e799d510296d327ea2b679
SHA1280038828c2412f3867ddb22e07759cb26f7d8ea
SHA256823d3530fc8b4a8069c7b70fd5eb393ac789bae6cda07652cc4f341461c66d48
SHA512a2dc06f15a1a6d388eebc58621541187fca938bb2d5740f37674df1e28009127284ac36a7c05d0451ab232b9a3c92e85ca89aedc1fdb29562b90271f6ee7f03d