Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe
Resource
win10v2004-20231023-en
General
-
Target
35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe
-
Size
960KB
-
MD5
cfe6d12299e63a5030e167b690697661
-
SHA1
52ffa1b7fb721f910e7a03ad18039d1a9ae20ddb
-
SHA256
35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0
-
SHA512
58cb10c047905a6964a154f9a519cd6604f6a6e7979513b7f64df4c0db06b9efe1459c6c9a529ca76c6c5d1954615913f519530b4eb2299f7e230a926d6684e5
-
SSDEEP
12288:+azr9HnLGrBkoH7diYgLvuI9p80cfpWylWKFxWiX4PXb/tZrwp1/vGuJ7rbw3ymt:ytTL7IP7sjHGuJ7rs3yY0udMJRxJE
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe -
Loads dropped DLL 1 IoCs
pid Process 2448 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\trkcore = "C:\\ProgramData\\Microsoft\\Roaming\\svchost.exe" 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2544 explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2448 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2240 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2240 2448 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 26 PID 2448 wrote to memory of 2240 2448 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 26 PID 2448 wrote to memory of 2240 2448 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 26 PID 2448 wrote to memory of 2240 2448 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe 26 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe"C:\Users\Admin\AppData\Local\Temp\35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exeC:\Users\Admin\AppData\Local\Temp\35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- System policy modification
PID:2240
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2512
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe
Filesize960KB
MD55054cadff20d9f6c2f01cbf4cdf4f531
SHA1a9e928c8b1d8bf4f4faceb9238973ff5d98c2ed1
SHA25637a5bdf22a3f49d2d9d0cda46def6d5f091c8ed36cce181581e9c1387da0b09e
SHA5128e8122c4cfa3509f757dc6c9934b9121f7ace8e00539bf95c99251db6d26a51a7093f0793601136e76fefcf0aa7a8ea930a64c91383eccab09f85b226e1b9d94
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
\Users\Admin\AppData\Local\Temp\35f44b7282030a25f93a863f05b6c801dc986cc92ca48e526ecd031705838ea0.exe
Filesize960KB
MD55054cadff20d9f6c2f01cbf4cdf4f531
SHA1a9e928c8b1d8bf4f4faceb9238973ff5d98c2ed1
SHA25637a5bdf22a3f49d2d9d0cda46def6d5f091c8ed36cce181581e9c1387da0b09e
SHA5128e8122c4cfa3509f757dc6c9934b9121f7ace8e00539bf95c99251db6d26a51a7093f0793601136e76fefcf0aa7a8ea930a64c91383eccab09f85b226e1b9d94