Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2023 19:08
Static task
static1
Behavioral task
behavioral1
Sample
a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe
Resource
win10v2004-20231023-en
General
-
Target
a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe
-
Size
672KB
-
MD5
a56b2ef7f53aa63867878679f7ebf870
-
SHA1
a018114c0885cca99838a360b05eddc155b6b933
-
SHA256
a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840
-
SHA512
1cd016a9ff3462c26913d9ef023a4c3103343b62b94a5450d9de8644405653239cb6c9e2874397bd8294252416fcc2ba9cdc830215f0f14eed247e2dc037ebbc
-
SSDEEP
12288:4PFY04OQg3ENmxwLqwGdBLymNr21GHnAEIS4mBVRTqeRKwpNt+:MFY04O8Nmx8qPXtckH3BVRTwwpq
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe -
Executes dropped EXE 1 IoCs
pid Process 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe -
Loads dropped DLL 1 IoCs
pid Process 1580 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\trkcore = "C:\\ProgramData\\Microsoft\\Roaming\\svchost.exe" a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1400 explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1580 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe Token: SeShutdownPrivilege 1400 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe 1400 explorer.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 892 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 892 1580 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 28 PID 1580 wrote to memory of 892 1580 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 28 PID 1580 wrote to memory of 892 1580 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 28 PID 1580 wrote to memory of 892 1580 a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe"C:\Users\Admin\AppData\Local\Temp\a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exeC:\Users\Admin\AppData\Local\Temp\a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- System policy modification
PID:892
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:988
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
C:\Users\Admin\AppData\Local\Temp\a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe
Filesize672KB
MD51563e2073b1c0452c2dff34fddafe9dc
SHA1a495b14eb56de2de8d12146b3b3612f95cf4a7b3
SHA25673cd6f168f3b0ae5c88c113288138d30580a020933a8e6bd59c8cfb739d5ee1f
SHA51295e885087716f919ec95e19d475ee0b6890668162823773694f14831e0db76dd1b8a04cc3febd46396fa0c81b8c646f8ad0a6b8de392e1d064c6ce6abc260938
-
\Users\Admin\AppData\Local\Temp\a2c472f03c51a188df057d45db691e83bbe951ec9622c3415ca767e7a67bb840.exe
Filesize672KB
MD51563e2073b1c0452c2dff34fddafe9dc
SHA1a495b14eb56de2de8d12146b3b3612f95cf4a7b3
SHA25673cd6f168f3b0ae5c88c113288138d30580a020933a8e6bd59c8cfb739d5ee1f
SHA51295e885087716f919ec95e19d475ee0b6890668162823773694f14831e0db76dd1b8a04cc3febd46396fa0c81b8c646f8ad0a6b8de392e1d064c6ce6abc260938