Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
20-11-2023 15:35
Static task
static1
Behavioral task
behavioral1
Sample
Staveres.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Staveres.exe
Resource
win10v2004-20231023-en
General
-
Target
Staveres.exe
-
Size
459KB
-
MD5
1d817513c51104071b5c310203a90139
-
SHA1
e6e1a674ff10efa42cfa4db53e10fbe7884f7260
-
SHA256
6fb3981c8ede1c32d2ad2d36ef5c2cd825fd7b6c99accce7475af9037e396230
-
SHA512
ff82c028b3baa2fa35b1d9cca90389face064b17614f699d529349ca670b57b453521afb62676fde653fec074d7f338af5b27c0303abf06ffcb7bdb9e2db22ef
-
SSDEEP
6144:pR+xXfJp6qOC0IdGFsnNmFXBf/NdU9ETyApuPzLwv2uvGfBbazwJoek5TkRvODXT:HqjLPd38RfvU9ETye862LbteV0v4Zl
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-2952504676-3105837840-1406404655-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cmmon32.exe -
Loads dropped DLL 1 IoCs
pid Process 2876 cmmon32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Run\4NXPQ2 = "C:\\Program Files (x86)\\Windows Photo Viewer\\ImagingDevices.exe" cmmon32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\irreluctant.lnk Staveres.exe File opened for modification C:\Windows\SysWOW64\irreluctant.lnk Staveres.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 600 ImagingDevices.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2960 powershell.exe 600 ImagingDevices.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2960 set thread context of 600 2960 powershell.exe 34 PID 600 set thread context of 1232 600 ImagingDevices.exe 22 PID 600 set thread context of 2876 600 ImagingDevices.exe 39 PID 2876 set thread context of 1232 2876 cmmon32.exe 22 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Tonto\wattsecond.tro Staveres.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\Spleeniest43.Uko Staveres.exe File opened for modification C:\Windows\udstdelsernes.psy Staveres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-2952504676-3105837840-1406404655-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2960 powershell.exe 2960 powershell.exe 2960 powershell.exe 2960 powershell.exe 2960 powershell.exe 600 ImagingDevices.exe 600 ImagingDevices.exe 600 ImagingDevices.exe 600 ImagingDevices.exe 600 ImagingDevices.exe 600 ImagingDevices.exe 600 ImagingDevices.exe 600 ImagingDevices.exe 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1232 Explorer.EXE -
Suspicious behavior: MapViewOfSection 10 IoCs
pid Process 2960 powershell.exe 2960 powershell.exe 2960 powershell.exe 600 ImagingDevices.exe 1232 Explorer.EXE 1232 Explorer.EXE 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe 2876 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2960 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2960 2080 Staveres.exe 28 PID 2080 wrote to memory of 2960 2080 Staveres.exe 28 PID 2080 wrote to memory of 2960 2080 Staveres.exe 28 PID 2080 wrote to memory of 2960 2080 Staveres.exe 28 PID 2960 wrote to memory of 324 2960 powershell.exe 32 PID 2960 wrote to memory of 324 2960 powershell.exe 32 PID 2960 wrote to memory of 324 2960 powershell.exe 32 PID 2960 wrote to memory of 324 2960 powershell.exe 32 PID 2960 wrote to memory of 1760 2960 powershell.exe 33 PID 2960 wrote to memory of 1760 2960 powershell.exe 33 PID 2960 wrote to memory of 1760 2960 powershell.exe 33 PID 2960 wrote to memory of 1760 2960 powershell.exe 33 PID 2960 wrote to memory of 600 2960 powershell.exe 34 PID 2960 wrote to memory of 600 2960 powershell.exe 34 PID 2960 wrote to memory of 600 2960 powershell.exe 34 PID 2960 wrote to memory of 600 2960 powershell.exe 34 PID 2960 wrote to memory of 600 2960 powershell.exe 34 PID 2960 wrote to memory of 600 2960 powershell.exe 34 PID 1232 wrote to memory of 2876 1232 Explorer.EXE 39 PID 1232 wrote to memory of 2876 1232 Explorer.EXE 39 PID 1232 wrote to memory of 2876 1232 Explorer.EXE 39 PID 1232 wrote to memory of 2876 1232 Explorer.EXE 39 PID 2876 wrote to memory of 2344 2876 cmmon32.exe 41 PID 2876 wrote to memory of 2344 2876 cmmon32.exe 41 PID 2876 wrote to memory of 2344 2876 cmmon32.exe 41 PID 2876 wrote to memory of 2344 2876 cmmon32.exe 41 PID 2876 wrote to memory of 2344 2876 cmmon32.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Staveres.exe"C:\Users\Admin\AppData\Local\Temp\Staveres.exe"2⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Altsaxofonisters=Get-Content 'C:\Users\Admin\AppData\Local\Temp\picote\terperierne\Dhanush.Bor';$Ferieliste=$Altsaxofonisters.SubString(51473,3);.$Ferieliste($Altsaxofonisters)"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"4⤵PID:324
-
-
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"4⤵PID:1760
-
-
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"4⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:600
-
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5690f63529970d4e1b9ef1573978e94ca
SHA14fef7a7ab2abe8eac100489aaca449cf09b699e7
SHA25655c0f22c9cf163b3a946425b7c37d79a808867f77a989dcbaffb8289c42a646f
SHA512d6045a6c45251607448af1375ff2fe654cfc399648e0e5cad8004b58a20164e63535559e8ea4db202b41ce4167f6172ac9d86ea353ae47268da339564fd7afe8
-
Filesize
264KB
MD52a527a44a9bf0d0f8821242c8598c8a3
SHA150bef44b72f19cf66579cf1bd3a701a7e37df94a
SHA256d44af2fd65ecfe3ae5928f0ffed1e9deacaabf58d0cae796d313b6feaf0f7a1e
SHA51249392af32f98e0118182037fefd3e600b92356b6d617bb70b30aee1813f0180a80fefd2f57622af5d4329e5393588df0b81296699996b52849821b2c614d843e
-
Filesize
434KB
MD56366b1751087ba991f1b4188a3f38486
SHA1449fab91dcd435e62a96dc4b400671ba0460a84a
SHA2563102600d3ad67b0e3f132bc0f8e0e66d976ba3700c3cc96459b65a87fa57c373
SHA512e1a8eb6dcfe0732299ccf74a0e61acbd132da4abac8aad996c2ba481328c0671530a55347f694f23a01a40e2343976196fc09fdd4573ab996a8a88d8e7693b90
-
Filesize
1KB
MD5a24d9313fea264558c74e126568db925
SHA194d2e15ff52db00fc8d9f0908ced3fd109414e60
SHA2560428265de244a4f15140ecbdc3e22590635458ecc5a4172550dfc9d14cf011a2
SHA512425c2801c132a85e0f46ba65afc277b7dcb8ef276372809356de3882126a8cac60f1c9a6f40c28fc402e5b4430a31947c55c81332927ba700e5e579bae28a157
-
Filesize
831KB
MD5f4d8be409d1bd016a7b3b2580a2b90fb
SHA1a68e1f6a9b2234f2269d9cf1fbda94124c428dbe
SHA256d70b27121bb33012560b14a7bd597666d76193d7dc5f89e2ac5e7507240bf708
SHA5129892cd38d77898fe7916a8810c82a377bbcb4f0c3f75a8295943fa29a5cb4daec95a1600a74614f31ec723967fd95721174042f2e54b12e52fe85202cdf052df