Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/11/2023, 03:01
Behavioral task
behavioral1
Sample
4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe
Resource
win10v2004-20231023-en
General
-
Target
4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe
-
Size
4.4MB
-
MD5
4459ddf6f1c3484e5f9cdbeda941aa99
-
SHA1
359b03153d3deb165b1f10ccfdae8fdf82d5e294
-
SHA256
4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038
-
SHA512
2cfe1b9b58174e3d8603654669a86e0821a3a7868ce479cd357593a07c16bf24ca3921707b3f3521b7bada1cfe97a8b99f2ebb0c693ea4ec52a058a56e3cd29f
-
SSDEEP
49152:oTGkQk5QZuTtS0rQMYOQ+q8CEjTG4QWTGHQ39KFeM7:oKkrWsM0r1QnIK4LKHw0Feu
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\4R2mryNQ.sys SndVol.exe -
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\State = "146944" SndVol.exe -
Deletes itself 1 IoCs
pid Process 1916 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2856 32e74d4d 2844 SndVol.exe -
resource yara_rule behavioral1/memory/1736-0-0x0000000000AD0000-0x0000000000B59000-memory.dmp upx behavioral1/files/0x00070000000120bd-2.dat upx behavioral1/memory/2856-3-0x0000000000D40000-0x0000000000DC9000-memory.dmp upx behavioral1/memory/1736-49-0x0000000000AD0000-0x0000000000B59000-memory.dmp upx behavioral1/memory/1736-47-0x0000000000AD0000-0x0000000000B59000-memory.dmp upx behavioral1/memory/2856-60-0x0000000000D40000-0x0000000000DC9000-memory.dmp upx behavioral1/memory/2856-80-0x0000000000D40000-0x0000000000DC9000-memory.dmp upx behavioral1/files/0x00070000000120bd-81.dat upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E 32e74d4d File created C:\Windows\Syswow64\32e74d4d 4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe File created C:\Windows\system32\ \Windows\System32\CchQjs.sys SndVol.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 32e74d4d File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 32e74d4d File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DED9969D7ED2C6E555C5C9254A43EDE4 32e74d4d File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DED9969D7ED2C6E555C5C9254A43EDE4 32e74d4d File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 32e74d4d File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 32e74d4d File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A 32e74d4d File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A 32e74d4d File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 32e74d4d File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E 32e74d4d -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\zNf023QUP.sys SndVol.exe File opened for modification C:\Windows\30e550 32e74d4d File created C:\Windows\SndVol.exe Explorer.EXE File opened for modification C:\Windows\SndVol.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
pid Process 688 timeout.exe 2532 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\New Windows\Allow SndVol.exe Set value (data) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Internet Explorer\New Windows\Allow\www.hao774.com SndVol.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1a-52-bb-42-ab-53 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs 32e74d4d Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1a-52-bb-42-ab-53\WpadDecisionReason = "1" 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates 32e74d4d Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 32e74d4d Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1a-52-bb-42-ab-53\WpadDecision = "0" 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates 32e74d4d Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates 32e74d4d Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E64B05A1-05B8-4670-9529-032B4B04CCC7}\WpadNetworkName = "Network 3" 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E64B05A1-05B8-4670-9529-032B4B04CCC7}\1a-52-bb-42-ab-53 32e74d4d Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust 32e74d4d Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f001d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 32e74d4d Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 32e74d4d Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E64B05A1-05B8-4670-9529-032B4B04CCC7} 32e74d4d Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E64B05A1-05B8-4670-9529-032B4B04CCC7}\WpadDecision = "0" 32e74d4d Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1a-52-bb-42-ab-53\WpadDecisionTime = 70ce4f0c271cda01 32e74d4d Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates 32e74d4d Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E64B05A1-05B8-4670-9529-032B4B04CCC7}\WpadDecisionReason = "1" 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust 32e74d4d Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E64B05A1-05B8-4670-9529-032B4B04CCC7}\WpadDecisionTime = 70ce4f0c271cda01 32e74d4d Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 32e74d4d Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA 32e74d4d Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs 32e74d4d Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs 32e74d4d -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 SndVol.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde SndVol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 32e74d4d Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 32e74d4d Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 32e74d4d Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 32e74d4d -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2856 32e74d4d 2856 32e74d4d 2856 32e74d4d 2856 32e74d4d 2856 32e74d4d 2856 32e74d4d 1240 Explorer.EXE 1240 Explorer.EXE 1240 Explorer.EXE 2856 32e74d4d 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1240 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1736 4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe Token: SeTcbPrivilege 1736 4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe Token: SeDebugPrivilege 2856 32e74d4d Token: SeTcbPrivilege 2856 32e74d4d Token: SeDebugPrivilege 2856 32e74d4d Token: SeDebugPrivilege 1240 Explorer.EXE Token: SeDebugPrivilege 1240 Explorer.EXE Token: SeIncBasePriorityPrivilege 1736 4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe Token: SeDebugPrivilege 2856 32e74d4d Token: SeDebugPrivilege 2844 SndVol.exe Token: SeDebugPrivilege 2844 SndVol.exe Token: SeDebugPrivilege 2844 SndVol.exe Token: SeIncBasePriorityPrivilege 2856 32e74d4d Token: SeDebugPrivilege 2844 SndVol.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe 2844 SndVol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2844 SndVol.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1240 2856 32e74d4d 12 PID 2856 wrote to memory of 1240 2856 32e74d4d 12 PID 2856 wrote to memory of 1240 2856 32e74d4d 12 PID 2856 wrote to memory of 1240 2856 32e74d4d 12 PID 2856 wrote to memory of 1240 2856 32e74d4d 12 PID 1240 wrote to memory of 2844 1240 Explorer.EXE 29 PID 1240 wrote to memory of 2844 1240 Explorer.EXE 29 PID 1240 wrote to memory of 2844 1240 Explorer.EXE 29 PID 1240 wrote to memory of 2844 1240 Explorer.EXE 29 PID 1240 wrote to memory of 2844 1240 Explorer.EXE 29 PID 1240 wrote to memory of 2844 1240 Explorer.EXE 29 PID 1240 wrote to memory of 2844 1240 Explorer.EXE 29 PID 1240 wrote to memory of 2844 1240 Explorer.EXE 29 PID 2856 wrote to memory of 420 2856 32e74d4d 1 PID 2856 wrote to memory of 420 2856 32e74d4d 1 PID 2856 wrote to memory of 420 2856 32e74d4d 1 PID 2856 wrote to memory of 420 2856 32e74d4d 1 PID 2856 wrote to memory of 420 2856 32e74d4d 1 PID 1736 wrote to memory of 1916 1736 4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe 32 PID 1736 wrote to memory of 1916 1736 4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe 32 PID 1736 wrote to memory of 1916 1736 4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe 32 PID 1736 wrote to memory of 1916 1736 4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe 32 PID 1916 wrote to memory of 688 1916 cmd.exe 33 PID 1916 wrote to memory of 688 1916 cmd.exe 33 PID 1916 wrote to memory of 688 1916 cmd.exe 33 PID 1916 wrote to memory of 688 1916 cmd.exe 33 PID 2856 wrote to memory of 1788 2856 32e74d4d 35 PID 2856 wrote to memory of 1788 2856 32e74d4d 35 PID 2856 wrote to memory of 1788 2856 32e74d4d 35 PID 2856 wrote to memory of 1788 2856 32e74d4d 35 PID 1788 wrote to memory of 2532 1788 cmd.exe 37 PID 1788 wrote to memory of 2532 1788 cmd.exe 37 PID 1788 wrote to memory of 2532 1788 cmd.exe 37 PID 1788 wrote to memory of 2532 1788 cmd.exe 37 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12 PID 2844 wrote to memory of 1240 2844 SndVol.exe 12
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe"C:\Users\Admin\AppData\Local\Temp\4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\4a63c82c08fe3dab78d0be7192bdfe4c811c188d28fb98323f92dca44045e038.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:688
-
-
-
-
C:\Windows\SndVol.exe"C:\Windows\SndVol.exe"2⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844
-
-
C:\Windows\Syswow64\32e74d4dC:\Windows\Syswow64\32e74d4d1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\32e74d4d"2⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
267KB
MD5c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9
-
Filesize
4.4MB
MD59cf87e4a33d5d7485b010512b5728fa4
SHA1193a9e4a0a64bd3b4945fcb1aaba267bd52427d1
SHA2560b7d6fa16f636bef00f7bbabeacb797b688c9ecf9fa7b0a88e455e6e511124e3
SHA51205d93d59570fddbc3d3ca25a0b30216a43baa18c7d7df984f5e14d316b501b18cffef36e0f660c33c3f18be44f283c7952e529b261033430ad2785d8cdb6aa06
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
Filesize61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
4.4MB
MD59cf87e4a33d5d7485b010512b5728fa4
SHA1193a9e4a0a64bd3b4945fcb1aaba267bd52427d1
SHA2560b7d6fa16f636bef00f7bbabeacb797b688c9ecf9fa7b0a88e455e6e511124e3
SHA51205d93d59570fddbc3d3ca25a0b30216a43baa18c7d7df984f5e14d316b501b18cffef36e0f660c33c3f18be44f283c7952e529b261033430ad2785d8cdb6aa06