Resubmissions
11-12-2023 15:39
231211-s3p6bacbh4 710-12-2023 15:26
231210-st8w3afacp 709-12-2023 14:29
231209-rt1p1sghcj 709-12-2023 11:42
231209-nvdebshff5 1008-12-2023 15:15
231208-smy4aaccf9 1005-12-2023 15:49
231205-s9fkfsce49 1005-12-2023 04:28
231205-e34f2shb9w 10Analysis
-
max time kernel
35s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
09-12-2023 11:42
Static task
static1
Behavioral task
behavioral1
Sample
dac.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
dac.exe
Resource
win10-20231129-en
Behavioral task
behavioral3
Sample
dac.exe
Resource
win10v2004-20231127-en
General
-
Target
dac.exe
-
Size
22.6MB
-
MD5
111983bd0209f1541e9d1ee618be1c45
-
SHA1
cf15e95ad616bbf3b806b0f6b7290cc14c6b557e
-
SHA256
af582ce1d3bbc2d9201c81a058203e96f81087433b80ddd85f8eb1a66faa8d31
-
SHA512
6c1e810557acffc3c10213aa663b7527f4808b418e80c3c5610a5489994138236457aad1ffd28861b912add0aaa66053a4cdac2b3a47167d075f8e9b2d592511
-
SSDEEP
393216:oHqEnUyriULZiXg6LPmmG3z7z/wQ74cZd060stbgB7OrowyVm9fC8:fXyriULZikmG3zP/p748d0LsqB7uyI48
Malware Config
Signatures
-
Processes:
reg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe -
Executes dropped EXE 1 IoCs
Processes:
AliWorkbench.exepid process 2040 AliWorkbench.exe -
Loads dropped DLL 1 IoCs
Processes:
AliWorkbench.exepid process 2040 AliWorkbench.exe -
Processes:
resource yara_rule behavioral1/memory/1036-0-0x0000000180000000-0x0000000180033000-memory.dmp upx behavioral1/memory/1036-2-0x0000000180000000-0x0000000180033000-memory.dmp upx behavioral1/memory/1036-3-0x0000000180000000-0x0000000180033000-memory.dmp upx behavioral1/memory/1036-4-0x0000000180000000-0x0000000180033000-memory.dmp upx behavioral1/memory/1036-5-0x0000000180000000-0x0000000180033000-memory.dmp upx behavioral1/memory/1036-37-0x0000000180000000-0x0000000180033000-memory.dmp upx behavioral1/memory/1036-47-0x0000000180000000-0x0000000180033000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
dac.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 dac.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 dac.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
dac.exemmc.exemmc.exemmc.exedescription pid process Token: SeShutdownPrivilege 1036 dac.exe Token: 33 2628 mmc.exe Token: SeIncBasePriorityPrivilege 2628 mmc.exe Token: 33 2628 mmc.exe Token: SeIncBasePriorityPrivilege 2628 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 1976 mmc.exe Token: SeIncBasePriorityPrivilege 1976 mmc.exe Token: 33 2404 mmc.exe Token: SeIncBasePriorityPrivilege 2404 mmc.exe Token: 33 2404 mmc.exe Token: SeIncBasePriorityPrivilege 2404 mmc.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
dac.exemmc.exemmc.exemmc.exepid process 1036 dac.exe 1036 dac.exe 2628 mmc.exe 2628 mmc.exe 1976 mmc.exe 1976 mmc.exe 2404 mmc.exe 2404 mmc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
mmc.exemmc.exedac.execmd.exemmc.exedescription pid process target process PID 2628 wrote to memory of 2500 2628 mmc.exe netsh.exe PID 2628 wrote to memory of 2500 2628 mmc.exe netsh.exe PID 2628 wrote to memory of 2500 2628 mmc.exe netsh.exe PID 1976 wrote to memory of 2472 1976 mmc.exe netsh.exe PID 1976 wrote to memory of 2472 1976 mmc.exe netsh.exe PID 1976 wrote to memory of 2472 1976 mmc.exe netsh.exe PID 1036 wrote to memory of 2756 1036 dac.exe cmd.exe PID 1036 wrote to memory of 2756 1036 dac.exe cmd.exe PID 1036 wrote to memory of 2756 1036 dac.exe cmd.exe PID 2756 wrote to memory of 1164 2756 cmd.exe reg.exe PID 2756 wrote to memory of 1164 2756 cmd.exe reg.exe PID 2756 wrote to memory of 1164 2756 cmd.exe reg.exe PID 2756 wrote to memory of 1040 2756 cmd.exe reg.exe PID 2756 wrote to memory of 1040 2756 cmd.exe reg.exe PID 2756 wrote to memory of 1040 2756 cmd.exe reg.exe PID 2756 wrote to memory of 2892 2756 cmd.exe reg.exe PID 2756 wrote to memory of 2892 2756 cmd.exe reg.exe PID 2756 wrote to memory of 2892 2756 cmd.exe reg.exe PID 1036 wrote to memory of 296 1036 dac.exe cmd.exe PID 1036 wrote to memory of 296 1036 dac.exe cmd.exe PID 1036 wrote to memory of 296 1036 dac.exe cmd.exe PID 2404 wrote to memory of 2040 2404 mmc.exe AliWorkbench.exe PID 2404 wrote to memory of 2040 2404 mmc.exe AliWorkbench.exe PID 2404 wrote to memory of 2040 2404 mmc.exe AliWorkbench.exe PID 2404 wrote to memory of 2040 2404 mmc.exe AliWorkbench.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dac.exe"C:\Users\Admin\AppData\Local\Temp\dac.exe"1⤵
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Roaming\M7prX.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t reg_dword /d 0 /F3⤵
- UAC bypass
PID:1164 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t reg_dword /d 0 /F3⤵
- UAC bypass
PID:1040 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v PromptOnSecureDesktop /t reg_dword /d 0 /F3⤵
- UAC bypass
PID:2892 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /b C:\Users\Public\Pictures\Yl95Q\4nJia@f\v+C:\Users\Public\Pictures\Yl95Q\4nJia@f\b C:\Users\Public\Pictures\Yl95Q\4nJia@f\AliProtect.dll2⤵PID:296
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address 本地连接 static 1.0.0.2 255.255.255.0 1.0.0.1 12⤵PID:2500
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set address \"无线网络连接\" static 1.0.0.3 255.255.255.0 1.0.0.1 12⤵PID:2472
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Public\Pictures\Yl95Q\4nJia@f\AliWorkbench.exe"C:\Users\Public\Pictures\Yl95Q\4nJia@f\AliWorkbench.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2040
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392B
MD530d6eb22d6aeec10347239b17b023bf4
SHA1e2a6f86d66c699f6e0ff1ac4e140af4a2a4637d1
SHA256659df6b190a0b92fc34e3a4457b4a8d11a26a4caf55de64dfe79eb1276181f08
SHA512500872c3f2f3f801ec51717690873194675cb7f32cc4a862c09d90c18638d364d49b0e04c32323f52734e5c806e3503a63ac755c7019d762786a72840123df76
-
Filesize
201KB
MD51710628627e94f5f13664d6ce5c221b4
SHA17a0205bf1d9ec12cc39e436e7aff008cbe060781
SHA256fcd97782c39670080559949c74dc6417a0d9e386c3d88ac1f3878f477ddb6686
SHA5120266714dbe3157d5bcc76e5ac7457aa0d34cbf94e82ad7d6c9c11753850b86da3fb526b89eaae75e20c0629c5204db5f3840f3e70c246264b89841f0606a7cee
-
Filesize
411KB
MD5405bd58e0a733acd4f986cf8d1a8cd85
SHA13d766ea076a36ced02e991d7c72f53be583720e5
SHA256af04dad1590fd28ad980af3eabee5b3e8a57cede68d42de1e376dfcc4f991994
SHA512bd9e901576a4928633735f7173830991547d72179e72aa0da6a8a6fe70d5ef4c823c4d32cbcc7f4c571dc8febaee3037b58f896b416d1a675000148e8644b97c
-
Filesize
411KB
MD5405bd58e0a733acd4f986cf8d1a8cd85
SHA13d766ea076a36ced02e991d7c72f53be583720e5
SHA256af04dad1590fd28ad980af3eabee5b3e8a57cede68d42de1e376dfcc4f991994
SHA512bd9e901576a4928633735f7173830991547d72179e72aa0da6a8a6fe70d5ef4c823c4d32cbcc7f4c571dc8febaee3037b58f896b416d1a675000148e8644b97c
-
Filesize
156KB
MD55242a61322092441d025bac5a8a24e9c
SHA1d904961e53f31aae951e6f09926f7ece69193acb
SHA25687681c4cf2a201a47e33bbcbb43ef735cb841fa34400fed1bc628840f1eebfb7
SHA512cdbaa3ab0dff88c2f72c783fd1b25366d94f8301a506ee040ed2f8ac1064c415d323c08dbd0bd7226b3abc1b5fdb9a92f46d4a29dad6ea616d8426a17794b353
-
Filesize
100KB
MD5a40ea9080e94d610ffa7a130212d52b7
SHA1f0c29ce87d950b7a6a8df8c606fb0f4f8c3a1c45
SHA2564487eaa8dc762f5dd54c6cb333df1c08692e387cc6e0d2be67bd2b5ed0c5d1f1
SHA5127834125b90faa6bcdfc638e99b60c19e4b02a98408d34c6490698fc1d2783a612377fbe0fcc3d10b93704e5af59fcbd20d4fc2c0eb58d86e1bb6c9c4edf23e48
-
Filesize
100KB
MD599414e907fb9fd177131792377e77912
SHA111e884fe1af08eedafa2ed02b6362dcc07f3ef88
SHA2562be4372142ca5c3b2b1d3e2d61bb17b677570e52fad79b0eb6dc1a6f475438cc
SHA51245966e34f73c4244b947b18ac1ab96838b71dce088f398ae5b88a8d529fcca843bf2c2defc4ae62cfe7883b2a7bfd4e789f722f7bcd4775382c87a1fb26f5561
-
Filesize
201KB
MD51710628627e94f5f13664d6ce5c221b4
SHA17a0205bf1d9ec12cc39e436e7aff008cbe060781
SHA256fcd97782c39670080559949c74dc6417a0d9e386c3d88ac1f3878f477ddb6686
SHA5120266714dbe3157d5bcc76e5ac7457aa0d34cbf94e82ad7d6c9c11753850b86da3fb526b89eaae75e20c0629c5204db5f3840f3e70c246264b89841f0606a7cee