Overview
overview
10Static
static
101.exe
windows7-x64
1400.exe
windows7-x64
10Chase_Bank...or.exe
windows7-x64
10ChromeSoft.exe
windows7-x64
7Fake Windo...er.exe
windows7-x64
4Injector(v_5.24).exe
windows7-x64
8RCE.exe
windows7-x64
10TemD.exe
windows7-x64
10best.exe
windows7-x64
10btf.exe
windows7-x64
8build.exe
windows7-x64
6crypted.exe
windows7-x64
1download.exe
windows7-x64
7dp.exe
windows7-x64
7etbnoc.exe
windows7-x64
1fran.exe
windows7-x64
10fud.exe
windows7-x64
1gift_generator.exe
windows7-x64
7lol.exe
windows7-x64
10mt20200012.exe
windows7-x64
1nopax.exe
windows7-x64
10porn.jpg.exe
windows7-x64
1putty.exe
windows7-x64
10t.exe
windows7-x64
10vnc.exe
windows7-x64
7yk.exe
windows7-x64
10zztop.exe
windows7-x64
1Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-12-2023 01:47
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
400.exe
Resource
win7-20231130-en
Behavioral task
behavioral3
Sample
Chase_Bank_Transaction_Authenticator.exe
Resource
win7-20231201-en
Behavioral task
behavioral4
Sample
ChromeSoft.exe
Resource
win7-20231130-en
Behavioral task
behavioral5
Sample
Fake Windows Live Messenger.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Injector(v_5.24).exe
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
RCE.exe
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
TemD.exe
Resource
win7-20231025-en
Behavioral task
behavioral9
Sample
best.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
btf.exe
Resource
win7-20231130-en
Behavioral task
behavioral11
Sample
build.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
crypted.exe
Resource
win7-20231201-en
Behavioral task
behavioral13
Sample
download.exe
Resource
win7-20231130-en
Behavioral task
behavioral14
Sample
dp.exe
Resource
win7-20231129-en
Behavioral task
behavioral15
Sample
etbnoc.exe
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
fran.exe
Resource
win7-20231130-en
Behavioral task
behavioral17
Sample
fud.exe
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
gift_generator.exe
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
lol.exe
Resource
win7-20231130-en
Behavioral task
behavioral20
Sample
mt20200012.exe
Resource
win7-20231020-en
Behavioral task
behavioral21
Sample
nopax.exe
Resource
win7-20231025-en
Behavioral task
behavioral22
Sample
porn.jpg.exe
Resource
win7-20231020-en
Behavioral task
behavioral23
Sample
putty.exe
Resource
win7-20231201-en
Behavioral task
behavioral24
Sample
t.exe
Resource
win7-20231023-en
Behavioral task
behavioral25
Sample
vnc.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
yk.exe
Resource
win7-20231020-en
Behavioral task
behavioral27
Sample
zztop.exe
Resource
win7-20231023-en
General
-
Target
dp.exe
-
Size
626KB
-
MD5
e8d034a10d9f1328d70e0e6ff86af115
-
SHA1
86773bf3028d4ce4c453810b7a8db87cac27cfc1
-
SHA256
f88ff0acb3e08e51fa051bff9a176ddb952a99bf2989032e6000b7d7c0836c07
-
SHA512
d267737a4eb59200bb6a7bea7fffb45be3ef564f38a2d65f27cd22b7e09abbd52463806b144f0b6fa49887821f1a1d27dd555776a910291b213d5f9c85be1f6c
-
SSDEEP
6144:MjNiSxkJDc+HCvgLqdLZhUIb7ImU46zNsOJt3:56+DcOq5Zd3IN44b
Malware Config
Signatures
-
Drops startup file 3 IoCs
Processes:
cmd.exeapp.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.lnk app.exe -
Executes dropped EXE 1 IoCs
Processes:
app.exepid process 2600 app.exe -
Loads dropped DLL 1 IoCs
Processes:
app.exepid process 2600 app.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dp.exeapp.exedescription pid process Token: SeDebugPrivilege 1600 dp.exe Token: SeDebugPrivilege 2600 app.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
dp.exeexplorer.exedescription pid process target process PID 1600 wrote to memory of 2844 1600 dp.exe cmd.exe PID 1600 wrote to memory of 2844 1600 dp.exe cmd.exe PID 1600 wrote to memory of 2844 1600 dp.exe cmd.exe PID 1600 wrote to memory of 2844 1600 dp.exe cmd.exe PID 1600 wrote to memory of 1052 1600 dp.exe explorer.exe PID 1600 wrote to memory of 1052 1600 dp.exe explorer.exe PID 1600 wrote to memory of 1052 1600 dp.exe explorer.exe PID 1600 wrote to memory of 1052 1600 dp.exe explorer.exe PID 2320 wrote to memory of 2600 2320 explorer.exe app.exe PID 2320 wrote to memory of 2600 2320 explorer.exe app.exe PID 2320 wrote to memory of 2600 2320 explorer.exe app.exe PID 2320 wrote to memory of 2600 2320 explorer.exe app.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dp.exe"C:\Users\Admin\AppData\Local\Temp\dp.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\dp.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe"2⤵
- Drops startup file
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe"2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exeFilesize
330KB
MD50a413aa348fee629a17b4ec090ff7711
SHA1977711b1826db0c84e76c30b49064b5600574411
SHA2561cf059a81cea76a70e1edbbf0d120b864b7a034eba05b5b7ef464b31ec15e67f
SHA512e1f4d9f9cde5be6a6efc48c97e77d0208fbe04bac863d492f812e2bc782f9f7a7488e25680f69aa4054ac4c77099e49143d976208e54ba56ae739279291c4678
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exeFilesize
176KB
MD5147e26c4c177a07fe74b40a8fa20bc8e
SHA1d4ca9beffd2b18e4dc23a98d717bc879538ff36c
SHA256fac384816df7e7c5865bc5fd6dccdce5f033b2a0dd0ba75e8cd8709c936a5faf
SHA5122964cfd20672f8d3c1125fe1fb606c0608ef9a86dc9a9c93ca7ed7eb447ea58d8094bfacae8082b6b720c92e9a12a022053433b498c79ffab49f5b49814582b2
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exeFilesize
626KB
MD5e8d034a10d9f1328d70e0e6ff86af115
SHA186773bf3028d4ce4c453810b7a8db87cac27cfc1
SHA256f88ff0acb3e08e51fa051bff9a176ddb952a99bf2989032e6000b7d7c0836c07
SHA512d267737a4eb59200bb6a7bea7fffb45be3ef564f38a2d65f27cd22b7e09abbd52463806b144f0b6fa49887821f1a1d27dd555776a910291b213d5f9c85be1f6c
-
memory/1600-0-0x00000000001D0000-0x0000000000276000-memory.dmpFilesize
664KB
-
memory/1600-1-0x00000000743D0000-0x0000000074ABE000-memory.dmpFilesize
6.9MB
-
memory/1600-2-0x00000000073F0000-0x0000000007430000-memory.dmpFilesize
256KB
-
memory/1600-3-0x00000000002E0000-0x00000000002F8000-memory.dmpFilesize
96KB
-
memory/1600-6-0x00000000743D0000-0x0000000074ABE000-memory.dmpFilesize
6.9MB
-
memory/2600-10-0x0000000074420000-0x0000000074B0E000-memory.dmpFilesize
6.9MB
-
memory/2600-11-0x00000000041B0000-0x00000000041F0000-memory.dmpFilesize
256KB
-
memory/2600-12-0x00000000003F0000-0x0000000000408000-memory.dmpFilesize
96KB
-
memory/2600-9-0x0000000000A70000-0x0000000000B16000-memory.dmpFilesize
664KB
-
memory/2600-15-0x00000000041B0000-0x00000000041F0000-memory.dmpFilesize
256KB
-
memory/2600-16-0x0000000074420000-0x0000000074B0E000-memory.dmpFilesize
6.9MB
-
memory/2600-17-0x00000000041B0000-0x00000000041F0000-memory.dmpFilesize
256KB
-
memory/2600-18-0x00000000041B0000-0x00000000041F0000-memory.dmpFilesize
256KB