Analysis
-
max time kernel
247s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 23:56
Static task
static1
Behavioral task
behavioral1
Sample
1b210138a28907b555c06bf888a6f656.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b210138a28907b555c06bf888a6f656.exe
Resource
win10v2004-20231215-en
General
-
Target
1b210138a28907b555c06bf888a6f656.exe
-
Size
8.9MB
-
MD5
1b210138a28907b555c06bf888a6f656
-
SHA1
73f1559fd104ecde5e75fd82f11a94ab4275849d
-
SHA256
e7f3c461470c7531a31a711fceb6980ceb88c8a806d574711097e6eaff3324a1
-
SHA512
ee6d7840510fc8a89c2bef5cbd0cbb19a6c13bd76822d3cb59a0aaf4dd6de6bc2fece374bfd00039008b5bd8057f9903336385b063ed2e0bb3e2049d9d3613e0
-
SSDEEP
196608:N7effIPEsy58doQaTzwZ8Jq3QKnqVtxQw818dmXEQl1llLmiwlyif8cHQfgAXdmu:N7effIPEsy58doQaTzwZ8Jq3QKnqVtxq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 1b210138a28907b555c06bf888a6f656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe," 1b210138a28907b555c06bf888a6f656.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\spools.exe 1b210138a28907b555c06bf888a6f656.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 1b210138a28907b555c06bf888a6f656.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 1b210138a28907b555c06bf888a6f656.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" 1b210138a28907b555c06bf888a6f656.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" 1b210138a28907b555c06bf888a6f656.exe -
ACProtect 1.3x - 1.4x DLL software 5 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x001000000000b1f5-4.dat acprotect behavioral1/memory/3068-6-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral1/memory/3068-14-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral1/memory/2092-27-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral1/memory/2092-29-0x0000000010000000-0x000000001010B000-memory.dmp acprotect -
Loads dropped DLL 2 IoCs
pid Process 3068 1b210138a28907b555c06bf888a6f656.exe 2092 1b210138a28907b555c06bf888a6f656.exe -
resource yara_rule behavioral1/files/0x001000000000b1f5-4.dat upx behavioral1/memory/3068-6-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral1/memory/3068-14-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral1/memory/2092-27-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral1/memory/2092-29-0x0000000010000000-0x000000001010B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 1b210138a28907b555c06bf888a6f656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 1b210138a28907b555c06bf888a6f656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 1b210138a28907b555c06bf888a6f656.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 1b210138a28907b555c06bf888a6f656.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 1b210138a28907b555c06bf888a6f656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 1b210138a28907b555c06bf888a6f656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 1b210138a28907b555c06bf888a6f656.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 1b210138a28907b555c06bf888a6f656.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\O: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\M: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\Q: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\X: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\G: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\T: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\L: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\T: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\X: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\I: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\O: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\S: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\W: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\I: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\U: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\R: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\N: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\R: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\R: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\V: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\K: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\X: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\H: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\R: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\V: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\W: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\H: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\G: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\O: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\N: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\P: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\P: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\I: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\V: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\N: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\O: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\K: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\M: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\N: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\T: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\G: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\J: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\H: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\W: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\W: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\H: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\X: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\E: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\S: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\E: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\N: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\K: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\Q: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\G: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\S: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\J: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\L: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\V: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\P: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\R: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\I: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\G: 1b210138a28907b555c06bf888a6f656.exe File opened (read-only) \??\I: 1b210138a28907b555c06bf888a6f656.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} reg.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" 1b210138a28907b555c06bf888a6f656.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ftpdll.dll 1b210138a28907b555c06bf888a6f656.exe File opened for modification C:\Windows\SysWOW64\ftpdll.dll 1b210138a28907b555c06bf888a6f656.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 660 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 476 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 660 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 476 1b210138a28907b555c06bf888a6f656.exe 660 1b210138a28907b555c06bf888a6f656.exe 476 1b210138a28907b555c06bf888a6f656.exe 660 1b210138a28907b555c06bf888a6f656.exe 476 1b210138a28907b555c06bf888a6f656.exe 660 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 476 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 660 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 476 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 660 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 476 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 660 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 476 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 660 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 3068 1b210138a28907b555c06bf888a6f656.exe 476 1b210138a28907b555c06bf888a6f656.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3068 1b210138a28907b555c06bf888a6f656.exe 2092 1b210138a28907b555c06bf888a6f656.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3068 wrote to memory of 660 3068 1b210138a28907b555c06bf888a6f656.exe 28 PID 3068 wrote to memory of 660 3068 1b210138a28907b555c06bf888a6f656.exe 28 PID 3068 wrote to memory of 660 3068 1b210138a28907b555c06bf888a6f656.exe 28 PID 3068 wrote to memory of 660 3068 1b210138a28907b555c06bf888a6f656.exe 28 PID 3068 wrote to memory of 476 3068 1b210138a28907b555c06bf888a6f656.exe 29 PID 3068 wrote to memory of 476 3068 1b210138a28907b555c06bf888a6f656.exe 29 PID 3068 wrote to memory of 476 3068 1b210138a28907b555c06bf888a6f656.exe 29 PID 3068 wrote to memory of 476 3068 1b210138a28907b555c06bf888a6f656.exe 29 PID 3068 wrote to memory of 1604 3068 1b210138a28907b555c06bf888a6f656.exe 32 PID 3068 wrote to memory of 1604 3068 1b210138a28907b555c06bf888a6f656.exe 32 PID 3068 wrote to memory of 1604 3068 1b210138a28907b555c06bf888a6f656.exe 32 PID 3068 wrote to memory of 1604 3068 1b210138a28907b555c06bf888a6f656.exe 32 PID 660 wrote to memory of 2092 660 1b210138a28907b555c06bf888a6f656.exe 34 PID 660 wrote to memory of 2092 660 1b210138a28907b555c06bf888a6f656.exe 34 PID 660 wrote to memory of 2092 660 1b210138a28907b555c06bf888a6f656.exe 34 PID 660 wrote to memory of 2092 660 1b210138a28907b555c06bf888a6f656.exe 34 PID 476 wrote to memory of 1308 476 1b210138a28907b555c06bf888a6f656.exe 36 PID 476 wrote to memory of 1308 476 1b210138a28907b555c06bf888a6f656.exe 36 PID 476 wrote to memory of 1308 476 1b210138a28907b555c06bf888a6f656.exe 36 PID 476 wrote to memory of 1308 476 1b210138a28907b555c06bf888a6f656.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b210138a28907b555c06bf888a6f656.exe"C:\Users\Admin\AppData\Local\Temp\1b210138a28907b555c06bf888a6f656.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\1b210138a28907b555c06bf888a6f656.exeC:\Users\Admin\AppData\Local\Temp\1b210138a28907b555c06bf888a6f656.exe2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\1b210138a28907b555c06bf888a6f656.exeC:\Users\Admin\AppData\Local\Temp\1b210138a28907b555c06bf888a6f656.exe3⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2092
-
-
-
C:\Users\Admin\AppData\Local\Temp\1b210138a28907b555c06bf888a6f656.exeC:\Users\Admin\AppData\Local\Temp\1b210138a28907b555c06bf888a6f656.exe2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Users\Admin\AppData\Local\Temp\1b210138a28907b555c06bf888a6f656.exeC:\Users\Admin\AppData\Local\Temp\1b210138a28907b555c06bf888a6f656.exe3⤵
- Enumerates connected drives
PID:1308
-
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f2⤵
- Installs/modifies Browser Helper Object
PID:1604
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5bbbfbba56648ddb7701e62577a854011
SHA108b8ecee024e39421e769efcd0769b5cff963817
SHA256a06111f8e5c5c54ccfc4ab8d337bff669e7beea7865f795e7e0feb6121738cd1
SHA51275e02b5b88e457325ab35cae6aa125e8016e4c7be89680f7103fcef44e9c10cdbc2f02347e71c21260cdb776fd004e983c441f00cb470ef00732999260d0372a
-
Filesize
3.1MB
MD516f8386a0b49c8614fb844101d9664a8
SHA16a73a3552d716dba413efa5783a1792ae5e2f2e0
SHA256c13dfbe7ef0c0e590f97351167975f2bb97fe124ad28660350c1f9002cbe7c36
SHA512ddc151584fa4f8a7c2742dad9c7d32bbf7e94e7fd98f7152ffd64a91f6a8139d166cdc5a601d807d6b29bf4b6c09e7b488217101f148b7fc75e586eb8525963c
-
Filesize
3.1MB
MD52311ef4bbbda3f0771507052e97a97a1
SHA1b0fd366f94c9be4b693385ccd9b8b677ff4eb9b7
SHA2564508615cdec8ff6d76740ceb62477f1c28f84b63f97f9569bc9dfb494db4472b
SHA51251247d13b36dfa9634332db1c0e2ae6c1d72f2e68112184e4cbbc7d8110145f9ad26652db218eca06caabaa7107bedeeec4026da8431cd7b099f602ef9d83cb8
-
Filesize
5KB
MD5d807aa04480d1d149f7a4cac22984188
SHA1ffd5be65fd10017e34c11cecd105ebf4aa6c0cd9
SHA256eddf092d901afe128322910c3ff41a3f242d33d6b4cdf91ece327076b324ccbb
SHA512875543583c20ab164f37a4fb2587d234ce0a15d649d22b0d1dae5933f0a7683db170578746ea4458c51fec26e2243c6ec00dc10db8d4289789e50d5800cf863e