Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 14:28
Static task
static1
Behavioral task
behavioral1
Sample
00de8624e1b252c5de3a95453be1b6f2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00de8624e1b252c5de3a95453be1b6f2.exe
Resource
win10v2004-20231215-en
General
-
Target
00de8624e1b252c5de3a95453be1b6f2.exe
-
Size
480KB
-
MD5
00de8624e1b252c5de3a95453be1b6f2
-
SHA1
dbf51de96f8c68e11575ccaf62260b2cd4b4e7e2
-
SHA256
a9c0ffb7c8bde11ccbd31e04d225e5eb901e84fbb4f8278744c807a434b9bde8
-
SHA512
2b388ffb89234522b92a6b7bdabcde33db6bb6ca62b0ff344861659ae5c041218c1c389c7aef136536726de365afb0d1400a9e3c8e1085f23319ee51fe98eadd
-
SSDEEP
6144:/K85clMQdCsA0CQ5f2oj1zSyB4rBfL1RCaSC0e7DETTq7xPRU3PFgx0bAhX:/K2SCf0P52oEyq1R3/UaNPRWPq6Q
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2788 N0TEPAD.EXE 2724 ZIP.exe 1488 SVCHOST.EXE -
Loads dropped DLL 17 IoCs
pid Process 2448 00de8624e1b252c5de3a95453be1b6f2.exe 2448 00de8624e1b252c5de3a95453be1b6f2.exe 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\V: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\Y: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\Z: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\G: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\J: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\Q: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\R: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\X: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\E: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\I: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\S: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\W: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\L: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\N: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\M: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\P: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\T: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\U: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\H: 00de8624e1b252c5de3a95453be1b6f2.exe File opened (read-only) \??\K: 00de8624e1b252c5de3a95453be1b6f2.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AutoRun.inf 00de8624e1b252c5de3a95453be1b6f2.exe File opened for modification F:\AutoRun.inf 00de8624e1b252c5de3a95453be1b6f2.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File created C:\Windows\SysWOW64\WBEM\N0TEPAD.EXE 00de8624e1b252c5de3a95453be1b6f2.exe File opened for modification C:\Windows\SysWOW64\WinAlert.dll 00de8624e1b252c5de3a95453be1b6f2.exe File created C:\Windows\SysWOW64\WBEM\svchost.exe N0TEPAD.EXE File created C:\Windows\SysWOW64\N0TEPAD.EXE SVCHOST.EXE File opened for modification C:\Windows\SysWOW64\WBEM\keylog SVCHOST.EXE File opened for modification C:\Windows\SysWOW64\WBEM\svchost.exe 00de8624e1b252c5de3a95453be1b6f2.exe File opened for modification C:\Windows\SysWOW64\WBEM\N0TEPAD.EXE 00de8624e1b252c5de3a95453be1b6f2.exe File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX 00de8624e1b252c5de3a95453be1b6f2.exe File created C:\Windows\SysWOW64\N0TEPAD.EXE 00de8624e1b252c5de3a95453be1b6f2.exe File opened for modification C:\Windows\SysWOW64\N0TEPAD.EXE 00de8624e1b252c5de3a95453be1b6f2.exe File created C:\Windows\SysWOW64\N0TEPAD.EXE N0TEPAD.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SVCHOST.EXE File opened for modification C:\Windows\SysWOW64\MSINET.OCX 00de8624e1b252c5de3a95453be1b6f2.exe File opened for modification C:\Windows\SysWOW64\ntsvc.ocx 00de8624e1b252c5de3a95453be1b6f2.exe File opened for modification C:\Windows\SysWOW64\zip32.dll ZIP.exe File opened for modification C:\Windows\SysWOW64\keylog N0TEPAD.EXE File created C:\Windows\SysWOW64\WBEM\svchost.exe SVCHOST.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ZIP.exe 00de8624e1b252c5de3a95453be1b6f2.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 SVCHOST.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5265346-66C5-4C8D-A6F6-48BF7049EF29}\WpadDecision = "0" SVCHOST.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5265346-66C5-4C8D-A6F6-48BF7049EF29}\06-14-24-d1-94-a9 SVCHOST.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-14-24-d1-94-a9\WpadDecisionTime = 802fd1ed8336da01 SVCHOST.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix SVCHOST.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections SVCHOST.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" SVCHOST.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5265346-66C5-4C8D-A6F6-48BF7049EF29}\WpadDecisionTime = 802fd1ed8336da01 SVCHOST.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" SVCHOST.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SVCHOST.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 SVCHOST.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 SVCHOST.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5265346-66C5-4C8D-A6F6-48BF7049EF29}\WpadNetworkName = "Network 3" SVCHOST.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-14-24-d1-94-a9 SVCHOST.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-14-24-d1-94-a9\WpadDecisionReason = "1" SVCHOST.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" SVCHOST.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings SVCHOST.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad SVCHOST.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SVCHOST.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5265346-66C5-4C8D-A6F6-48BF7049EF29} SVCHOST.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B5265346-66C5-4C8D-A6F6-48BF7049EF29}\WpadDecisionReason = "1" SVCHOST.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-14-24-d1-94-a9\WpadDecision = "0" SVCHOST.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SVCHOST.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings SVCHOST.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\ = "Microsoft Internet Transfer Control, version 6.0" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NTService.Control.1\CLSID N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet.1 N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ = "DInetEvents" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908}\InprocServer32\ = "C:\\Windows\\SysWOW64\\MSINET.OCX" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\TypeLib\ = "{48E59290-9880-11CF-9754-00AA00C00908}" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7BC34A0-BA86-11CF-84B1-CBC2DA68BF6C}\1.0\0\win32 N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\ = "Microsoft Internet Transfer Control, version 6.0" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E7BC34A1-BA86-11CF-84B1-CBC2DA68BF6C} N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Version N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWOW64\\MSWINSCK.OCX" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7BC34A3-BA86-11CF-84B1-CBC2DA68BF6C} N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7BC34A3-BA86-11CF-84B1-CBC2DA68BF6C}\ToolboxBitmap32 N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7BC34A3-BA86-11CF-84B1-CBC2DA68BF6C}\MiscStatus N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus\1\ = "132497" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ = "IInet" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\MSWINSCK.OCX" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7BC34A3-BA86-11CF-84B1-CBC2DA68BF6C}\MiscStatus\ = "0" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32\ = "C:\\Windows\\SysWOW64\\MSWINSCK.OCX, 1" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\CLSID\ = "{48E59293-9880-11CF-9754-00AA00C00908}" N0TEPAD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908} N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59295-9880-11CF-9754-00AA00C00908}\ = "Internet Control URL Property Page Object" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E7BC34A0-BA86-11CF-84B1-CBC2DA68BF6C} N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NTService.Control.1 N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\TypeLib\Version = "1.0" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7BC34A1-BA86-11CF-84B1-CBC2DA68BF6C}\TypeLib\Version = "1.0" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E7BC34A2-BA86-11CF-84B1-CBC2DA68BF6C}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32 N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7BC34A1-BA86-11CF-84B1-CBC2DA68BF6C}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7BC34A3-BA86-11CF-84B1-CBC2DA68BF6C}\Version N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus\1 N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0 N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59295-9880-11CF-9754-00AA00C00908} N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ = "IInet" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E7BC34A1-BA86-11CF-84B1-CBC2DA68BF6C}\ProxyStubClsid32 N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E7BC34A2-BA86-11CF-84B1-CBC2DA68BF6C}\TypeLib\ = "{E7BC34A0-BA86-11CF-84B1-CBC2DA68BF6C}" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7BC34A3-BA86-11CF-84B1-CBC2DA68BF6C}\InprocServer32 N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7BC34A3-BA86-11CF-84B1-CBC2DA68BF6C}\MiscStatus\1\ = "199824" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908} N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908} N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7BC34A3-BA86-11CF-84B1-CBC2DA68BF6C}\Control\ N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\VersionIndependentProgID\ = "InetCtls.Inet" N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32 N0TEPAD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" N0TEPAD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NTService.Control.1\CLSID\ = "{E7BC34A3-BA86-11CF-84B1-CBC2DA68BF6C}" N0TEPAD.EXE -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 2976 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE 1488 SVCHOST.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2788 N0TEPAD.EXE 1488 SVCHOST.EXE -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeSystemtimePrivilege 2448 00de8624e1b252c5de3a95453be1b6f2.exe Token: SeSystemtimePrivilege 2448 00de8624e1b252c5de3a95453be1b6f2.exe Token: SeSystemtimePrivilege 2448 00de8624e1b252c5de3a95453be1b6f2.exe Token: SeSystemtimePrivilege 2448 00de8624e1b252c5de3a95453be1b6f2.exe Token: SeSystemtimePrivilege 2448 00de8624e1b252c5de3a95453be1b6f2.exe Token: SeSystemtimePrivilege 2448 00de8624e1b252c5de3a95453be1b6f2.exe Token: SeSystemtimePrivilege 2448 00de8624e1b252c5de3a95453be1b6f2.exe Token: SeSystemtimePrivilege 2448 00de8624e1b252c5de3a95453be1b6f2.exe Token: SeSystemtimePrivilege 2788 N0TEPAD.EXE Token: SeSystemtimePrivilege 2788 N0TEPAD.EXE Token: SeShutdownPrivilege 2788 N0TEPAD.EXE Token: SeSystemtimePrivilege 2788 N0TEPAD.EXE Token: SeSystemtimePrivilege 2788 N0TEPAD.EXE Token: SeSystemtimePrivilege 1488 SVCHOST.EXE Token: SeSystemtimePrivilege 1488 SVCHOST.EXE Token: SeShutdownPrivilege 1488 SVCHOST.EXE Token: SeSystemtimePrivilege 1488 SVCHOST.EXE Token: SeSystemtimePrivilege 1488 SVCHOST.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2448 00de8624e1b252c5de3a95453be1b6f2.exe 2788 N0TEPAD.EXE 2788 N0TEPAD.EXE 2724 ZIP.exe 1488 SVCHOST.EXE 1488 SVCHOST.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2788 2448 00de8624e1b252c5de3a95453be1b6f2.exe 28 PID 2448 wrote to memory of 2788 2448 00de8624e1b252c5de3a95453be1b6f2.exe 28 PID 2448 wrote to memory of 2788 2448 00de8624e1b252c5de3a95453be1b6f2.exe 28 PID 2448 wrote to memory of 2788 2448 00de8624e1b252c5de3a95453be1b6f2.exe 28 PID 2448 wrote to memory of 2724 2448 00de8624e1b252c5de3a95453be1b6f2.exe 29 PID 2448 wrote to memory of 2724 2448 00de8624e1b252c5de3a95453be1b6f2.exe 29 PID 2448 wrote to memory of 2724 2448 00de8624e1b252c5de3a95453be1b6f2.exe 29 PID 2448 wrote to memory of 2724 2448 00de8624e1b252c5de3a95453be1b6f2.exe 29 PID 2448 wrote to memory of 2568 2448 00de8624e1b252c5de3a95453be1b6f2.exe 30 PID 2448 wrote to memory of 2568 2448 00de8624e1b252c5de3a95453be1b6f2.exe 30 PID 2448 wrote to memory of 2568 2448 00de8624e1b252c5de3a95453be1b6f2.exe 30 PID 2448 wrote to memory of 2568 2448 00de8624e1b252c5de3a95453be1b6f2.exe 30 PID 2788 wrote to memory of 2616 2788 N0TEPAD.EXE 32 PID 2788 wrote to memory of 2616 2788 N0TEPAD.EXE 32 PID 2788 wrote to memory of 2616 2788 N0TEPAD.EXE 32 PID 2788 wrote to memory of 2616 2788 N0TEPAD.EXE 32 PID 2788 wrote to memory of 2976 2788 N0TEPAD.EXE 34 PID 2788 wrote to memory of 2976 2788 N0TEPAD.EXE 34 PID 2788 wrote to memory of 2976 2788 N0TEPAD.EXE 34 PID 2788 wrote to memory of 2976 2788 N0TEPAD.EXE 34 PID 2788 wrote to memory of 756 2788 N0TEPAD.EXE 35 PID 2788 wrote to memory of 756 2788 N0TEPAD.EXE 35 PID 2788 wrote to memory of 756 2788 N0TEPAD.EXE 35 PID 2788 wrote to memory of 756 2788 N0TEPAD.EXE 35 PID 2788 wrote to memory of 1028 2788 N0TEPAD.EXE 37 PID 2788 wrote to memory of 1028 2788 N0TEPAD.EXE 37 PID 2788 wrote to memory of 1028 2788 N0TEPAD.EXE 37 PID 2788 wrote to memory of 1028 2788 N0TEPAD.EXE 37 PID 1488 wrote to memory of 2740 1488 SVCHOST.EXE 40 PID 1488 wrote to memory of 2740 1488 SVCHOST.EXE 40 PID 1488 wrote to memory of 2740 1488 SVCHOST.EXE 40 PID 1488 wrote to memory of 2740 1488 SVCHOST.EXE 40 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer N0TEPAD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "149" N0TEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\00de8624e1b252c5de3a95453be1b6f2.exe"C:\Users\Admin\AppData\Local\Temp\00de8624e1b252c5de3a95453be1b6f2.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\N0TEPAD.EXEC:\Windows\system32\N0TEPAD.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2788 -
C:\Windows\SysWOW64\net1.exenet1.exe stop Alerter3⤵PID:2616
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\system32\WinAlert.dll3⤵
- Runs regedit.exe
PID:2976
-
-
C:\Windows\SysWOW64\net1.exenet1.exe start Alerter3⤵PID:756
-
-
C:\Windows\SysWOW64\net1.exenet1.exe stop SharedAccess3⤵PID:1028
-
-
-
C:\Windows\ZIP.exeC:\Windows\ZIP.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Windows\SysWOW64\CMD.EXEC:\Windows\system32\CMD.EXE /C DEL /Q/F/S F:\*.GHO2⤵PID:2568
-
-
C:\Windows\SysWOW64\WBEM\SVCHOST.EXEC:\Windows\SysWOW64\WBEM\SVCHOST.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\net1.exenet1.exe start Alerter2⤵PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD57bec181a21753498b6bd001c42a42722
SHA13249f233657dc66632c0539c47895bfcee5770cc
SHA25673da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31
SHA512d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc
-
Filesize
47KB
MD59df87f8c609854d35b878c25b4fbb15f
SHA1e9f71798788987e157c2a009df4c0ab2dd1a11bb
SHA25676390321c50bc2ea584fdd874287f997d901e9e3b247a6c296fe30d47762cc39
SHA5123ccc74ec08e34e6c6a8dc831500510493d9286a64e294040173eda278a478fa08a0cabd76c674a21a5d8a3187ff09e7d5d41a2e19912f3dc30f92130a7e31def
-
Filesize
33KB
MD5623eb10ca0eb3bd2f10fc1e0e78a0941
SHA152a120192ae8485e6bfaf39488a65ed3d7a07740
SHA256c948b4196833ba2124dcdf224973d1640b101721729faec6c2e47424b1fb01a5
SHA512a0a8e2dffb8d7a3ba16dfbcffac31083a4a88cec63918e88f6873409e0ee041188c9fdc745eb813c5de61330a9e768a195f40da557ce18419334d96344a1233d
-
Filesize
2KB
MD59b8dce245bbef4deaa6f2ffcd64ee5b7
SHA18553e541bc13758baa27f8a30762743b7e088534
SHA25665b635b8ef6ab8f779ae9cc5cf45f1cb7544fd50e76db8f1d3038b5fed0cdfbb
SHA512fc750d8f1f2e4a54cd5bf0d4869b5d961003b39042af7c077f1956bd5b036048ebad21d98ed55079a9412719ff6adcc07783a6aa608ac3cc7e5f09b0e1f1a7e0
-
Filesize
152KB
MD52e5838ea222348b7aee30737d0bd0846
SHA1bac59f09587484831d3b759071e9bb5184da6ff2
SHA25638d4f11cced8d1a6939a87019e66ee0bb5eeb4a6f56b398f0561212ebe020b18
SHA512b2c32c96313c226b741f0bee6f3c9d97a7ea39c69d5b29cc555bc3a47ff01b34423eb6ed40f1b3e55ae07f76b2ccb375127f1050fc982975aae512bdbfaf9e30
-
Filesize
108KB
MD5e2ed33081890d5dd719a309d3946d6c2
SHA1cc3e60ba8475089676aa402cb62223366ff58f34
SHA256114c16f459eaeedc81817edde2f33ebb65c8c093aa66dd98a599395a07c4e061
SHA5125a202c03615b58dea5d7fa641b6583f7463b8b68a9540912151b4ddb427466c4e1aaf87c8b1800f70be03d6008fd84add7d601000697c156031f9139dab85fac