Analysis
-
max time kernel
102s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 14:54
Behavioral task
behavioral1
Sample
026fbdf71b14102cb9364e06a06e2b93.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
026fbdf71b14102cb9364e06a06e2b93.exe
Resource
win10v2004-20231215-en
General
-
Target
026fbdf71b14102cb9364e06a06e2b93.exe
-
Size
287KB
-
MD5
026fbdf71b14102cb9364e06a06e2b93
-
SHA1
a210a51350fa517d53c5d58f3bb07ff19584a077
-
SHA256
20b66a02786b24d202f7805c74786df8b3ade98ad12543cf30bb5728f4227946
-
SHA512
2f23f5f6fd009b362072bff3a5e5a91ef56a3cd31da96aaa7533be1b70a84f6d521de2deaa7dc24bcf507f40ab6fac2d40b16f6c19e1effd96332b89f376c036
-
SSDEEP
6144:lvIloK0zat8GzwzkIn68N2oK0zat8GzwzkIXfYnPYQNa:lQqK0qjIn5K0qjIQnAma
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\spools.exe 026fbdf71b14102cb9364e06a06e2b93.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 026fbdf71b14102cb9364e06a06e2b93.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" 026fbdf71b14102cb9364e06a06e2b93.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" 026fbdf71b14102cb9364e06a06e2b93.exe -
resource yara_rule behavioral2/memory/3908-0-0x0000000000400000-0x0000000001564000-memory.dmp upx behavioral2/files/0x000200000001e1eb-5.dat upx behavioral2/memory/3908-6-0x0000000000400000-0x0000000001564000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 026fbdf71b14102cb9364e06a06e2b93.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" 026fbdf71b14102cb9364e06a06e2b93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 026fbdf71b14102cb9364e06a06e2b93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" 026fbdf71b14102cb9364e06a06e2b93.exe -
Enumerates connected drives 3 TTPs 19 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\X: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\E: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\I: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\K: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\M: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\T: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\W: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\J: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\L: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\N: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\O: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\V: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\G: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\Q: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\S: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\U: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\H: 026fbdf71b14102cb9364e06a06e2b93.exe File opened (read-only) \??\R: 026fbdf71b14102cb9364e06a06e2b93.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\drivers\\spools.exe \"%1\" %*" 026fbdf71b14102cb9364e06a06e2b93.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3908 wrote to memory of 4796 3908 026fbdf71b14102cb9364e06a06e2b93.exe 17 PID 3908 wrote to memory of 4796 3908 026fbdf71b14102cb9364e06a06e2b93.exe 17 PID 3908 wrote to memory of 4796 3908 026fbdf71b14102cb9364e06a06e2b93.exe 17 PID 3908 wrote to memory of 2784 3908 026fbdf71b14102cb9364e06a06e2b93.exe 19 PID 3908 wrote to memory of 2784 3908 026fbdf71b14102cb9364e06a06e2b93.exe 19 PID 3908 wrote to memory of 2784 3908 026fbdf71b14102cb9364e06a06e2b93.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\026fbdf71b14102cb9364e06a06e2b93.exe"C:\Users\Admin\AppData\Local\Temp\026fbdf71b14102cb9364e06a06e2b93.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rmdir /S /Q "C:\Users\Admin\Cookies\"2⤵PID:4796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rmdir /S /Q "C:\Users\Admin\Application Data\Macromedia\Flash Player\"2⤵PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD559c5eeb059ec67631ba1f051592b2083
SHA1be7f57a3b0dac0a1c12acfde3fbaf6ce3a8e5810
SHA256a11003948477fa1fd37f92b44cf56a6d9dcff24dc038853cb45f7c891299de49
SHA512fa8b8507208306c75acd4b3f2236b0875a5b518d0c8e82ed627f320b53f473f767843caa812c077fee565dbee19832213a5f3975baa1fc5df98bbde27ddcaa9b