Analysis
-
max time kernel
179s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:58
Behavioral task
behavioral1
Sample
02963c67bf00a5d357dece29282f7dc6.exe
Resource
win7-20231215-en
General
-
Target
02963c67bf00a5d357dece29282f7dc6.exe
-
Size
1.1MB
-
MD5
02963c67bf00a5d357dece29282f7dc6
-
SHA1
711dfc4ec7685fdd7ec03098a9ac14163d8494fd
-
SHA256
7d478b98b96d489f329ae874fae49c149fa3355aabe73d99246fa2381f3c6e87
-
SHA512
8d732a60bba68b5d0b51ea34de47d2d26b73cdec3de58aaa0335792d9dd1d300c0d74eed0fd26471b1b71b5779663f2ca0d53b70d4fc3d34791757a3fe6af910
-
SSDEEP
24576:88PWE9a4eBUtm5S0Mfy9blxH7b9Mf8hFF2zybURgu+tu7ui5YiJ+ftTe:8bE9axBU05S0MsOkFFFbU2unbNJ9
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\%windir%\system32\secsvr\NTDLTU.exe = "%windir%\\system32\\secsvr\\NTDLTU.exe:*:Enabled:IDE01 Controller update" regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\%windir%\Slave.exe = "%windir%\\Slave.exe:*:Enabled:Slave Controller03APP" regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\1983:TCP = "1983:TCP:*:Enabled:Bus Controller" regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\4001:TCP = "4001:TCP:*:Enabled:Slave Controller01" regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\4002:TCP = "4002:TCP:*:Enabled:Slave Controller02" regedit.exe -
Executes dropped EXE 5 IoCs
pid Process 1928 hidden32.exe 436 unrar.exe 2936 Psydon.exe 1792 Psydon.exe 1484 Fport.exe -
Loads dropped DLL 19 IoCs
pid Process 2728 02963c67bf00a5d357dece29282f7dc6.exe 2728 02963c67bf00a5d357dece29282f7dc6.exe 1928 hidden32.exe 1928 hidden32.exe 1928 hidden32.exe 276 cmd.exe 276 cmd.exe 436 unrar.exe 436 unrar.exe 276 cmd.exe 276 cmd.exe 2936 Psydon.exe 2936 Psydon.exe 2936 Psydon.exe 1792 Psydon.exe 276 cmd.exe 276 cmd.exe 1484 Fport.exe 1484 Fport.exe -
resource yara_rule behavioral1/memory/2728-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x0033000000016d52-28.dat upx behavioral1/memory/2728-30-0x0000000000840000-0x0000000000850000-memory.dmp upx behavioral1/memory/1928-45-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2728-36-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x0005000000019313-67.dat upx behavioral1/memory/276-72-0x0000000002170000-0x0000000002383000-memory.dmp upx behavioral1/memory/2936-73-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/files/0x0005000000019313-76.dat upx behavioral1/memory/2936-78-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-81-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-242-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-244-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-248-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-251-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-255-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-262-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-265-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-269-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-272-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-276-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-279-0x0000000000400000-0x0000000000613000-memory.dmp upx behavioral1/memory/1792-283-0x0000000000400000-0x0000000000613000-memory.dmp upx -
Drops file in System32 directory 39 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\secsvr 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\Psydon.exe 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\HideRun.exe 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\nc.exe 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\Fport.exe unrar.exe File opened for modification C:\Windows\SysWOW64\secsvr\dataspsydon.dll Psydon.exe File created C:\Windows\SysWOW64\secsvr\beta1.reg 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\beta1.reg 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\CLGS.ocx unrar.exe File opened for modification C:\Windows\SysWOW64\secsvr\TList1.exe unrar.exe File created C:\Windows\SysWOW64\secsvr\Fport.exe unrar.exe File opened for modification C:\Windows\SysWOW64\secsvr\psydoStartUpLog.dll Psydon.exe File created C:\Windows\SysWOW64\secsvr\instal.bat 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\ra.reg 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\CLGS.ocx unrar.exe File created C:\Windows\SysWOW64\secsvr\hidden32.exe 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\Slave.exe 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\files.ocx 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\unrar.exe 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\kill.exe unrar.exe File opened for modification C:\Windows\SysWOW64\secsvr\sp33d.exe unrar.exe File opened for modification C:\Windows\SysWOW64\secsvr\hidden32.exe 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\dataspsydon.dll 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\TzoLibr.dll 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\unrar.exe 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\Connectm.dll unrar.exe File opened for modification C:\Windows\SysWOW64\secsvr\Connectm.dll unrar.exe File opened for modification C:\Windows\SysWOW64\secsvr\instal.bat 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\Psydon.exe 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\TzoLibr.dll 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\ra.reg 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\TList1.exe unrar.exe File created C:\Windows\SysWOW64\secsvr\sp33d.exe unrar.exe File created C:\Windows\SysWOW64\secsvr\dataspsydon.dll 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\files.ocx 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\HideRun.exe 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\nc.exe 02963c67bf00a5d357dece29282f7dc6.exe File created C:\Windows\SysWOW64\secsvr\Slave.exe 02963c67bf00a5d357dece29282f7dc6.exe File opened for modification C:\Windows\SysWOW64\secsvr\kill.exe unrar.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\slave.exe cmd.exe File opened for modification \??\c:\windows\slave.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 3064 regedit.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2728 wrote to memory of 1928 2728 02963c67bf00a5d357dece29282f7dc6.exe 29 PID 2728 wrote to memory of 1928 2728 02963c67bf00a5d357dece29282f7dc6.exe 29 PID 2728 wrote to memory of 1928 2728 02963c67bf00a5d357dece29282f7dc6.exe 29 PID 2728 wrote to memory of 1928 2728 02963c67bf00a5d357dece29282f7dc6.exe 29 PID 2728 wrote to memory of 1928 2728 02963c67bf00a5d357dece29282f7dc6.exe 29 PID 2728 wrote to memory of 1928 2728 02963c67bf00a5d357dece29282f7dc6.exe 29 PID 2728 wrote to memory of 1928 2728 02963c67bf00a5d357dece29282f7dc6.exe 29 PID 1928 wrote to memory of 276 1928 hidden32.exe 31 PID 1928 wrote to memory of 276 1928 hidden32.exe 31 PID 1928 wrote to memory of 276 1928 hidden32.exe 31 PID 1928 wrote to memory of 276 1928 hidden32.exe 31 PID 1928 wrote to memory of 276 1928 hidden32.exe 31 PID 1928 wrote to memory of 276 1928 hidden32.exe 31 PID 1928 wrote to memory of 276 1928 hidden32.exe 31 PID 276 wrote to memory of 436 276 cmd.exe 32 PID 276 wrote to memory of 436 276 cmd.exe 32 PID 276 wrote to memory of 436 276 cmd.exe 32 PID 276 wrote to memory of 436 276 cmd.exe 32 PID 276 wrote to memory of 436 276 cmd.exe 32 PID 276 wrote to memory of 436 276 cmd.exe 32 PID 276 wrote to memory of 436 276 cmd.exe 32 PID 276 wrote to memory of 2936 276 cmd.exe 33 PID 276 wrote to memory of 2936 276 cmd.exe 33 PID 276 wrote to memory of 2936 276 cmd.exe 33 PID 276 wrote to memory of 2936 276 cmd.exe 33 PID 276 wrote to memory of 2936 276 cmd.exe 33 PID 276 wrote to memory of 2936 276 cmd.exe 33 PID 276 wrote to memory of 2936 276 cmd.exe 33 PID 276 wrote to memory of 368 276 cmd.exe 34 PID 276 wrote to memory of 368 276 cmd.exe 34 PID 276 wrote to memory of 368 276 cmd.exe 34 PID 276 wrote to memory of 368 276 cmd.exe 34 PID 276 wrote to memory of 368 276 cmd.exe 34 PID 276 wrote to memory of 368 276 cmd.exe 34 PID 276 wrote to memory of 368 276 cmd.exe 34 PID 368 wrote to memory of 272 368 net.exe 35 PID 368 wrote to memory of 272 368 net.exe 35 PID 368 wrote to memory of 272 368 net.exe 35 PID 368 wrote to memory of 272 368 net.exe 35 PID 368 wrote to memory of 272 368 net.exe 35 PID 368 wrote to memory of 272 368 net.exe 35 PID 368 wrote to memory of 272 368 net.exe 35 PID 276 wrote to memory of 3064 276 cmd.exe 37 PID 276 wrote to memory of 3064 276 cmd.exe 37 PID 276 wrote to memory of 3064 276 cmd.exe 37 PID 276 wrote to memory of 3064 276 cmd.exe 37 PID 276 wrote to memory of 3064 276 cmd.exe 37 PID 276 wrote to memory of 3064 276 cmd.exe 37 PID 276 wrote to memory of 3064 276 cmd.exe 37 PID 276 wrote to memory of 1484 276 cmd.exe 38 PID 276 wrote to memory of 1484 276 cmd.exe 38 PID 276 wrote to memory of 1484 276 cmd.exe 38 PID 276 wrote to memory of 1484 276 cmd.exe 38 PID 276 wrote to memory of 1484 276 cmd.exe 38 PID 276 wrote to memory of 1484 276 cmd.exe 38 PID 276 wrote to memory of 1484 276 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\02963c67bf00a5d357dece29282f7dc6.exe"C:\Users\Admin\AppData\Local\Temp\02963c67bf00a5d357dece29282f7dc6.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\secsvr\hidden32.exe"C:\Windows\system32\secsvr\hidden32.exe" instal.bat2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.execmd /c instal.bat3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\secsvr\unrar.exeunrar.exe x files.ocx4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:436
-
-
C:\Windows\SysWOW64\secsvr\Psydon.exepsydon.exe /i /h /s4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2936
-
-
C:\Windows\SysWOW64\net.exenet start "psydon"4⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "psydon"5⤵PID:272
-
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s beta1.reg4⤵
- Modifies firewall policy service
- Runs .reg file with regedit
PID:3064
-
-
C:\Windows\SysWOW64\secsvr\Fport.exefport.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1484
-
-
-
-
C:\Windows\SysWOW64\secsvr\Psydon.exeC:\Windows\SysWOW64\secsvr\Psydon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5c39396c57353dd2a379d2f5a2cb1435f
SHA12a90ca983d724725b2ced0b0dfb5e4366f24cfc5
SHA256665a1b72b53ea753bb9dd863b0c760761e4693e2066daba42f144f1a6828d6ae
SHA5126954afc5cb985dea045003a6a981a61f4cbf6b4c67f7909efc0e67c424d8eb8a813a7b873911ad6754ca8d1974d71bae876f1ee9cde4393d9dc42d13ce411842
-
Filesize
1KB
MD566595ed0fdd1a84b6b1d9464ff34b244
SHA155bbd842ff8447bf3b78d0396ccf16db8d53b5a9
SHA256c41965937efc0496fdccebcefdc85febbd10e2b4b1c60d680725f8d63ea7cf3c
SHA512e8f39e8c3bafeeee55b0b33f660b3ca1d611275ebe802064ec4f39b75d2b9c9108862baeced1a2099c58c3f1c4b56504e36685229e1175b749c4fb63970b208e
-
Filesize
1KB
MD5a3f3057398d9eb3cd6ab2f51cb8c74a3
SHA1732cc109a8e0fe12c18f019582f1d91305848aa8
SHA2560a87f6bb7d922ab7c13a2847e49ef5fa642b6fef5ddd12ad06bb1d8cce8654c5
SHA5129b89a54e07aa66950b121b0aed0c36aa9239f99895afa3d35292a33a9b780aa3d3ba31e47bb7976aa881a03617ad278673b7f060b28fc16880e8cfc0116cf15b
-
Filesize
289KB
MD59f42da6bfd70adb84d9f538bc73912b6
SHA1c796c28374269503eb847532f9dfa3defc2593f0
SHA25679065ebf663232e8b30784e0f041c66bfca46391e60533ea654c8bb1b2d24496
SHA5124a6bc761d5a7b05188e1342e5676eeacf4336d72be171d7bc58cf54e484d7572850c02b589295fde710c0aa24be66eef28179b80dde9182dd675df37d989db59
-
Filesize
359B
MD59cd0bdc2b204b76114379a046cf9a68c
SHA1728b6ef9e92f36d0eaf5ddc097a3658ddb4882f8
SHA2564277f275ca9a2644f8a0fd017454bf5575355a828573c06b887a05d89a242b53
SHA5127b9409ac451eb89497902d7a53346bd93b8a6f32d371fb44fd43df4726f6e1836bb1591bf4e595ad1f22c9cb9076e803d949bf78d60587acfd3e24bb7c7c14d1
-
Filesize
3KB
MD54456fa91a8b249897985610b1c489822
SHA15683174fa44e031e6666277e5d50af44fc166cc8
SHA25631866769c50049f6cf084991ec2b0866b31cdca1406955ae9879d53629298caf
SHA512541c86a2cb4c589fe1ab6fb39e5cad9ef5d1661d669a64afb898416d50e8aba4355d8b719adb84cc046e71aab5baa20ea62958c571298ab0a681504ac56082a1
-
Filesize
91KB
MD5e6c36fa071309031c8c3d28690258b45
SHA16240e64a924d1c21c5cc336f9f0e2b3c7a5ae63f
SHA2568822bc50c747c11e25c28f2fa56b5e2a4e3d630770c3425f1651ea7b3691be05
SHA51230708a399126d49234ec6505eaf95f45fe55b4ceb00c1bf5ef54e9032707c2197aebcf398db43e5839e49f4e999f9b720f58154771a035eb5cc1f1db305ca5d0
-
Filesize
112KB
MD5dbb75488aa2fa22ba6950aead1ef30d5
SHA129d2e3c3a9c81274539f7dee65c337ce37f90202
SHA256143882bc3be0b43a52ea178489ad9eec46212e43887e79b32d8f71def4b65139
SHA512026da79625873e340acee876b71c7c059cc8aa6265f1e36c29594537bf5e460cbef2c9c6a20e8f47b16b6e802e661a36c24a026fffa750107c240873fa63547d
-
Filesize
553KB
MD5c787e7fa399285e1ebea237d6e4e8255
SHA16a4e3277cc2c298417b284c7ac3b1e01bfaeb2bc
SHA2567246f3da61a72d1e4742e09d72b77f061047830d4bc5fcb701855fe12ab4a204
SHA5129ee17f8ccc7b5e14e45f6f754bb83719669e136aa96e4f9fc5772f42a7e9d7d572efc61a334d46ea1f04b658ae1f0dbf64843dfab986efa7aabdd4851040e38d
-
Filesize
536KB
MD5adc18199a2a37a8b6288f2105c0c478b
SHA1b4da6dae8c7abbad53dab8a29c04ca68249980cb
SHA256b0ca7b98a5e0f847552558497ad3c16b3d1c54d156367b1d69366067a8485494
SHA512cafb84ed8b1b9d48a63a25095a73aea3e4c6f96d13b5cbf00bc98eb2fb316cf0006fcd3262998ce4ffc53c6372c0ee7fa665733f3eebd3b7e1a411d0a9b70ac4
-
Filesize
17KB
MD598a074b47236807843c48949f2ac5856
SHA1038cf5704f4a178a1d2d01736ec4d6e33cc54f48
SHA256a39fc8c9d35494b795a2f8b1f377b2bdcfafda15e3e637137d0ac8459e119b4d
SHA512c5a1237268c273a1a9ab5605c2e776640767205132a34771495eda59aaa1742bdc5f21529fa9685204756dc86744d9c7a96def2f57a2354849e304b7f985a860
-
Filesize
189KB
MD585dc5f761d79f6e9546fa47c9afda74d
SHA14e5059aba9217cb51ba9435bfb1030e84f36563f
SHA2568e728711f98b2a7b14cad2f9b1d6d294ddd5de84d68c52f1a587824aec29669e
SHA5126f82202f69e0df5d13cc3b6efa05998a73755a59941e6657b3dc1b4964d1d6d291d3e1e13af0be404b5a23298c71dbe4bd5655e6036269a54fa3ab6b0734bb2c