Analysis

  • max time kernel
    179s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 14:58

General

  • Target

    02963c67bf00a5d357dece29282f7dc6.exe

  • Size

    1.1MB

  • MD5

    02963c67bf00a5d357dece29282f7dc6

  • SHA1

    711dfc4ec7685fdd7ec03098a9ac14163d8494fd

  • SHA256

    7d478b98b96d489f329ae874fae49c149fa3355aabe73d99246fa2381f3c6e87

  • SHA512

    8d732a60bba68b5d0b51ea34de47d2d26b73cdec3de58aaa0335792d9dd1d300c0d74eed0fd26471b1b71b5779663f2ca0d53b70d4fc3d34791757a3fe6af910

  • SSDEEP

    24576:88PWE9a4eBUtm5S0Mfy9blxH7b9Mf8hFF2zybURgu+tu7ui5YiJ+ftTe:8bE9axBU05S0MsOkFFFbU2unbNJ9

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 7 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 19 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 39 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs .reg file with regedit 1 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02963c67bf00a5d357dece29282f7dc6.exe
    "C:\Users\Admin\AppData\Local\Temp\02963c67bf00a5d357dece29282f7dc6.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SysWOW64\secsvr\hidden32.exe
      "C:\Windows\system32\secsvr\hidden32.exe" instal.bat
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c instal.bat
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:276
        • C:\Windows\SysWOW64\secsvr\unrar.exe
          unrar.exe x files.ocx
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          PID:436
        • C:\Windows\SysWOW64\secsvr\Psydon.exe
          psydon.exe /i /h /s
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2936
        • C:\Windows\SysWOW64\net.exe
          net start "psydon"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:368
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start "psydon"
            5⤵
              PID:272
          • C:\Windows\SysWOW64\regedit.exe
            regedit /s beta1.reg
            4⤵
            • Modifies firewall policy service
            • Runs .reg file with regedit
            PID:3064
          • C:\Windows\SysWOW64\secsvr\Fport.exe
            fport.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1484
    • C:\Windows\SysWOW64\secsvr\Psydon.exe
      C:\Windows\SysWOW64\secsvr\Psydon.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      PID:1792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\secsvr\TZOLIBR.DLL

      Filesize

      36KB

      MD5

      c39396c57353dd2a379d2f5a2cb1435f

      SHA1

      2a90ca983d724725b2ced0b0dfb5e4366f24cfc5

      SHA256

      665a1b72b53ea753bb9dd863b0c760761e4693e2066daba42f144f1a6828d6ae

      SHA512

      6954afc5cb985dea045003a6a981a61f4cbf6b4c67f7909efc0e67c424d8eb8a813a7b873911ad6754ca8d1974d71bae876f1ee9cde4393d9dc42d13ce411842

    • C:\Windows\SysWOW64\secsvr\beta1.reg

      Filesize

      1KB

      MD5

      66595ed0fdd1a84b6b1d9464ff34b244

      SHA1

      55bbd842ff8447bf3b78d0396ccf16db8d53b5a9

      SHA256

      c41965937efc0496fdccebcefdc85febbd10e2b4b1c60d680725f8d63ea7cf3c

      SHA512

      e8f39e8c3bafeeee55b0b33f660b3ca1d611275ebe802064ec4f39b75d2b9c9108862baeced1a2099c58c3f1c4b56504e36685229e1175b749c4fb63970b208e

    • C:\Windows\SysWOW64\secsvr\dataspsydon.dll

      Filesize

      1KB

      MD5

      a3f3057398d9eb3cd6ab2f51cb8c74a3

      SHA1

      732cc109a8e0fe12c18f019582f1d91305848aa8

      SHA256

      0a87f6bb7d922ab7c13a2847e49ef5fa642b6fef5ddd12ad06bb1d8cce8654c5

      SHA512

      9b89a54e07aa66950b121b0aed0c36aa9239f99895afa3d35292a33a9b780aa3d3ba31e47bb7976aa881a03617ad278673b7f060b28fc16880e8cfc0116cf15b

    • C:\Windows\SysWOW64\secsvr\files.ocx

      Filesize

      289KB

      MD5

      9f42da6bfd70adb84d9f538bc73912b6

      SHA1

      c796c28374269503eb847532f9dfa3defc2593f0

      SHA256

      79065ebf663232e8b30784e0f041c66bfca46391e60533ea654c8bb1b2d24496

      SHA512

      4a6bc761d5a7b05188e1342e5676eeacf4336d72be171d7bc58cf54e484d7572850c02b589295fde710c0aa24be66eef28179b80dde9182dd675df37d989db59

    • C:\Windows\SysWOW64\secsvr\instal.bat

      Filesize

      359B

      MD5

      9cd0bdc2b204b76114379a046cf9a68c

      SHA1

      728b6ef9e92f36d0eaf5ddc097a3658ddb4882f8

      SHA256

      4277f275ca9a2644f8a0fd017454bf5575355a828573c06b887a05d89a242b53

      SHA512

      7b9409ac451eb89497902d7a53346bd93b8a6f32d371fb44fd43df4726f6e1836bb1591bf4e595ad1f22c9cb9076e803d949bf78d60587acfd3e24bb7c7c14d1

    • \??\c:\windows\SysWOW64\secsvr\Connectm.dll

      Filesize

      3KB

      MD5

      4456fa91a8b249897985610b1c489822

      SHA1

      5683174fa44e031e6666277e5d50af44fc166cc8

      SHA256

      31866769c50049f6cf084991ec2b0866b31cdca1406955ae9879d53629298caf

      SHA512

      541c86a2cb4c589fe1ab6fb39e5cad9ef5d1661d669a64afb898416d50e8aba4355d8b719adb84cc046e71aab5baa20ea62958c571298ab0a681504ac56082a1

    • \??\c:\windows\SysWOW64\secsvr\Slave.exe

      Filesize

      91KB

      MD5

      e6c36fa071309031c8c3d28690258b45

      SHA1

      6240e64a924d1c21c5cc336f9f0e2b3c7a5ae63f

      SHA256

      8822bc50c747c11e25c28f2fa56b5e2a4e3d630770c3425f1651ea7b3691be05

      SHA512

      30708a399126d49234ec6505eaf95f45fe55b4ceb00c1bf5ef54e9032707c2197aebcf398db43e5839e49f4e999f9b720f58154771a035eb5cc1f1db305ca5d0

    • \Windows\SysWOW64\secsvr\Fport.exe

      Filesize

      112KB

      MD5

      dbb75488aa2fa22ba6950aead1ef30d5

      SHA1

      29d2e3c3a9c81274539f7dee65c337ce37f90202

      SHA256

      143882bc3be0b43a52ea178489ad9eec46212e43887e79b32d8f71def4b65139

      SHA512

      026da79625873e340acee876b71c7c059cc8aa6265f1e36c29594537bf5e460cbef2c9c6a20e8f47b16b6e802e661a36c24a026fffa750107c240873fa63547d

    • \Windows\SysWOW64\secsvr\Psydon.exe

      Filesize

      553KB

      MD5

      c787e7fa399285e1ebea237d6e4e8255

      SHA1

      6a4e3277cc2c298417b284c7ac3b1e01bfaeb2bc

      SHA256

      7246f3da61a72d1e4742e09d72b77f061047830d4bc5fcb701855fe12ab4a204

      SHA512

      9ee17f8ccc7b5e14e45f6f754bb83719669e136aa96e4f9fc5772f42a7e9d7d572efc61a334d46ea1f04b658ae1f0dbf64843dfab986efa7aabdd4851040e38d

    • \Windows\SysWOW64\secsvr\Psydon.exe

      Filesize

      536KB

      MD5

      adc18199a2a37a8b6288f2105c0c478b

      SHA1

      b4da6dae8c7abbad53dab8a29c04ca68249980cb

      SHA256

      b0ca7b98a5e0f847552558497ad3c16b3d1c54d156367b1d69366067a8485494

      SHA512

      cafb84ed8b1b9d48a63a25095a73aea3e4c6f96d13b5cbf00bc98eb2fb316cf0006fcd3262998ce4ffc53c6372c0ee7fa665733f3eebd3b7e1a411d0a9b70ac4

    • \Windows\SysWOW64\secsvr\hidden32.exe

      Filesize

      17KB

      MD5

      98a074b47236807843c48949f2ac5856

      SHA1

      038cf5704f4a178a1d2d01736ec4d6e33cc54f48

      SHA256

      a39fc8c9d35494b795a2f8b1f377b2bdcfafda15e3e637137d0ac8459e119b4d

      SHA512

      c5a1237268c273a1a9ab5605c2e776640767205132a34771495eda59aaa1742bdc5f21529fa9685204756dc86744d9c7a96def2f57a2354849e304b7f985a860

    • \Windows\SysWOW64\secsvr\unrar.exe

      Filesize

      189KB

      MD5

      85dc5f761d79f6e9546fa47c9afda74d

      SHA1

      4e5059aba9217cb51ba9435bfb1030e84f36563f

      SHA256

      8e728711f98b2a7b14cad2f9b1d6d294ddd5de84d68c52f1a587824aec29669e

      SHA512

      6f82202f69e0df5d13cc3b6efa05998a73755a59941e6657b3dc1b4964d1d6d291d3e1e13af0be404b5a23298c71dbe4bd5655e6036269a54fa3ab6b0734bb2c

    • memory/276-77-0x0000000002170000-0x0000000002383000-memory.dmp

      Filesize

      2.1MB

    • memory/276-72-0x0000000002170000-0x0000000002383000-memory.dmp

      Filesize

      2.1MB

    • memory/436-66-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1792-81-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-279-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-265-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-269-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-255-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-251-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-272-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-248-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-244-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-276-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-262-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-283-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1792-242-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/1928-46-0x0000000000020000-0x0000000000030000-memory.dmp

      Filesize

      64KB

    • memory/1928-45-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2728-36-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2728-0-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2728-42-0x0000000000840000-0x0000000000850000-memory.dmp

      Filesize

      64KB

    • memory/2728-44-0x0000000000240000-0x000000000024D000-memory.dmp

      Filesize

      52KB

    • memory/2728-30-0x0000000000840000-0x0000000000850000-memory.dmp

      Filesize

      64KB

    • memory/2728-2-0x0000000000240000-0x0000000000264000-memory.dmp

      Filesize

      144KB

    • memory/2728-1-0x0000000000240000-0x0000000000264000-memory.dmp

      Filesize

      144KB

    • memory/2936-78-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB

    • memory/2936-73-0x0000000000400000-0x0000000000613000-memory.dmp

      Filesize

      2.1MB