Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 15:01
Behavioral task
behavioral1
Sample
02b85f76e742a8b641c9958ad308d434.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02b85f76e742a8b641c9958ad308d434.exe
Resource
win10v2004-20231215-en
General
-
Target
02b85f76e742a8b641c9958ad308d434.exe
-
Size
286KB
-
MD5
02b85f76e742a8b641c9958ad308d434
-
SHA1
dba8f7fef137c9cbece065a13b9a043a6d4eeed4
-
SHA256
8c6ea1c2182690d78b48d944c7ad3a1752f87f8df56e49de5cc6371db3fd0ce1
-
SHA512
eea52574679d3a31e7eaac9b497a0417a7036dcdb365471b07bdac3577cde44e2860771ee823c53f227b01757ec4d40bec6004d9bd366d773453a008675dda22
-
SSDEEP
6144:6rhoyWGeqkKyOPWV+TJIE2nG3vcGLlEiQ6mFwYZ9QgzZ3foSv:soTKyrWSnG3EGZEkmFwYZRzpoSv
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Sexy.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Sexy.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Directory\\WindowsDef.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2716 WindowsDef.exe 2536 WindowsDef.exe 2596 WindowsDef.exe -
Loads dropped DLL 5 IoCs
pid Process 2912 02b85f76e742a8b641c9958ad308d434.exe 2912 02b85f76e742a8b641c9958ad308d434.exe 2912 02b85f76e742a8b641c9958ad308d434.exe 2912 02b85f76e742a8b641c9958ad308d434.exe 2912 02b85f76e742a8b641c9958ad308d434.exe -
resource yara_rule behavioral1/memory/2912-0-0x0000000000400000-0x00000000005FB000-memory.dmp upx behavioral1/files/0x003100000001396e-27.dat upx behavioral1/memory/2716-48-0x0000000000400000-0x00000000005FB000-memory.dmp upx behavioral1/memory/2912-45-0x0000000000400000-0x00000000005FB000-memory.dmp upx behavioral1/memory/2536-50-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2596-54-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2536-53-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2596-60-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2596-59-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2536-58-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2596-62-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2716-64-0x0000000000400000-0x00000000005FB000-memory.dmp upx behavioral1/memory/2536-70-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2596-71-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2536-73-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2536-74-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2536-79-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2536-86-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2536-88-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2536-93-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2536-100-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDef = "C:\\Users\\Admin\\AppData\\Roaming\\Directory\\WindowsDef.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2716 set thread context of 2536 2716 WindowsDef.exe 32 PID 2716 set thread context of 2596 2716 WindowsDef.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 868 reg.exe 1396 reg.exe 1132 reg.exe 2860 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 2596 WindowsDef.exe Token: 1 2536 WindowsDef.exe Token: SeCreateTokenPrivilege 2536 WindowsDef.exe Token: SeAssignPrimaryTokenPrivilege 2536 WindowsDef.exe Token: SeLockMemoryPrivilege 2536 WindowsDef.exe Token: SeIncreaseQuotaPrivilege 2536 WindowsDef.exe Token: SeMachineAccountPrivilege 2536 WindowsDef.exe Token: SeTcbPrivilege 2536 WindowsDef.exe Token: SeSecurityPrivilege 2536 WindowsDef.exe Token: SeTakeOwnershipPrivilege 2536 WindowsDef.exe Token: SeLoadDriverPrivilege 2536 WindowsDef.exe Token: SeSystemProfilePrivilege 2536 WindowsDef.exe Token: SeSystemtimePrivilege 2536 WindowsDef.exe Token: SeProfSingleProcessPrivilege 2536 WindowsDef.exe Token: SeIncBasePriorityPrivilege 2536 WindowsDef.exe Token: SeCreatePagefilePrivilege 2536 WindowsDef.exe Token: SeCreatePermanentPrivilege 2536 WindowsDef.exe Token: SeBackupPrivilege 2536 WindowsDef.exe Token: SeRestorePrivilege 2536 WindowsDef.exe Token: SeShutdownPrivilege 2536 WindowsDef.exe Token: SeDebugPrivilege 2536 WindowsDef.exe Token: SeAuditPrivilege 2536 WindowsDef.exe Token: SeSystemEnvironmentPrivilege 2536 WindowsDef.exe Token: SeChangeNotifyPrivilege 2536 WindowsDef.exe Token: SeRemoteShutdownPrivilege 2536 WindowsDef.exe Token: SeUndockPrivilege 2536 WindowsDef.exe Token: SeSyncAgentPrivilege 2536 WindowsDef.exe Token: SeEnableDelegationPrivilege 2536 WindowsDef.exe Token: SeManageVolumePrivilege 2536 WindowsDef.exe Token: SeImpersonatePrivilege 2536 WindowsDef.exe Token: SeCreateGlobalPrivilege 2536 WindowsDef.exe Token: 31 2536 WindowsDef.exe Token: 32 2536 WindowsDef.exe Token: 33 2536 WindowsDef.exe Token: 34 2536 WindowsDef.exe Token: 35 2536 WindowsDef.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 02b85f76e742a8b641c9958ad308d434.exe 2716 WindowsDef.exe 2596 WindowsDef.exe 2536 WindowsDef.exe 2536 WindowsDef.exe 2536 WindowsDef.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2680 2912 02b85f76e742a8b641c9958ad308d434.exe 28 PID 2912 wrote to memory of 2680 2912 02b85f76e742a8b641c9958ad308d434.exe 28 PID 2912 wrote to memory of 2680 2912 02b85f76e742a8b641c9958ad308d434.exe 28 PID 2912 wrote to memory of 2680 2912 02b85f76e742a8b641c9958ad308d434.exe 28 PID 2680 wrote to memory of 1204 2680 cmd.exe 30 PID 2680 wrote to memory of 1204 2680 cmd.exe 30 PID 2680 wrote to memory of 1204 2680 cmd.exe 30 PID 2680 wrote to memory of 1204 2680 cmd.exe 30 PID 2912 wrote to memory of 2716 2912 02b85f76e742a8b641c9958ad308d434.exe 31 PID 2912 wrote to memory of 2716 2912 02b85f76e742a8b641c9958ad308d434.exe 31 PID 2912 wrote to memory of 2716 2912 02b85f76e742a8b641c9958ad308d434.exe 31 PID 2912 wrote to memory of 2716 2912 02b85f76e742a8b641c9958ad308d434.exe 31 PID 2716 wrote to memory of 2536 2716 WindowsDef.exe 32 PID 2716 wrote to memory of 2536 2716 WindowsDef.exe 32 PID 2716 wrote to memory of 2536 2716 WindowsDef.exe 32 PID 2716 wrote to memory of 2536 2716 WindowsDef.exe 32 PID 2716 wrote to memory of 2536 2716 WindowsDef.exe 32 PID 2716 wrote to memory of 2536 2716 WindowsDef.exe 32 PID 2716 wrote to memory of 2536 2716 WindowsDef.exe 32 PID 2716 wrote to memory of 2536 2716 WindowsDef.exe 32 PID 2716 wrote to memory of 2536 2716 WindowsDef.exe 32 PID 2716 wrote to memory of 2596 2716 WindowsDef.exe 33 PID 2716 wrote to memory of 2596 2716 WindowsDef.exe 33 PID 2716 wrote to memory of 2596 2716 WindowsDef.exe 33 PID 2716 wrote to memory of 2596 2716 WindowsDef.exe 33 PID 2716 wrote to memory of 2596 2716 WindowsDef.exe 33 PID 2716 wrote to memory of 2596 2716 WindowsDef.exe 33 PID 2716 wrote to memory of 2596 2716 WindowsDef.exe 33 PID 2716 wrote to memory of 2596 2716 WindowsDef.exe 33 PID 2716 wrote to memory of 2596 2716 WindowsDef.exe 33 PID 2536 wrote to memory of 596 2536 WindowsDef.exe 34 PID 2536 wrote to memory of 596 2536 WindowsDef.exe 34 PID 2536 wrote to memory of 596 2536 WindowsDef.exe 34 PID 2536 wrote to memory of 596 2536 WindowsDef.exe 34 PID 2536 wrote to memory of 592 2536 WindowsDef.exe 35 PID 2536 wrote to memory of 592 2536 WindowsDef.exe 35 PID 2536 wrote to memory of 592 2536 WindowsDef.exe 35 PID 2536 wrote to memory of 592 2536 WindowsDef.exe 35 PID 2536 wrote to memory of 780 2536 WindowsDef.exe 37 PID 2536 wrote to memory of 780 2536 WindowsDef.exe 37 PID 2536 wrote to memory of 780 2536 WindowsDef.exe 37 PID 2536 wrote to memory of 780 2536 WindowsDef.exe 37 PID 596 wrote to memory of 868 596 cmd.exe 40 PID 596 wrote to memory of 868 596 cmd.exe 40 PID 596 wrote to memory of 868 596 cmd.exe 40 PID 596 wrote to memory of 868 596 cmd.exe 40 PID 592 wrote to memory of 1396 592 cmd.exe 41 PID 592 wrote to memory of 1396 592 cmd.exe 41 PID 592 wrote to memory of 1396 592 cmd.exe 41 PID 592 wrote to memory of 1396 592 cmd.exe 41 PID 2536 wrote to memory of 240 2536 WindowsDef.exe 42 PID 2536 wrote to memory of 240 2536 WindowsDef.exe 42 PID 2536 wrote to memory of 240 2536 WindowsDef.exe 42 PID 2536 wrote to memory of 240 2536 WindowsDef.exe 42 PID 780 wrote to memory of 1132 780 cmd.exe 43 PID 780 wrote to memory of 1132 780 cmd.exe 43 PID 780 wrote to memory of 1132 780 cmd.exe 43 PID 780 wrote to memory of 1132 780 cmd.exe 43 PID 240 wrote to memory of 2860 240 cmd.exe 45 PID 240 wrote to memory of 2860 240 cmd.exe 45 PID 240 wrote to memory of 2860 240 cmd.exe 45 PID 240 wrote to memory of 2860 240 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\02b85f76e742a8b641c9958ad308d434.exe"C:\Users\Admin\AppData\Local\Temp\02b85f76e742a8b641c9958ad308d434.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\oRbeL.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDef" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exe" /f3⤵
- Adds Run key to start application
PID:1204
-
-
-
C:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exe"C:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exeC:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Sexy.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Sexy.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Sexy.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Sexy.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2860
-
-
-
-
C:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exeC:\Users\Admin\AppData\Roaming\Directory\WindowsDef.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD512506b1a3ef0e7dcef2babaaecfb81e8
SHA19564f2c31b336dab739e74cceedb5e4d07c2a563
SHA2563922b88903f6e7a4cd1e9cee92f9a0de6f0cd28a4a6db73114e320fa7cbf8c8a
SHA512cbf0ade56c9961edcf8018f8e1654446e17c863e8df98a78b781b4b91ca87a9ab3b1532376f245c678f6f9e00771d74dba99e0fee237ebf3f4a69473d57f0dec
-
Filesize
286KB
MD54c5c69ccae7ad9422b0693080e558fd5
SHA15504517c36c7786ad61aed4fbdec980511228a93
SHA2563733836ff3e1b42bdabc6609e254e1e556a49cf004f660878c0ae35f27bb5d52
SHA512d937c899d22b36f1a0f4398294e398f38ca4d6fd3b12cac55607cc4b484d88b8c7bb0d8961899414422eca3e1988e1dc0379da4841341c0ea5de534bdd79dc22