Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 08:54
Behavioral task
behavioral1
Sample
134cce8f1b8c29cf49d732e310abaebe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
134cce8f1b8c29cf49d732e310abaebe.exe
Resource
win10v2004-20231215-en
General
-
Target
134cce8f1b8c29cf49d732e310abaebe.exe
-
Size
169KB
-
MD5
134cce8f1b8c29cf49d732e310abaebe
-
SHA1
30a8e6a9f8634694baaf6fe255dab3f8b2970376
-
SHA256
e259017d25afeb189c2835a1e2ae17cd874fb040c7ac15f62e5651f8754bbe41
-
SHA512
99e58940834cfbec5997f428b1040a671c931e4abba0e0f5d542432587f2603447b9ace9258fd865212ceefe84bf4cf4e47417f1c84400ba98ee47eaa3d46933
-
SSDEEP
3072:wzxBux14OFN/l1XyUDVI4F97URnh5xcnWPTAdxboY1fbH/YPo:wutoN5Twx8u/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1268 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2552 i6g8xs.exe -
Loads dropped DLL 2 IoCs
pid Process 2404 134cce8f1b8c29cf49d732e310abaebe.exe 2404 134cce8f1b8c29cf49d732e310abaebe.exe -
resource yara_rule behavioral1/memory/2404-2-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x000c000000015d88-12.dat upx behavioral1/memory/2552-15-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x000c000000015d88-11.dat upx behavioral1/memory/2404-27-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\i6g8xs = "C:\\Users\\Admin\\AppData\\Roaming\\i6g8xs.exe" 134cce8f1b8c29cf49d732e310abaebe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" Rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 134cce8f1b8c29cf49d732e310abaebe.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log Rundll32.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2656 sc.exe 2660 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main 134cce8f1b8c29cf49d732e310abaebe.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 2156 Rundll32.exe Token: SeRestorePrivilege 2156 Rundll32.exe Token: SeRestorePrivilege 2156 Rundll32.exe Token: SeRestorePrivilege 2156 Rundll32.exe Token: SeRestorePrivilege 2156 Rundll32.exe Token: SeRestorePrivilege 2156 Rundll32.exe Token: SeRestorePrivilege 2156 Rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2404 134cce8f1b8c29cf49d732e310abaebe.exe 2404 134cce8f1b8c29cf49d732e310abaebe.exe 2404 134cce8f1b8c29cf49d732e310abaebe.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2636 2404 134cce8f1b8c29cf49d732e310abaebe.exe 22 PID 2404 wrote to memory of 2636 2404 134cce8f1b8c29cf49d732e310abaebe.exe 22 PID 2404 wrote to memory of 2636 2404 134cce8f1b8c29cf49d732e310abaebe.exe 22 PID 2404 wrote to memory of 2636 2404 134cce8f1b8c29cf49d732e310abaebe.exe 22 PID 2404 wrote to memory of 2660 2404 134cce8f1b8c29cf49d732e310abaebe.exe 32 PID 2404 wrote to memory of 2660 2404 134cce8f1b8c29cf49d732e310abaebe.exe 32 PID 2404 wrote to memory of 2660 2404 134cce8f1b8c29cf49d732e310abaebe.exe 32 PID 2404 wrote to memory of 2660 2404 134cce8f1b8c29cf49d732e310abaebe.exe 32 PID 2404 wrote to memory of 2364 2404 134cce8f1b8c29cf49d732e310abaebe.exe 30 PID 2404 wrote to memory of 2364 2404 134cce8f1b8c29cf49d732e310abaebe.exe 30 PID 2404 wrote to memory of 2364 2404 134cce8f1b8c29cf49d732e310abaebe.exe 30 PID 2404 wrote to memory of 2364 2404 134cce8f1b8c29cf49d732e310abaebe.exe 30 PID 2404 wrote to memory of 2656 2404 134cce8f1b8c29cf49d732e310abaebe.exe 28 PID 2404 wrote to memory of 2656 2404 134cce8f1b8c29cf49d732e310abaebe.exe 28 PID 2404 wrote to memory of 2656 2404 134cce8f1b8c29cf49d732e310abaebe.exe 28 PID 2404 wrote to memory of 2656 2404 134cce8f1b8c29cf49d732e310abaebe.exe 28 PID 2404 wrote to memory of 2552 2404 134cce8f1b8c29cf49d732e310abaebe.exe 25 PID 2404 wrote to memory of 2552 2404 134cce8f1b8c29cf49d732e310abaebe.exe 25 PID 2404 wrote to memory of 2552 2404 134cce8f1b8c29cf49d732e310abaebe.exe 25 PID 2404 wrote to memory of 2552 2404 134cce8f1b8c29cf49d732e310abaebe.exe 25 PID 2636 wrote to memory of 2532 2636 net.exe 23 PID 2636 wrote to memory of 2532 2636 net.exe 23 PID 2636 wrote to memory of 2532 2636 net.exe 23 PID 2636 wrote to memory of 2532 2636 net.exe 23 PID 2364 wrote to memory of 664 2364 net.exe 24 PID 2364 wrote to memory of 664 2364 net.exe 24 PID 2364 wrote to memory of 664 2364 net.exe 24 PID 2364 wrote to memory of 664 2364 net.exe 24 PID 2404 wrote to memory of 2156 2404 134cce8f1b8c29cf49d732e310abaebe.exe 44 PID 2404 wrote to memory of 2156 2404 134cce8f1b8c29cf49d732e310abaebe.exe 44 PID 2404 wrote to memory of 2156 2404 134cce8f1b8c29cf49d732e310abaebe.exe 44 PID 2404 wrote to memory of 2156 2404 134cce8f1b8c29cf49d732e310abaebe.exe 44 PID 2404 wrote to memory of 2156 2404 134cce8f1b8c29cf49d732e310abaebe.exe 44 PID 2404 wrote to memory of 2156 2404 134cce8f1b8c29cf49d732e310abaebe.exe 44 PID 2404 wrote to memory of 2156 2404 134cce8f1b8c29cf49d732e310abaebe.exe 44 PID 2156 wrote to memory of 1532 2156 Rundll32.exe 43 PID 2156 wrote to memory of 1532 2156 Rundll32.exe 43 PID 2156 wrote to memory of 1532 2156 Rundll32.exe 43 PID 2156 wrote to memory of 1532 2156 Rundll32.exe 43 PID 2404 wrote to memory of 1268 2404 134cce8f1b8c29cf49d732e310abaebe.exe 42 PID 2404 wrote to memory of 1268 2404 134cce8f1b8c29cf49d732e310abaebe.exe 42 PID 2404 wrote to memory of 1268 2404 134cce8f1b8c29cf49d732e310abaebe.exe 42 PID 2404 wrote to memory of 1268 2404 134cce8f1b8c29cf49d732e310abaebe.exe 42 PID 1532 wrote to memory of 1252 1532 runonce.exe 40 PID 1532 wrote to memory of 1252 1532 runonce.exe 40 PID 1532 wrote to memory of 1252 1532 runonce.exe 40 PID 1532 wrote to memory of 1252 1532 runonce.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\134cce8f1b8c29cf49d732e310abaebe.exe"C:\Users\Admin\AppData\Local\Temp\134cce8f1b8c29cf49d732e310abaebe.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵PID:2532
-
-
-
C:\Users\Admin\AppData\Roaming\i6g8xs.exeC:\Users\Admin\AppData\Roaming\i6g8xs.exe2⤵
- Executes dropped EXE
PID:2552
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
PID:2656
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- Suspicious use of WriteProcessMemory
PID:2364
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
PID:2660
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\a2ga3dk8.bat2⤵
- Deletes itself
PID:1268
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Roaming\mdinstall.inf2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"1⤵PID:664
-
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o1⤵PID:1252
-
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5f7eaadf43a2093df59d39d2a0e15dd9a
SHA13925f9e353123d8f4008a160c459cde085973edd
SHA256b84e847185cdd7901fff3de98fba72842d1ed9f24b00739ca62eac1acd0ecdbe
SHA51242697872db54e2e55421204ac26db0675fd816b9af4feba92c861994eebf9d34beb736baaf285e10df0a55d9325417d02c5f9c74bbe937b3c0ab09bdbf24688d
-
Filesize
169KB
MD5134cce8f1b8c29cf49d732e310abaebe
SHA130a8e6a9f8634694baaf6fe255dab3f8b2970376
SHA256e259017d25afeb189c2835a1e2ae17cd874fb040c7ac15f62e5651f8754bbe41
SHA51299e58940834cfbec5997f428b1040a671c931e4abba0e0f5d542432587f2603447b9ace9258fd865212ceefe84bf4cf4e47417f1c84400ba98ee47eaa3d46933
-
Filesize
410B
MD53ccb3b743b0d79505a75476800c90737
SHA1b5670f123572972883655ef91c69ecc2be987a63
SHA2565d96bec9bc06fd8d7abc11efbb3cb263844ee0416910f63581dd7848b4e1d8dd
SHA51209b1cdd4393f515f7569fbccc3f63051823ed7292b6e572bc9a34e4389b727b2914b22118e874864ccb32ef63016b2abd6d84510fd46fdee712fd84be59c114e