Analysis
-
max time kernel
167s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:54
Behavioral task
behavioral1
Sample
134cce8f1b8c29cf49d732e310abaebe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
134cce8f1b8c29cf49d732e310abaebe.exe
Resource
win10v2004-20231215-en
General
-
Target
134cce8f1b8c29cf49d732e310abaebe.exe
-
Size
169KB
-
MD5
134cce8f1b8c29cf49d732e310abaebe
-
SHA1
30a8e6a9f8634694baaf6fe255dab3f8b2970376
-
SHA256
e259017d25afeb189c2835a1e2ae17cd874fb040c7ac15f62e5651f8754bbe41
-
SHA512
99e58940834cfbec5997f428b1040a671c931e4abba0e0f5d542432587f2603447b9ace9258fd865212ceefe84bf4cf4e47417f1c84400ba98ee47eaa3d46933
-
SSDEEP
3072:wzxBux14OFN/l1XyUDVI4F97URnh5xcnWPTAdxboY1fbH/YPo:wutoN5Twx8u/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 388 i6g8xs.exe 3308 i6g8xs.exe -
resource yara_rule behavioral2/memory/2468-0-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/files/0x00060000000231fe-6.dat upx behavioral2/memory/2468-16-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/388-21-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/3308-22-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/3308-23-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\i6g8xs = "C:\\Users\\Admin\\AppData\\Roaming\\i6g8xs.exe" 134cce8f1b8c29cf49d732e310abaebe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" Rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 134cce8f1b8c29cf49d732e310abaebe.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2452 sc.exe 3184 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2468 134cce8f1b8c29cf49d732e310abaebe.exe 2468 134cce8f1b8c29cf49d732e310abaebe.exe 2468 134cce8f1b8c29cf49d732e310abaebe.exe 388 i6g8xs.exe 388 i6g8xs.exe 388 i6g8xs.exe 3308 i6g8xs.exe 3308 i6g8xs.exe 3308 i6g8xs.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4284 2468 134cce8f1b8c29cf49d732e310abaebe.exe 92 PID 2468 wrote to memory of 4284 2468 134cce8f1b8c29cf49d732e310abaebe.exe 92 PID 2468 wrote to memory of 4284 2468 134cce8f1b8c29cf49d732e310abaebe.exe 92 PID 2468 wrote to memory of 2452 2468 134cce8f1b8c29cf49d732e310abaebe.exe 93 PID 2468 wrote to memory of 2452 2468 134cce8f1b8c29cf49d732e310abaebe.exe 93 PID 2468 wrote to memory of 2452 2468 134cce8f1b8c29cf49d732e310abaebe.exe 93 PID 2468 wrote to memory of 1884 2468 134cce8f1b8c29cf49d732e310abaebe.exe 94 PID 2468 wrote to memory of 1884 2468 134cce8f1b8c29cf49d732e310abaebe.exe 94 PID 2468 wrote to memory of 1884 2468 134cce8f1b8c29cf49d732e310abaebe.exe 94 PID 2468 wrote to memory of 3184 2468 134cce8f1b8c29cf49d732e310abaebe.exe 95 PID 2468 wrote to memory of 3184 2468 134cce8f1b8c29cf49d732e310abaebe.exe 95 PID 2468 wrote to memory of 3184 2468 134cce8f1b8c29cf49d732e310abaebe.exe 95 PID 2468 wrote to memory of 388 2468 134cce8f1b8c29cf49d732e310abaebe.exe 98 PID 2468 wrote to memory of 388 2468 134cce8f1b8c29cf49d732e310abaebe.exe 98 PID 2468 wrote to memory of 388 2468 134cce8f1b8c29cf49d732e310abaebe.exe 98 PID 2468 wrote to memory of 2000 2468 134cce8f1b8c29cf49d732e310abaebe.exe 102 PID 2468 wrote to memory of 2000 2468 134cce8f1b8c29cf49d732e310abaebe.exe 102 PID 2468 wrote to memory of 2000 2468 134cce8f1b8c29cf49d732e310abaebe.exe 102 PID 4284 wrote to memory of 4192 4284 net.exe 101 PID 4284 wrote to memory of 4192 4284 net.exe 101 PID 4284 wrote to memory of 4192 4284 net.exe 101 PID 1884 wrote to memory of 3744 1884 net.exe 103 PID 1884 wrote to memory of 3744 1884 net.exe 103 PID 1884 wrote to memory of 3744 1884 net.exe 103 PID 2000 wrote to memory of 3164 2000 Rundll32.exe 104 PID 2000 wrote to memory of 3164 2000 Rundll32.exe 104 PID 2000 wrote to memory of 3164 2000 Rundll32.exe 104 PID 2468 wrote to memory of 2368 2468 134cce8f1b8c29cf49d732e310abaebe.exe 105 PID 2468 wrote to memory of 2368 2468 134cce8f1b8c29cf49d732e310abaebe.exe 105 PID 2468 wrote to memory of 2368 2468 134cce8f1b8c29cf49d732e310abaebe.exe 105 PID 388 wrote to memory of 3308 388 i6g8xs.exe 107 PID 388 wrote to memory of 3308 388 i6g8xs.exe 107 PID 388 wrote to memory of 3308 388 i6g8xs.exe 107 PID 3164 wrote to memory of 4060 3164 runonce.exe 108 PID 3164 wrote to memory of 4060 3164 runonce.exe 108 PID 3164 wrote to memory of 4060 3164 runonce.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\134cce8f1b8c29cf49d732e310abaebe.exe"C:\Users\Admin\AppData\Local\Temp\134cce8f1b8c29cf49d732e310abaebe.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵PID:4192
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
PID:2452
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵PID:3744
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
PID:3184
-
-
C:\Users\Admin\AppData\Roaming\i6g8xs.exeC:\Users\Admin\AppData\Roaming\i6g8xs.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Roaming\i6g8xs.exeC:\Users\Admin\AppData\Roaming\i6g8xs.exe -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⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3308
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Roaming\mdinstall.inf2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r3⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o4⤵PID:4060
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\qiwpjt0oo.bat2⤵PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5134cce8f1b8c29cf49d732e310abaebe
SHA130a8e6a9f8634694baaf6fe255dab3f8b2970376
SHA256e259017d25afeb189c2835a1e2ae17cd874fb040c7ac15f62e5651f8754bbe41
SHA51299e58940834cfbec5997f428b1040a671c931e4abba0e0f5d542432587f2603447b9ace9258fd865212ceefe84bf4cf4e47417f1c84400ba98ee47eaa3d46933
-
Filesize
410B
MD53ccb3b743b0d79505a75476800c90737
SHA1b5670f123572972883655ef91c69ecc2be987a63
SHA2565d96bec9bc06fd8d7abc11efbb3cb263844ee0416910f63581dd7848b4e1d8dd
SHA51209b1cdd4393f515f7569fbccc3f63051823ed7292b6e572bc9a34e4389b727b2914b22118e874864ccb32ef63016b2abd6d84510fd46fdee712fd84be59c114e
-
Filesize
190B
MD5f7eaadf43a2093df59d39d2a0e15dd9a
SHA13925f9e353123d8f4008a160c459cde085973edd
SHA256b84e847185cdd7901fff3de98fba72842d1ed9f24b00739ca62eac1acd0ecdbe
SHA51242697872db54e2e55421204ac26db0675fd816b9af4feba92c861994eebf9d34beb736baaf285e10df0a55d9325417d02c5f9c74bbe937b3c0ab09bdbf24688d