Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
1bdff1e6881a83e4370f3618017833c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1bdff1e6881a83e4370f3618017833c8.exe
Resource
win10v2004-20231215-en
General
-
Target
1bdff1e6881a83e4370f3618017833c8.exe
-
Size
3.4MB
-
MD5
1bdff1e6881a83e4370f3618017833c8
-
SHA1
3b05ef7a415513ee514138d61ccc350cb77fab3a
-
SHA256
23adb4f0b4fb5edc75ccb3bbd13df83f3e982443f1834517857e601a5fedff1e
-
SHA512
392df7e76bea6fb2b2650fe225c0d8b7741b97d509eb1a61a8e3ac283addeb1bccfae041b419effc85888f8fb01f1627c607526ef1999177642ba53fa6984c95
-
SSDEEP
49152:Ng6+iUofhEpg0IZymfPDw5927wIGwZ7zUmwWr3WWGRexzTAIhy3JaGe:Nz+Jpg0UymfbjVZfm6mWGRelThUJs
Malware Config
Signatures
-
Executes dropped EXE 11 IoCs
pid Process 4104 install_185274641.exe 3220 install_185274641.exe 2268 tor.exe 3200 wins.exe 4536 tor.exe 2280 wins.exe 4656 tor.exe 3440 wins.exe 2220 wins.exe 4592 wins.exe 3032 wins.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\7d0b14cec8baf661c8a240560c5b7c32.ph wins.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\cache.00 wins.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\queries-02.cache wins.exe File opened for modification C:\Windows\SysWOW64\config\SYSTEM~1\AppData\Local\WINDOW~1\QUERIE~1.CAC wins.exe File opened for modification C:\Windows\SysWOW64\config\SYSTEM~1\AppData\Local\WINDOW~1\cache.00 wins.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\7d0b14cec8baf661c8a240560c5b7c32.ph wins.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\181084e525a65ef540c63d60ce07f836.ct wins.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\181084e525a65ef540c63d60ce07f836.ph wins.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\181084e525a65ef540c63d60ce07f836.ct wins.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\181084e525a65ef540c63d60ce07f836.ph wins.exe File opened for modification C:\Windows\SysWOW64\config\SYSTEM~1\AppData\Local\WINDOW~1\cache.00 wins.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\181084e525a65ef540c63d60ce07f836.ct wins.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe install_185274641.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe install_185274641.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\181084e525a65ef540c63d60ce07f836.ph wins.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4104 set thread context of 3220 4104 install_185274641.exe 94 PID 3200 set thread context of 2280 3200 wins.exe 99 PID 3440 set thread context of 2220 3440 wins.exe 111 PID 4592 set thread context of 3032 4592 wins.exe 121 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Tor\tor.exe install_185274641.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\tor\lock tor.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\tor\state.tmp tor.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\tor\lock tor.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\tor\state.tmp tor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3220 install_185274641.exe 3220 install_185274641.exe 3220 install_185274641.exe 3220 install_185274641.exe 4536 tor.exe 4536 tor.exe 4536 tor.exe 4536 tor.exe 2280 wins.exe 2280 wins.exe 2280 wins.exe 2280 wins.exe 4656 tor.exe 4656 tor.exe 4656 tor.exe 4656 tor.exe 3032 wins.exe 3032 wins.exe 3032 wins.exe 3032 wins.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1516 wrote to memory of 4104 1516 1bdff1e6881a83e4370f3618017833c8.exe 93 PID 1516 wrote to memory of 4104 1516 1bdff1e6881a83e4370f3618017833c8.exe 93 PID 1516 wrote to memory of 4104 1516 1bdff1e6881a83e4370f3618017833c8.exe 93 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 4104 wrote to memory of 3220 4104 install_185274641.exe 94 PID 3220 wrote to memory of 2268 3220 install_185274641.exe 95 PID 3220 wrote to memory of 2268 3220 install_185274641.exe 95 PID 3220 wrote to memory of 2268 3220 install_185274641.exe 95 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 3200 wrote to memory of 2280 3200 wins.exe 99 PID 2280 wrote to memory of 3440 2280 wins.exe 110 PID 2280 wrote to memory of 3440 2280 wins.exe 110 PID 2280 wrote to memory of 3440 2280 wins.exe 110 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 3440 wrote to memory of 2220 3440 wins.exe 111 PID 4592 wrote to memory of 3032 4592 wins.exe 121 PID 4592 wrote to memory of 3032 4592 wins.exe 121 PID 4592 wrote to memory of 3032 4592 wins.exe 121 PID 4592 wrote to memory of 3032 4592 wins.exe 121 PID 4592 wrote to memory of 3032 4592 wins.exe 121 PID 4592 wrote to memory of 3032 4592 wins.exe 121 PID 4592 wrote to memory of 3032 4592 wins.exe 121 PID 4592 wrote to memory of 3032 4592 wins.exe 121 PID 4592 wrote to memory of 3032 4592 wins.exe 121 PID 4592 wrote to memory of 3032 4592 wins.exe 121 PID 4592 wrote to memory of 3032 4592 wins.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bdff1e6881a83e4370f3618017833c8.exe"C:\Users\Admin\AppData\Local\Temp\1bdff1e6881a83e4370f3618017833c8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\install_185274641.exeC:\Users\Admin\AppData\Local\Temp\install_185274641.exe /I2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\install_185274641.exeC:\Users\Admin\AppData\Local\Temp\install_185274641.exe /I3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Tor\tor.exe"C:\Program Files (x86)\Tor\tor.exe" --install --options -ControlPort 90514⤵
- Executes dropped EXE
PID:2268
-
-
-
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe" /R3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe" /R4⤵
- Executes dropped EXE
PID:2220
-
-
-
-
C:\Program Files (x86)\Tor\tor.exe"C:\Program Files (x86)\Tor\tor.exe" --nt-service "-ControlPort" "9051"1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4536 -ip 45361⤵PID:4672
-
C:\Program Files (x86)\Tor\tor.exe"C:\Program Files (x86)\Tor\tor.exe" --nt-service "-ControlPort" "9051"1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD50304544b20ef7a965b7675f5fa34fe5c
SHA1924204ff28259153ef9072ef275bc637d4a09ab4
SHA2567377c0944095fa1223b0e09f5a7e09ad42a20ceeda8d0c0610b88e5dcc6eb631
SHA51273b9c9ac8ddc50deae8bc29a4f815752a10c4f04f619ce7aba961dda4eab99872cd53f9aa2c53960bfd0b50bdcc848aa012cebae0a91aa793c0f44e3246944f3
-
Filesize
273KB
MD57759bcdadcd71f3275d44d0ca59e8e9d
SHA1427272c546fe73252e021b596e805c9505f5fa2a
SHA2561c078c6b36ae48198d015252e8c58f1bd2fa26bff5595c48286f46ef09af8085
SHA512e936086d18707ba5ab098fa44b54407f9fcf68e377b1ddc8ca4865a11a95b8d373e64c3528bc0a2638598509b060d698ef17ecf1130594a84aa1d122ddd18b8f
-
Filesize
248KB
MD50426569a74241f24313febf8683fa88c
SHA122743807ad5b4d736b55ab5b4c2fd1955b554be7
SHA256320c84c5153c50b7d674fd97b12e23cfe08d1161e4f13f90e17a8c9ddef3d3e6
SHA512a9d9634d9d69784eac4668530b435509874a0eb468e561172487ef8e61649e82f43fa8ddc6aac68fcadc6c7f953cd13b59aa5cab840c2c3dca5be96a1b80c764
-
Filesize
299KB
MD599b7873f07548fd36cec11674bafabcd
SHA19c7e7e36bcb7f2c9b730c649ecbfe6e7c8b95472
SHA25618909f038ced91790104ea01fc95e6c6d0b670df63754fa62c418c2eca15fda2
SHA51208024cd9013234fcf6403191767c7153d072c925f5333c9072c9873a2a28daeb2767b223d81ec96317fc739df8a06eea1c849f6706ecc43de325c177fb033a83
-
Filesize
1.3MB
MD5792140c8e606d543435353f579bea15c
SHA1c26a1315984df8b70e49db692a0d648338d11e2d
SHA256f660c7229f6c816d99bfdfa161f0c0d0a68bc12882f98bd06dcca59304688a4a
SHA512a2f50d4ab59157e39805fe948a0e1bd68dda8559503fffddb815a78537305479082fba19d2eaa39b67c9a58ca6169e5e710557325045ba478e3d824a0484e558
-
Filesize
1.2MB
MD5fd1c51ad0ca2ef6c12394c2d3edf5b27
SHA16a3da5a4fecac16881d4c57ac9088b7a59b4bf33
SHA256845cdd4ac2ae629da1a671565039a0ac7333d25b6f93de999af1bdee40839f7b
SHA51234555b2ebc3298a0525af6b96f01b8d132e91b515def5976debbcafa05280d4a8d9689e554222ac808dfe914327f96d9c893a7002874a6949cfd572e96e54e70
-
Filesize
287KB
MD5d1ec7c9966ddd3c1e42dc74855d92023
SHA1ac30bab93f171f20feb13549680e8f810c393597
SHA256b339008a8ab99a8eb17fa13f4b99d19094514d671a5a2604301e748d0864e22b
SHA512697e272bcf8d1a7671a7b8093343e603eebc1cfbac9faaca7ae616534253f9490dfc69d66985d2d012c7d20dd4ebb31558419b55105508a801c9abd44a35e68e
-
Filesize
222B
MD5596cdbf00054e34ec9008c8b71c5b1ac
SHA11333af043f8cc27eacd77e37d7e739de4f39e9b3
SHA256cd3bf7eb811b141268543ef323730dac31349ee1dcef2df87b8e4ecfc02d8f0f
SHA512e9d5df72de5d8b0ec0125032d244559a0b5ab8168b96d25ced2c3fc0ab1c83d825c3b350df803b806a858124910ace985291d5a0879758ae63c0c0a413265fc8
-
Filesize
150B
MD56112a7eb79d9a007ed62703275c28f2c
SHA1e46880f64c8c13ecb15b3c79603f11f97a5c6b25
SHA256a2bda4cbb04af36a049df24c8d2265193019e5a2ce8d575fddb1103f2519da16
SHA5124e5896b219c9a984e6cdbf82b194b2b1937b09ba5f7482759f8e42b4ed2a02e90f334f798ed0c1af4a646d24a346fc5d62e3a47d2e93d09c1c080a369a6317e1
-
Filesize
65B
MD53af948f58f27dea4bf114da1149476c7
SHA14d024cb560590a2db5f5b0e520fb60ae2711383f
SHA25627900e1f2ea88b5e57b2a4b96dd03384253ceaa7b462cf8e76f63fa292e313eb
SHA512210cdbf5fc6de816d40273fdcd58ca00a74c5dc059f8eebc518104d0d4c075caab474356ea8deb03d71051452c86340952b25938ab784e773dd824d9c3481c8c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\181084e525a65ef540c63d60ce07f836.ct
Filesize337B
MD50ac90ad2c8e1a80b91e6ad63ba231a06
SHA1be5c01446d41fa669ae2bfa30b15b48f90bf1261
SHA256c6b5f76af49c0d25077c52c963a7d6e99cb6f1eb2f9c812410cc732d798961b8
SHA5129ed8dc524dcfdbbd457765408896e883c3f685f84236be69fdb29a2d2a7183ec61986ced6258377ccfcc3dca0026d2cc134852ee820e0f6bf27de1bc799e2858
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\181084e525a65ef540c63d60ce07f836.ph
Filesize81B
MD53b626bd73e386d9ec3bc1625ffb3af53
SHA125674c6845e67309a9c89279c2cd8aef332ef95c
SHA256112ebd2a80dd7df9344dcb8fe6993d1b85e8c64ce7cc832ae45a378f242a29c5
SHA5121c9c3c1c9f7eb48684bced8cf91fec7086af8628810a26e292178d14893da283ece62bd624c6f6f8053b177dbea128b8e51710aa26b38d5bd2a88ff927b223e1
-
Filesize
242KB
MD52163e46d09f5ae4096b487b2a94d4ace
SHA1e90f18bfa10efcbadef56c85028c1ab7c1d5f17c
SHA2568c068d1acc12c839d17e5b58bbfbc081ff3016a622f970f0b6eade23c936ba3a
SHA512b5a186714c0e367dbb35243015cb627e08f17615ec5cfc7d3708cb736614dfc5230663d0d59389140fced1404a2bfe6f6c6b8717b5397c53515e5907b7d46b72
-
Filesize
317KB
MD5bfcbf3da487a27ee3580394bf7da8af3
SHA102aaa194551d10e3735fd8843303eda982ff5503
SHA2566e22eb635e8ac9ee4beb7d88571fe2e16062c75368c803a778516838cebc94a9
SHA5124b12648cd36b6f580d10b8c251d556c089480ac2a4dc25320ef85b64e66b8cb1f69b71c3d2a1df8288b1c60676a3decdec3e4a1c6b980b1335da9a6cab6aa33c
-
Filesize
158KB
MD5ff17e137f3fe1cf4f7929d6a72fe7997
SHA1fea4ce7879a0c9664264acd642295e17648fc39a
SHA2560083fea5daad7804b61a5f06ee8636ba4f75f94bf4386b00964ddcc1ad6dfbd2
SHA512ae1aca9603df8e6a61297bc9c7fbffebee298a3d72e5ffadce36f78f55cb7f637a875f0dc45faeaa3318f9bdd72a271ee657bd883263f843a494745d93a34ad8
-
Filesize
2.4MB
MD56dafc802afd08579ac47725e37e4bec1
SHA1435e8dfe740316ef39f1bcdfafca90a2d3af9f19
SHA256678e5143a02b3310a7b9985dfb933260e7687852e9a46b2d05fd57a65688d3ad
SHA512b483c60b4fa9d2939ecddd4bd63f33a8bc37572e4c2fb31bef1fe8ec5dd1641925a9a0ee8eede69982e4d134e856c893bf0340de560d5e55369e082dc823a275
-
Filesize
1.1MB
MD50bd3a4dd80d8c8ccb5dc80f4474741f0
SHA1f1b6182331c9113c30377d97f6491d78ce7f2653
SHA25602a83df4cc2287b262db56c954929a4476d61f8e3300e287b1432ec9a82c12f9
SHA512c365cd14ee39e8e61bcf1d71d858e11d96fccad6673c8112ed39a1c3ee4a21f7b56d5350e8b545291310a11e4924c0a568cfc325f5b2b43316de323306432bfd
-
Filesize
1.7MB
MD53a1fc7db010a418f8d053782cc3a0f21
SHA1c39d842b77114368497e4a883947fad392c0a351
SHA256530fd3bbfa1614f9c807eb5daa6ed99f9595874a8871d6d31a0634566d8f2b4a
SHA51241613b7120fedcd7862eb2b4a945d56e26afe611d599f9723676617b4cb815f2e6da950ab93c354426f2bc2435c95b958a7e11fad9dda47a71b255152f7b063d
-
Filesize
160KB
MD5ba0dd9b14f89dca7f59f26d9f2963c60
SHA1ae3ca386161c3e89c428fb6623647b52a370fbca
SHA2561b17b210f548bc01f34578cbdf333e047d401078fa943c1b794eea9fb4c0afec
SHA512e5d089aed9a7dbc8a06e95bd90425a6ea206b22c76e8fb5ce930e3fe3fd75a6c50428dad528a48fdc961e394cec8cddd9821092af7a4c3c564114f2cc022d287