Analysis
-
max time kernel
209s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 14:32
Static task
static1
Behavioral task
behavioral1
Sample
25e26b2aa08fdb696c36bd0a86c96b68.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25e26b2aa08fdb696c36bd0a86c96b68.exe
Resource
win10v2004-20231215-en
General
-
Target
25e26b2aa08fdb696c36bd0a86c96b68.exe
-
Size
141KB
-
MD5
25e26b2aa08fdb696c36bd0a86c96b68
-
SHA1
24551b768e6888b1418ebcdb51448803da092427
-
SHA256
f0199dc0f12f6ccafbf32e14417bfec9c2e9bd207d678300bbc1aedd21813f4f
-
SHA512
6308a5c0f55b8da4eb4ccadb2466047df1c8690c3b14515386be36a288bb8a39ccf2c947e2501da425ce218538bd4c5dbfd14bd1ee853e3b16d4ea333576bf6a
-
SSDEEP
1536:TqBj4JLnyokEjWN0wo3xxXLrgtBWcqnV:uBj4IESN0wIrc5A
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 2932 iexplore.exe 660 iexplore.exe 1348 winamp.exe 2804 winamp.exe 2068 firewall.exe 1360 firewall.exe 2316 spooIsv.exe 1992 spooIsv.exe 2412 algs.exe 2496 algs.exe 3048 Isass.exe 1304 Isass.exe -
Loads dropped DLL 16 IoCs
pid Process 2216 25e26b2aa08fdb696c36bd0a86c96b68.exe 2216 25e26b2aa08fdb696c36bd0a86c96b68.exe 2932 iexplore.exe 660 iexplore.exe 660 iexplore.exe 1348 winamp.exe 2804 winamp.exe 2804 winamp.exe 2068 firewall.exe 1360 firewall.exe 1360 firewall.exe 2316 spooIsv.exe 1992 spooIsv.exe 1992 spooIsv.exe 2496 algs.exe 2496 algs.exe -
resource yara_rule behavioral1/memory/2216-3-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2216-23-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/660-54-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2804-81-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1360-110-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1992-138-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2496-166-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1304-173-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1304-181-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows DLL Loader = "C:\\Windows\\system32\\Isass.exe" Isass.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winamp.exe iexplore.exe File created C:\Windows\SysWOW64\osxcdy.bat spooIsv.exe File created C:\Windows\SysWOW64\pxhhw.bat winamp.exe File created C:\Windows\SysWOW64\algs.exe spooIsv.exe File opened for modification C:\Windows\SysWOW64\algs.exe spooIsv.exe File created C:\Windows\SysWOW64\kckv.bat algs.exe File created C:\Windows\SysWOW64\explorer.exe Isass.exe File created C:\Windows\SysWOW64\jtmvy.bat iexplore.exe File created C:\Windows\SysWOW64\firewall.exe winamp.exe File opened for modification C:\Windows\SysWOW64\firewall.exe winamp.exe File opened for modification C:\Windows\SysWOW64\iexplore.exe 25e26b2aa08fdb696c36bd0a86c96b68.exe File opened for modification C:\Windows\SysWOW64\spooIsv.exe firewall.exe File created C:\Windows\SysWOW64\glmbmt.bat firewall.exe File created C:\Windows\SysWOW64\Isass.exe algs.exe File opened for modification C:\Windows\SysWOW64\Isass.exe algs.exe File created C:\Windows\SysWOW64\iexplore.exe 25e26b2aa08fdb696c36bd0a86c96b68.exe File created C:\Windows\SysWOW64\winamp.exe iexplore.exe File created C:\Windows\SysWOW64\spooIsv.exe firewall.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 2592 set thread context of 2216 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 29 PID 2932 set thread context of 660 2932 iexplore.exe 34 PID 1348 set thread context of 2804 1348 winamp.exe 38 PID 2068 set thread context of 1360 2068 firewall.exe 42 PID 2316 set thread context of 1992 2316 spooIsv.exe 46 PID 2412 set thread context of 2496 2412 algs.exe 50 PID 3048 set thread context of 1304 3048 Isass.exe 53 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2044 2592 WerFault.exe 1 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 2932 iexplore.exe 1348 winamp.exe 2068 firewall.exe 2316 spooIsv.exe 2412 algs.exe 3048 Isass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2216 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 29 PID 2592 wrote to memory of 2216 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 29 PID 2592 wrote to memory of 2216 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 29 PID 2592 wrote to memory of 2216 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 29 PID 2592 wrote to memory of 2216 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 29 PID 2592 wrote to memory of 2216 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 29 PID 2216 wrote to memory of 2800 2216 25e26b2aa08fdb696c36bd0a86c96b68.exe 31 PID 2216 wrote to memory of 2800 2216 25e26b2aa08fdb696c36bd0a86c96b68.exe 31 PID 2216 wrote to memory of 2800 2216 25e26b2aa08fdb696c36bd0a86c96b68.exe 31 PID 2216 wrote to memory of 2800 2216 25e26b2aa08fdb696c36bd0a86c96b68.exe 31 PID 2592 wrote to memory of 2044 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 30 PID 2592 wrote to memory of 2044 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 30 PID 2592 wrote to memory of 2044 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 30 PID 2592 wrote to memory of 2044 2592 25e26b2aa08fdb696c36bd0a86c96b68.exe 30 PID 2216 wrote to memory of 2932 2216 25e26b2aa08fdb696c36bd0a86c96b68.exe 33 PID 2216 wrote to memory of 2932 2216 25e26b2aa08fdb696c36bd0a86c96b68.exe 33 PID 2216 wrote to memory of 2932 2216 25e26b2aa08fdb696c36bd0a86c96b68.exe 33 PID 2216 wrote to memory of 2932 2216 25e26b2aa08fdb696c36bd0a86c96b68.exe 33 PID 2932 wrote to memory of 660 2932 iexplore.exe 34 PID 2932 wrote to memory of 660 2932 iexplore.exe 34 PID 2932 wrote to memory of 660 2932 iexplore.exe 34 PID 2932 wrote to memory of 660 2932 iexplore.exe 34 PID 2932 wrote to memory of 660 2932 iexplore.exe 34 PID 2932 wrote to memory of 660 2932 iexplore.exe 34 PID 660 wrote to memory of 532 660 iexplore.exe 35 PID 660 wrote to memory of 532 660 iexplore.exe 35 PID 660 wrote to memory of 532 660 iexplore.exe 35 PID 660 wrote to memory of 532 660 iexplore.exe 35 PID 660 wrote to memory of 1348 660 iexplore.exe 37 PID 660 wrote to memory of 1348 660 iexplore.exe 37 PID 660 wrote to memory of 1348 660 iexplore.exe 37 PID 660 wrote to memory of 1348 660 iexplore.exe 37 PID 1348 wrote to memory of 2804 1348 winamp.exe 38 PID 1348 wrote to memory of 2804 1348 winamp.exe 38 PID 1348 wrote to memory of 2804 1348 winamp.exe 38 PID 1348 wrote to memory of 2804 1348 winamp.exe 38 PID 1348 wrote to memory of 2804 1348 winamp.exe 38 PID 1348 wrote to memory of 2804 1348 winamp.exe 38 PID 2804 wrote to memory of 2080 2804 winamp.exe 39 PID 2804 wrote to memory of 2080 2804 winamp.exe 39 PID 2804 wrote to memory of 2080 2804 winamp.exe 39 PID 2804 wrote to memory of 2080 2804 winamp.exe 39 PID 2804 wrote to memory of 2068 2804 winamp.exe 41 PID 2804 wrote to memory of 2068 2804 winamp.exe 41 PID 2804 wrote to memory of 2068 2804 winamp.exe 41 PID 2804 wrote to memory of 2068 2804 winamp.exe 41 PID 2068 wrote to memory of 1360 2068 firewall.exe 42 PID 2068 wrote to memory of 1360 2068 firewall.exe 42 PID 2068 wrote to memory of 1360 2068 firewall.exe 42 PID 2068 wrote to memory of 1360 2068 firewall.exe 42 PID 2068 wrote to memory of 1360 2068 firewall.exe 42 PID 2068 wrote to memory of 1360 2068 firewall.exe 42 PID 1360 wrote to memory of 1048 1360 firewall.exe 43 PID 1360 wrote to memory of 1048 1360 firewall.exe 43 PID 1360 wrote to memory of 1048 1360 firewall.exe 43 PID 1360 wrote to memory of 1048 1360 firewall.exe 43 PID 1360 wrote to memory of 2316 1360 firewall.exe 45 PID 1360 wrote to memory of 2316 1360 firewall.exe 45 PID 1360 wrote to memory of 2316 1360 firewall.exe 45 PID 1360 wrote to memory of 2316 1360 firewall.exe 45 PID 2316 wrote to memory of 1992 2316 spooIsv.exe 46 PID 2316 wrote to memory of 1992 2316 spooIsv.exe 46 PID 2316 wrote to memory of 1992 2316 spooIsv.exe 46 PID 2316 wrote to memory of 1992 2316 spooIsv.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\25e26b2aa08fdb696c36bd0a86c96b68.exe"C:\Users\Admin\AppData\Local\Temp\25e26b2aa08fdb696c36bd0a86c96b68.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\25e26b2aa08fdb696c36bd0a86c96b68.exe22222⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\bwjuafyt.bat" "3⤵PID:2800
-
-
C:\Windows\SysWOW64\iexplore.exeC:\Windows\system32\iexplore.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\iexplore.exe22224⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\jtmvy.bat" "5⤵PID:532
-
-
C:\Windows\SysWOW64\winamp.exeC:\Windows\system32\winamp.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\winamp.exe22226⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\pxhhw.bat" "7⤵PID:2080
-
-
C:\Windows\SysWOW64\firewall.exeC:\Windows\system32\firewall.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\firewall.exe22228⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\glmbmt.bat" "9⤵PID:1048
-
-
C:\Windows\SysWOW64\spooIsv.exeC:\Windows\system32\spooIsv.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\spooIsv.exe222210⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\osxcdy.bat" "11⤵PID:3028
-
-
C:\Windows\SysWOW64\algs.exeC:\Windows\system32\algs.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2412 -
C:\Windows\SysWOW64\algs.exe222212⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\kckv.bat" "13⤵PID:872
-
-
C:\Windows\SysWOW64\Isass.exeC:\Windows\system32\Isass.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 4642⤵
- Program crash
PID:2044
-
-
C:\Windows\SysWOW64\Isass.exe22221⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD572b839c0fb4d6742bfca94c78f6e78d5
SHA11301d0762da49f705a228e650c0d00b9c4012ed6
SHA25616d97f89117d539d475ef6a87bfe2d45c95a7c07354e1a83650fcbe40af7a493
SHA512a129ebd75df528c02d6683ead3d9a7585993a374ebd620af3529d4155a8b394e71f4ae210c33384722f579a4666038758b740afa54591c4afc593f921ab082eb
-
Filesize
128B
MD59dbb155901a433b23692770b23efb0ce
SHA13e049ceee9b33b13561f198051a83dd0746a8874
SHA256ac22513a7f5e156d1b51ff65f469943c88dfffcfd0dd7ce137ebfa0c633493ca
SHA512e263cd8941082116dfe3e73d51319be80a7a9419cabfcb0a19a62fac7829fa380ffc37a1ebbb2ebe94c794a4acc5ed7f029fb46c90af87a5079741a4d9ccae69
-
Filesize
141KB
MD525e26b2aa08fdb696c36bd0a86c96b68
SHA124551b768e6888b1418ebcdb51448803da092427
SHA256f0199dc0f12f6ccafbf32e14417bfec9c2e9bd207d678300bbc1aedd21813f4f
SHA5126308a5c0f55b8da4eb4ccadb2466047df1c8690c3b14515386be36a288bb8a39ccf2c947e2501da425ce218538bd4c5dbfd14bd1ee853e3b16d4ea333576bf6a
-
Filesize
127B
MD507086dfcf7e1a0307a916a9657c52c62
SHA117b4b800c503b17d2e6f5b08992562411b4ff5e7
SHA256c7b5f2074c1e56b4d260572a27d2dc0fdd12ce94640a646a8acc56b046db0a3a
SHA512363cbe1b3693b4d5c45b89806dd846823b3fe3d734e5e18e127fd3003e3d1c984fba587681f0ab0ef6d202252d97ca78b27502f70d902f1e610064a15b5d5d5f
-
Filesize
114B
MD590454711932a38c1d0b30bc1b9467cfb
SHA1366aab8a9b42e615a4deee00f88af00ebef59016
SHA256d1bb64d3104493a8db9870804e7c6ce9c017de065b7dcd7e100658ee0414ee0c
SHA512ad61c79ebf4efd1b1d37693fc1420304b141be0226b910c2d45bd221c7fe21a387b05ebe02b6cc4ea526e30570b97dc9ae1dc61b1f54d9faf6b44baed96763cb
-
Filesize
125B
MD5e31b32f8d6f1149453eac8e0a20ed244
SHA16079a618f76f47317c4a66d2494289c8e09b1f7f
SHA2568f885c750e1dd8c8b602d099c916adab3e56484d9bd8bb2d501ada56803e72a4
SHA512ff34dad495e9a476517d474f03eab6f4e4f5ada8c62da6796d73596c04c95a5fa4a0316b00dfb968ba3aa751b584432764d92be8e6a4c0a78bcf5c79a0eacb06
-
Filesize
121B
MD5aa6435e521d7bdf2c75f214980adf3de
SHA1dee1ce34372d800813ed1a5ffdca3fe524d95431
SHA256a32d295450ee102cddbe05f3e702b48c116d61a4476fb6cc54e0e7e9a4a7b9a8
SHA51251a5c4182fb152082aa61e968fdbebe8074c15a69865e3c3712c2f14fbbce9cf6542144059a6c04d2f5920af272a2da0f880652a59a87fd3f2a09a55190d5fa4