Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
1051de86740c5c04838d59257376eec9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1051de86740c5c04838d59257376eec9.exe
Resource
win10v2004-20231215-en
General
-
Target
1051de86740c5c04838d59257376eec9.exe
-
Size
2.0MB
-
MD5
1051de86740c5c04838d59257376eec9
-
SHA1
1b7328561d3bd44d18266a2dd14cbf63b3cc5d67
-
SHA256
99753090c0c3e5c80cafb63500cb9bff3d2e1ee0277cb35ceef317955fd4d0db
-
SHA512
117201f8a2b482e2def53458d63a135e10be25ae966ab7d86cb7c4952aeda409af66cbe91320ddea970bda1af8d8c55424d33696af1af867f1e09a92cfc0586f
-
SSDEEP
49152:MTplXdIaejlPmBlO8iKfZH/msJBueVsxX8QOqxTsfsbz:YNIaeYS/em4NVcMQOqxTIsz
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 4jf939Ig.exe -
Executes dropped EXE 2 IoCs
pid Process 1276 te8Cp01.exe 2328 4jf939Ig.exe -
Loads dropped DLL 13 IoCs
pid Process 760 1051de86740c5c04838d59257376eec9.exe 1276 te8Cp01.exe 1276 te8Cp01.exe 2328 4jf939Ig.exe 2328 4jf939Ig.exe 2328 4jf939Ig.exe 288 WerFault.exe 288 WerFault.exe 288 WerFault.exe 288 WerFault.exe 288 WerFault.exe 288 WerFault.exe 288 WerFault.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" te8Cp01.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 4jf939Ig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1051de86740c5c04838d59257376eec9.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2328 4jf939Ig.exe 2328 4jf939Ig.exe 2328 4jf939Ig.exe 2328 4jf939Ig.exe 2328 4jf939Ig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 288 2328 WerFault.exe 29 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 592 schtasks.exe 2872 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2328 4jf939Ig.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2328 4jf939Ig.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 760 wrote to memory of 1276 760 1051de86740c5c04838d59257376eec9.exe 28 PID 760 wrote to memory of 1276 760 1051de86740c5c04838d59257376eec9.exe 28 PID 760 wrote to memory of 1276 760 1051de86740c5c04838d59257376eec9.exe 28 PID 760 wrote to memory of 1276 760 1051de86740c5c04838d59257376eec9.exe 28 PID 760 wrote to memory of 1276 760 1051de86740c5c04838d59257376eec9.exe 28 PID 760 wrote to memory of 1276 760 1051de86740c5c04838d59257376eec9.exe 28 PID 760 wrote to memory of 1276 760 1051de86740c5c04838d59257376eec9.exe 28 PID 1276 wrote to memory of 2328 1276 te8Cp01.exe 29 PID 1276 wrote to memory of 2328 1276 te8Cp01.exe 29 PID 1276 wrote to memory of 2328 1276 te8Cp01.exe 29 PID 1276 wrote to memory of 2328 1276 te8Cp01.exe 29 PID 1276 wrote to memory of 2328 1276 te8Cp01.exe 29 PID 1276 wrote to memory of 2328 1276 te8Cp01.exe 29 PID 1276 wrote to memory of 2328 1276 te8Cp01.exe 29 PID 2328 wrote to memory of 540 2328 4jf939Ig.exe 32 PID 2328 wrote to memory of 540 2328 4jf939Ig.exe 32 PID 2328 wrote to memory of 540 2328 4jf939Ig.exe 32 PID 2328 wrote to memory of 540 2328 4jf939Ig.exe 32 PID 2328 wrote to memory of 540 2328 4jf939Ig.exe 32 PID 2328 wrote to memory of 540 2328 4jf939Ig.exe 32 PID 2328 wrote to memory of 540 2328 4jf939Ig.exe 32 PID 540 wrote to memory of 592 540 cmd.exe 34 PID 540 wrote to memory of 592 540 cmd.exe 34 PID 540 wrote to memory of 592 540 cmd.exe 34 PID 540 wrote to memory of 592 540 cmd.exe 34 PID 540 wrote to memory of 592 540 cmd.exe 34 PID 540 wrote to memory of 592 540 cmd.exe 34 PID 540 wrote to memory of 592 540 cmd.exe 34 PID 2328 wrote to memory of 2912 2328 4jf939Ig.exe 36 PID 2328 wrote to memory of 2912 2328 4jf939Ig.exe 36 PID 2328 wrote to memory of 2912 2328 4jf939Ig.exe 36 PID 2328 wrote to memory of 2912 2328 4jf939Ig.exe 36 PID 2328 wrote to memory of 2912 2328 4jf939Ig.exe 36 PID 2328 wrote to memory of 2912 2328 4jf939Ig.exe 36 PID 2328 wrote to memory of 2912 2328 4jf939Ig.exe 36 PID 2912 wrote to memory of 2872 2912 cmd.exe 37 PID 2912 wrote to memory of 2872 2912 cmd.exe 37 PID 2912 wrote to memory of 2872 2912 cmd.exe 37 PID 2912 wrote to memory of 2872 2912 cmd.exe 37 PID 2912 wrote to memory of 2872 2912 cmd.exe 37 PID 2912 wrote to memory of 2872 2912 cmd.exe 37 PID 2912 wrote to memory of 2872 2912 cmd.exe 37 PID 2328 wrote to memory of 288 2328 4jf939Ig.exe 38 PID 2328 wrote to memory of 288 2328 4jf939Ig.exe 38 PID 2328 wrote to memory of 288 2328 4jf939Ig.exe 38 PID 2328 wrote to memory of 288 2328 4jf939Ig.exe 38 PID 2328 wrote to memory of 288 2328 4jf939Ig.exe 38 PID 2328 wrote to memory of 288 2328 4jf939Ig.exe 38 PID 2328 wrote to memory of 288 2328 4jf939Ig.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1051de86740c5c04838d59257376eec9.exe"C:\Users\Admin\AppData\Local\Temp\1051de86740c5c04838d59257376eec9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\te8Cp01.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\te8Cp01.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4jf939Ig.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\4jf939Ig.exe3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST4⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST4⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:2872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 13244⤵
- Loads dropped DLL
- Program crash
PID:288
-
-
-