Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:29
Behavioral task
behavioral1
Sample
75a85760d8c1b787758a8a188e29bf46.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
75a85760d8c1b787758a8a188e29bf46.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
75a85760d8c1b787758a8a188e29bf46.exe
-
Size
6.0MB
-
MD5
75a85760d8c1b787758a8a188e29bf46
-
SHA1
1fda3e948538ec37bf7ef382113463bdd41db745
-
SHA256
07b02d72e9427f014caea5dd2bf42f65ccb730d648ea62fd2d91cecebae285cb
-
SHA512
148af67a8497fbcd84312e96ea6e2ddf3b5afbab2b94527e061de54d37557641d3a6460507b0be35e09793ebf2d2d330d578ccee1e22a5000e982a494f74f957
-
SSDEEP
98304:giAZ9eCErwRTpbTly1QsXdDMKlJNzTPvAfiyy8dj+xIW8+bbvjjuB/6Un3g7RNNH:T+9gEZ7y1VNAK1K8M7WHbjnuUU3ENA
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 31 IoCs
pid Process 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe 2724 75a85760d8c1b787758a8a188e29bf46.exe -
resource yara_rule behavioral1/memory/2416-0-0x000000013F710000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/2724-63-0x000007FEF6080000-0x000007FEF646A000-memory.dmp upx behavioral1/memory/2724-75-0x000007FEF5DF0000-0x000007FEF6079000-memory.dmp upx behavioral1/memory/2724-82-0x000007FEF6D30000-0x000007FEF6D3D000-memory.dmp upx behavioral1/memory/2724-105-0x000007FEF6710000-0x000007FEF671C000-memory.dmp upx behavioral1/memory/2724-153-0x000007FEF5C90000-0x000007FEF5CA1000-memory.dmp upx behavioral1/memory/2724-151-0x000007FEF5CB0000-0x000007FEF5CBC000-memory.dmp upx behavioral1/memory/2724-150-0x000007FEF5CC0000-0x000007FEF5CD2000-memory.dmp upx behavioral1/memory/2724-147-0x000007FEF5CE0000-0x000007FEF5CED000-memory.dmp upx behavioral1/memory/2724-146-0x000007FEF5CF0000-0x000007FEF5CFB000-memory.dmp upx behavioral1/memory/2724-139-0x000007FEF6750000-0x000007FEF6769000-memory.dmp upx behavioral1/memory/2724-138-0x000007FEF5D00000-0x000007FEF5D0B000-memory.dmp upx behavioral1/memory/2724-137-0x000007FEF5D20000-0x000007FEF5D2B000-memory.dmp upx behavioral1/memory/2724-136-0x000007FEF5D10000-0x000007FEF5D1B000-memory.dmp upx behavioral1/memory/2724-135-0x000007FEF6B90000-0x000007FEF6C1F000-memory.dmp upx behavioral1/memory/2724-156-0x000007FEF5C80000-0x000007FEF5C8D000-memory.dmp upx behavioral1/memory/2724-159-0x000007FEF5B70000-0x000007FEF5C7D000-memory.dmp upx behavioral1/memory/2724-132-0x000007FEF5DF0000-0x000007FEF6079000-memory.dmp upx behavioral1/memory/2724-127-0x000007FEF5D30000-0x000007FEF5D3C000-memory.dmp upx behavioral1/memory/2724-126-0x000007FEF5D40000-0x000007FEF5D4C000-memory.dmp upx behavioral1/memory/2724-123-0x000007FEF7150000-0x000007FEF7174000-memory.dmp upx behavioral1/memory/2724-122-0x000007FEF5D50000-0x000007FEF5D5E000-memory.dmp upx behavioral1/memory/2724-119-0x000007FEF5D60000-0x000007FEF5D6D000-memory.dmp upx behavioral1/memory/2724-118-0x000007FEF7180000-0x000007FEF71A8000-memory.dmp upx behavioral1/memory/2724-115-0x000007FEF5D80000-0x000007FEF5D8B000-memory.dmp upx behavioral1/memory/2724-112-0x000007FEF5D70000-0x000007FEF5D7C000-memory.dmp upx behavioral1/memory/2724-111-0x000007FEF5D90000-0x000007FEF5D9C000-memory.dmp upx behavioral1/memory/2724-110-0x000007FEF6080000-0x000007FEF646A000-memory.dmp upx behavioral1/memory/2724-103-0x000007FEF6700000-0x000007FEF670B000-memory.dmp upx behavioral1/memory/2724-101-0x000000013F710000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/2724-96-0x000007FEF6720000-0x000007FEF672B000-memory.dmp upx behavioral1/memory/2724-95-0x000007FEF6B80000-0x000007FEF6B8B000-memory.dmp upx behavioral1/memory/2416-94-0x000000013F710000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/2724-91-0x000007FEF5DA0000-0x000007FEF5DE5000-memory.dmp upx behavioral1/memory/2724-86-0x000007FEF6730000-0x000007FEF674B000-memory.dmp upx behavioral1/memory/2724-80-0x000007FEF6750000-0x000007FEF6769000-memory.dmp upx behavioral1/memory/2724-76-0x000007FEF6B90000-0x000007FEF6C1F000-memory.dmp upx behavioral1/memory/2724-71-0x000007FEF7150000-0x000007FEF7174000-memory.dmp upx behavioral1/memory/2724-67-0x000007FEF7180000-0x000007FEF71A8000-memory.dmp upx behavioral1/memory/2724-59-0x000000013F710000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/2724-194-0x000007FEF5B70000-0x000007FEF5C7D000-memory.dmp upx behavioral1/memory/2724-168-0x000007FEF5DF0000-0x000007FEF6079000-memory.dmp upx behavioral1/memory/2724-166-0x000007FEF7180000-0x000007FEF71A8000-memory.dmp upx behavioral1/memory/2724-165-0x000007FEF6080000-0x000007FEF646A000-memory.dmp upx behavioral1/memory/2724-208-0x000007FEF6710000-0x000007FEF671C000-memory.dmp upx behavioral1/memory/2724-226-0x000007FEF5B70000-0x000007FEF5C7D000-memory.dmp upx behavioral1/memory/2724-225-0x000007FEF5C80000-0x000007FEF5C8D000-memory.dmp upx behavioral1/memory/2724-224-0x000007FEF5C90000-0x000007FEF5CA1000-memory.dmp upx behavioral1/memory/2724-223-0x000007FEF5CB0000-0x000007FEF5CBC000-memory.dmp upx behavioral1/memory/2724-222-0x000007FEF5CC0000-0x000007FEF5CD2000-memory.dmp upx behavioral1/memory/2724-221-0x000007FEF5CE0000-0x000007FEF5CED000-memory.dmp upx behavioral1/memory/2724-220-0x000007FEF5CF0000-0x000007FEF5CFB000-memory.dmp upx behavioral1/memory/2724-219-0x000007FEF5D00000-0x000007FEF5D0B000-memory.dmp upx behavioral1/memory/2724-218-0x000007FEF5D10000-0x000007FEF5D1B000-memory.dmp upx behavioral1/memory/2724-217-0x000007FEF5D20000-0x000007FEF5D2B000-memory.dmp upx behavioral1/memory/2724-216-0x000007FEF5D30000-0x000007FEF5D3C000-memory.dmp upx behavioral1/memory/2416-250-0x000000013F710000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/2724-215-0x000007FEF5D40000-0x000007FEF5D4C000-memory.dmp upx behavioral1/memory/2724-214-0x000007FEF5D50000-0x000007FEF5D5E000-memory.dmp upx behavioral1/memory/2724-213-0x000007FEF5D60000-0x000007FEF5D6D000-memory.dmp upx behavioral1/memory/2724-212-0x000007FEF5D70000-0x000007FEF5D7C000-memory.dmp upx behavioral1/memory/2724-211-0x000007FEF5D80000-0x000007FEF5D8B000-memory.dmp upx behavioral1/memory/2724-210-0x000007FEF5D90000-0x000007FEF5D9C000-memory.dmp upx behavioral1/memory/2724-209-0x000007FEF6700000-0x000007FEF670B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" reg.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 336 tasklist.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1804 reg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 35 2724 75a85760d8c1b787758a8a188e29bf46.exe Token: SeIncreaseQuotaPrivilege 1808 wmic.exe Token: SeSecurityPrivilege 1808 wmic.exe Token: SeTakeOwnershipPrivilege 1808 wmic.exe Token: SeLoadDriverPrivilege 1808 wmic.exe Token: SeSystemProfilePrivilege 1808 wmic.exe Token: SeSystemtimePrivilege 1808 wmic.exe Token: SeProfSingleProcessPrivilege 1808 wmic.exe Token: SeIncBasePriorityPrivilege 1808 wmic.exe Token: SeCreatePagefilePrivilege 1808 wmic.exe Token: SeBackupPrivilege 1808 wmic.exe Token: SeRestorePrivilege 1808 wmic.exe Token: SeShutdownPrivilege 1808 wmic.exe Token: SeDebugPrivilege 1808 wmic.exe Token: SeSystemEnvironmentPrivilege 1808 wmic.exe Token: SeRemoteShutdownPrivilege 1808 wmic.exe Token: SeUndockPrivilege 1808 wmic.exe Token: SeManageVolumePrivilege 1808 wmic.exe Token: 33 1808 wmic.exe Token: 34 1808 wmic.exe Token: 35 1808 wmic.exe Token: SeIncreaseQuotaPrivilege 1808 wmic.exe Token: SeSecurityPrivilege 1808 wmic.exe Token: SeTakeOwnershipPrivilege 1808 wmic.exe Token: SeLoadDriverPrivilege 1808 wmic.exe Token: SeSystemProfilePrivilege 1808 wmic.exe Token: SeSystemtimePrivilege 1808 wmic.exe Token: SeProfSingleProcessPrivilege 1808 wmic.exe Token: SeIncBasePriorityPrivilege 1808 wmic.exe Token: SeCreatePagefilePrivilege 1808 wmic.exe Token: SeBackupPrivilege 1808 wmic.exe Token: SeRestorePrivilege 1808 wmic.exe Token: SeShutdownPrivilege 1808 wmic.exe Token: SeDebugPrivilege 1808 wmic.exe Token: SeSystemEnvironmentPrivilege 1808 wmic.exe Token: SeRemoteShutdownPrivilege 1808 wmic.exe Token: SeUndockPrivilege 1808 wmic.exe Token: SeManageVolumePrivilege 1808 wmic.exe Token: 33 1808 wmic.exe Token: 34 1808 wmic.exe Token: 35 1808 wmic.exe Token: SeDebugPrivilege 336 tasklist.exe Token: SeIncreaseQuotaPrivilege 1492 WMIC.exe Token: SeSecurityPrivilege 1492 WMIC.exe Token: SeTakeOwnershipPrivilege 1492 WMIC.exe Token: SeLoadDriverPrivilege 1492 WMIC.exe Token: SeSystemProfilePrivilege 1492 WMIC.exe Token: SeSystemtimePrivilege 1492 WMIC.exe Token: SeProfSingleProcessPrivilege 1492 WMIC.exe Token: SeIncBasePriorityPrivilege 1492 WMIC.exe Token: SeCreatePagefilePrivilege 1492 WMIC.exe Token: SeBackupPrivilege 1492 WMIC.exe Token: SeRestorePrivilege 1492 WMIC.exe Token: SeShutdownPrivilege 1492 WMIC.exe Token: SeDebugPrivilege 1492 WMIC.exe Token: SeSystemEnvironmentPrivilege 1492 WMIC.exe Token: SeRemoteShutdownPrivilege 1492 WMIC.exe Token: SeUndockPrivilege 1492 WMIC.exe Token: SeManageVolumePrivilege 1492 WMIC.exe Token: 33 1492 WMIC.exe Token: 34 1492 WMIC.exe Token: 35 1492 WMIC.exe Token: SeIncreaseQuotaPrivilege 1492 WMIC.exe Token: SeSecurityPrivilege 1492 WMIC.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2724 2416 75a85760d8c1b787758a8a188e29bf46.exe 17 PID 2416 wrote to memory of 2724 2416 75a85760d8c1b787758a8a188e29bf46.exe 17 PID 2416 wrote to memory of 2724 2416 75a85760d8c1b787758a8a188e29bf46.exe 17 PID 2724 wrote to memory of 1808 2724 75a85760d8c1b787758a8a188e29bf46.exe 19 PID 2724 wrote to memory of 1808 2724 75a85760d8c1b787758a8a188e29bf46.exe 19 PID 2724 wrote to memory of 1808 2724 75a85760d8c1b787758a8a188e29bf46.exe 19 PID 2724 wrote to memory of 2552 2724 75a85760d8c1b787758a8a188e29bf46.exe 43 PID 2724 wrote to memory of 2552 2724 75a85760d8c1b787758a8a188e29bf46.exe 43 PID 2724 wrote to memory of 2552 2724 75a85760d8c1b787758a8a188e29bf46.exe 43 PID 2552 wrote to memory of 1804 2552 cmd.exe 42 PID 2552 wrote to memory of 1804 2552 cmd.exe 42 PID 2552 wrote to memory of 1804 2552 cmd.exe 42 PID 2724 wrote to memory of 1828 2724 75a85760d8c1b787758a8a188e29bf46.exe 41 PID 2724 wrote to memory of 1828 2724 75a85760d8c1b787758a8a188e29bf46.exe 41 PID 2724 wrote to memory of 1828 2724 75a85760d8c1b787758a8a188e29bf46.exe 41 PID 1828 wrote to memory of 324 1828 cmd.exe 40 PID 1828 wrote to memory of 324 1828 cmd.exe 40 PID 1828 wrote to memory of 324 1828 cmd.exe 40 PID 2724 wrote to memory of 596 2724 75a85760d8c1b787758a8a188e29bf46.exe 39 PID 2724 wrote to memory of 596 2724 75a85760d8c1b787758a8a188e29bf46.exe 39 PID 2724 wrote to memory of 596 2724 75a85760d8c1b787758a8a188e29bf46.exe 39 PID 596 wrote to memory of 684 596 cmd.exe 38 PID 596 wrote to memory of 684 596 cmd.exe 38 PID 596 wrote to memory of 684 596 cmd.exe 38 PID 2724 wrote to memory of 780 2724 75a85760d8c1b787758a8a188e29bf46.exe 37 PID 2724 wrote to memory of 780 2724 75a85760d8c1b787758a8a188e29bf46.exe 37 PID 2724 wrote to memory of 780 2724 75a85760d8c1b787758a8a188e29bf46.exe 37 PID 780 wrote to memory of 336 780 cmd.exe 36 PID 780 wrote to memory of 336 780 cmd.exe 36 PID 780 wrote to memory of 336 780 cmd.exe 36 PID 780 wrote to memory of 1524 780 cmd.exe 35 PID 780 wrote to memory of 1524 780 cmd.exe 35 PID 780 wrote to memory of 1524 780 cmd.exe 35 PID 780 wrote to memory of 1016 780 cmd.exe 32 PID 780 wrote to memory of 1016 780 cmd.exe 32 PID 780 wrote to memory of 1016 780 cmd.exe 32 PID 2724 wrote to memory of 1648 2724 75a85760d8c1b787758a8a188e29bf46.exe 34 PID 2724 wrote to memory of 1648 2724 75a85760d8c1b787758a8a188e29bf46.exe 34 PID 2724 wrote to memory of 1648 2724 75a85760d8c1b787758a8a188e29bf46.exe 34 PID 1648 wrote to memory of 1492 1648 cmd.exe 33 PID 1648 wrote to memory of 1492 1648 cmd.exe 33 PID 1648 wrote to memory of 1492 1648 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\75a85760d8c1b787758a8a188e29bf46.exe"C:\Users\Admin\AppData\Local\Temp\75a85760d8c1b787758a8a188e29bf46.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\75a85760d8c1b787758a8a188e29bf46.exe"C:\Users\Admin\AppData\Local\Temp\75a85760d8c1b787758a8a188e29bf46.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\System32\Wbem\wmic.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List"3⤵
- Suspicious use of WriteProcessMemory
PID:1648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "TASKLIST /FI "STATUS eq RUNNING" | find /V "Image Name" | find /V "=""3⤵
- Suspicious use of WriteProcessMemory
PID:780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2> nul3⤵
- Suspicious use of WriteProcessMemory
PID:596
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2> nul3⤵
- Suspicious use of WriteProcessMemory
PID:1828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /V "WindowsUpdate" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\svchost.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:2552
-
-
-
C:\Windows\system32\find.exefind /V "="1⤵PID:1016
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
C:\Windows\system32\find.exefind /V "Image Name"1⤵PID:1524
-
C:\Windows\system32\tasklist.exeTASKLIST /FI "STATUS eq RUNNING"1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:336
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName1⤵PID:684
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc1⤵PID:324
-
C:\Windows\system32\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /V "WindowsUpdate" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\svchost.exe"1⤵
- Adds Run key to start application
- Modifies registry key
PID:1804