Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
7a39783b4df44b14c0bc4a9ab62c2870.exe
Resource
win7-20231129-en
General
-
Target
7a39783b4df44b14c0bc4a9ab62c2870.exe
-
Size
18.9MB
-
MD5
7a39783b4df44b14c0bc4a9ab62c2870
-
SHA1
1278ed63bad5d24546584f274527a7c314df8867
-
SHA256
850a2cee4c34bee8c6ee76162c2ead42a8f537e59d257e495b3f0d190c8fd606
-
SHA512
d20beda7af98aea8d27e7423aa1fcb979bd966996848be2cccf9041a6545882be2c241c83d93df318818d7495262020927e0d82abfffe6ef5495415fd9106ca2
-
SSDEEP
393216:rIJm/0ywuOkd8cKjti/2gRJl9Y06abayqgiJXfd9lYbhsk8:rIJVz483iugR39YMsgqXfzlYbm
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe Powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe Powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 Host file.exe -
Loads dropped DLL 4 IoCs
pid Process 780 7a39783b4df44b14c0bc4a9ab62c2870.exe 780 7a39783b4df44b14c0bc4a9ab62c2870.exe 780 7a39783b4df44b14c0bc4a9ab62c2870.exe 780 7a39783b4df44b14c0bc4a9ab62c2870.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\YTD\YTD\Uninstall.ini 7a39783b4df44b14c0bc4a9ab62c2870.exe File opened for modification C:\Program Files (x86)\YTD\YTD\ytd6-setup.exe 7a39783b4df44b14c0bc4a9ab62c2870.exe File opened for modification C:\Program Files (x86)\YTD\YTD\Uninstall.exe 7a39783b4df44b14c0bc4a9ab62c2870.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3020 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2676 Host file.exe Token: SeDebugPrivilege 3020 Powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 780 wrote to memory of 2676 780 7a39783b4df44b14c0bc4a9ab62c2870.exe 28 PID 780 wrote to memory of 2676 780 7a39783b4df44b14c0bc4a9ab62c2870.exe 28 PID 780 wrote to memory of 2676 780 7a39783b4df44b14c0bc4a9ab62c2870.exe 28 PID 780 wrote to memory of 2676 780 7a39783b4df44b14c0bc4a9ab62c2870.exe 28 PID 2676 wrote to memory of 3020 2676 Host file.exe 29 PID 2676 wrote to memory of 3020 2676 Host file.exe 29 PID 2676 wrote to memory of 3020 2676 Host file.exe 29 PID 2676 wrote to memory of 3020 2676 Host file.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a39783b4df44b14c0bc4a9ab62c2870.exe"C:\Users\Admin\AppData\Local\Temp\7a39783b4df44b14c0bc4a9ab62c2870.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Roaming\Host file.exe"C:\Users\Admin\AppData\Roaming\Host file.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell" Copy-Item 'C:\Users\Admin\AppData\Roaming\Host file.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe'3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD53b5028a2d0941b8c251d9e1b54a498e0
SHA18743535cb2d6255ab527724f7ad7cf8ae21820c7
SHA256197aa9b61d526ad5d6d3dc5303c27e914e7da35025bae9f77d409c33b96557bb
SHA5125ebb5225657ea6c43bd02445a3bc59a5272a7d08cedf6c895e6886b6bd25f6687ee05226fca5c22720ed3c9314f27f503df91be982c65e4d813310244075c011
-
Filesize
640KB
MD5c8d2bf10b5984639d0978a376c188f22
SHA14aec3555c0077b99383828d37113de5c9df0d0e0
SHA256cceb592fdf3febdc10e629b5dca6d3f1323910562ff090b7206147988f26fbe8
SHA512321137646b3cc94ffe4241110838b4e972e5f9df49ce0fe96ebbcd671f2063e1dad0e235054bb4cedd3e97143c903f1156404ddb72c3588e8733d6d9f37d7048