Analysis
-
max time kernel
0s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 15:27
Static task
static1
Behavioral task
behavioral1
Sample
78db881af6d41d8ce120db6dfe104f24.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78db881af6d41d8ce120db6dfe104f24.exe
Resource
win10v2004-20231222-en
General
-
Target
78db881af6d41d8ce120db6dfe104f24.exe
-
Size
2.4MB
-
MD5
78db881af6d41d8ce120db6dfe104f24
-
SHA1
1519b9fcc1f17b90a88acbfc089b5d2f76f21bad
-
SHA256
b644b71318ac3f1a5c01249c65bcc490ef7cffe13925c1e8e200eecd91df6c9c
-
SHA512
ea19d704961651c5fdac730f47b1470a9816dad13d9a3b67c6116eb6a778d8823a479d930676105172cea9fe235dd45f9993e12a228b984a43b5299a18866f58
-
SSDEEP
49152:d7K+TDiZtK4JnUTTbd7xnXTPTntYmzZfv+3nmRVHdA0IyDmAHA5Z4/:deLtKzRpX/tzVc0bIyawA5Z4/
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 8 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exepid Process 548 netsh.exe 3864 netsh.exe 3300 netsh.exe 4820 netsh.exe 1888 netsh.exe 1812 netsh.exe 844 netsh.exe 3180 netsh.exe -
Sets file to hidden 1 TTPs 5 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid Process 116 attrib.exe 4268 attrib.exe 1780 attrib.exe 4544 attrib.exe 4316 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
78db881af6d41d8ce120db6dfe104f24.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 78db881af6d41d8ce120db6dfe104f24.exe -
Drops file in Program Files directory 1 IoCs
Processes:
78db881af6d41d8ce120db6dfe104f24.exedescription ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\setup.exe 78db881af6d41d8ce120db6dfe104f24.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 1012 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 264 taskkill.exe 4356 taskkill.exe 3224 taskkill.exe 4392 taskkill.exe 5040 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid Process 1860 regedit.exe -
Runs net.exe
-
Views/modifies file attributes 1 TTPs 16 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid Process 3956 attrib.exe 116 attrib.exe 4268 attrib.exe 1872 attrib.exe 840 attrib.exe 5072 attrib.exe 2188 attrib.exe 4316 attrib.exe 4940 attrib.exe 4824 attrib.exe 3584 attrib.exe 1780 attrib.exe 4992 attrib.exe 4544 attrib.exe 904 attrib.exe 1248 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78db881af6d41d8ce120db6dfe104f24.exe"C:\Users\Admin\AppData\Local\Temp\78db881af6d41d8ce120db6dfe104f24.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
PID:5052 -
C:\Program Files (x86)\Company\NewProduct\setup.exe"C:\Program Files (x86)\Company\NewProduct\setup.exe"2⤵PID:1216
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\stop.js"3⤵PID:2040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "4⤵PID:4304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "3⤵PID:4484
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im RManServer.exe1⤵
- Kills process with taskkill
PID:264
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe1⤵
- Kills process with taskkill
PID:4356
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Local\Temp/block_reader.sys"1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:116
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Local\Temp\install.bat"1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4268
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop rserver31⤵PID:2444
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rserver3.exe1⤵
- Kills process with taskkill
PID:3224
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im r_server.exe1⤵
- Kills process with taskkill
PID:4392
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cam_server.exe1⤵
- Kills process with taskkill
PID:5040
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Windows\SysWOW64\rserver30"1⤵
- Views/modifies file attributes
PID:4940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Telnet1⤵PID:1988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Service Host Controller"1⤵PID:4768
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn security /f1⤵PID:1408
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="RealIP"1⤵
- Modifies Windows Firewall
PID:1812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user HelpAssistant /delete1⤵PID:4896
-
C:\Windows\SysWOW64\net.exenet user HelpAssistant /delete1⤵PID:2096
-
C:\Windows\SysWOW64\net.exenet stop "Service Host Controller"1⤵PID:3192
-
C:\Windows\SysWOW64\sc.exesc config tlntsvr start= disabled1⤵
- Launches sc.exe
PID:1012
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="Microsoft Outlook Express"1⤵
- Modifies Windows Firewall
PID:844
-
C:\Windows\SysWOW64\net.exenet stop Telnet1⤵PID:1156
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Windows\SysWOW64\r_server.exe"1⤵
- Views/modifies file attributes
PID:1872
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="Service Host Controller"1⤵
- Modifies Windows Firewall
PID:3180
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Windows\system32\r_server.exe"1⤵
- Views/modifies file attributes
PID:4824
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h "C:\Windows\system32\rserver30"1⤵
- Views/modifies file attributes
PID:3584
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="ò«ßΓ-»α«µÑßß ñ½∩ ß½πªí Windows"1⤵
- Modifies Windows Firewall
PID:548
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Windows\SysWOW64\cam_server.exe"1⤵
- Views/modifies file attributes
PID:840
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Windows\system32\cam_server.exe"1⤵
- Views/modifies file attributes
PID:3956
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="ò«ßΓ-»α«µÑßß ñ½∩ ºáñáτ Windows"1⤵
- Modifies Windows Firewall
PID:3864
-
C:\Windows\SysWOW64\net.exenet stop rserver31⤵PID:1860
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete portopening tcp 570091⤵
- Modifies Windows Firewall
PID:3300
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Local\Temp\stop.js"1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1780
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="cam_server"1⤵
- Modifies Windows Firewall
PID:4820
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r "C:\Users\Admin\AppData\Local\Temp/realip.exe"1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4544
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete portopening tcp 57011 all1⤵
- Modifies Windows Firewall
PID:1888
-
C:\Windows\SysWOW64\reg.exereg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v "Ä»Ñαᵿ«¡¡á∩ ß¿ßΓѼá Microsoft Windows" /f1⤵
- Modifies registry key
PID:3888
-
C:\Windows\SysWOW64\regedit.exeregedit /s set.reg1⤵
- Runs .reg file with regedit
PID:1860
-
C:\Windows\SysWOW64\catroot3\rutserv.exe"rutserv.exe" /start1⤵PID:2936
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Users\Admin\AppData\Local\Temp\install.bat"1⤵
- Views/modifies file attributes
PID:904
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Users\Admin\AppData\Local\Temp\stop.js"1⤵
- Views/modifies file attributes
PID:5072
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Users\Admin\AppData\Local\Temp/realip.exe"1⤵
- Views/modifies file attributes
PID:2188
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Users\Admin\AppData\Local\Temp/HookLib.dll"1⤵
- Views/modifies file attributes
PID:1248
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r "C:\Users\Admin\AppData\Local\Temp/block_reader.sys"1⤵
- Views/modifies file attributes
PID:4992
-
C:\Windows\SysWOW64\catroot3\rfusclient.exeC:\Windows\SysWOW64\catroot3\rfusclient.exe /tray1⤵PID:3292
-
C:\Windows\SysWOW64\catroot3\rfusclient.exeC:\Windows\SysWOW64\catroot3\rfusclient.exe1⤵PID:3584
-
C:\Windows\SysWOW64\catroot3\rfusclient.exeC:\Windows\SysWOW64\catroot3\rfusclient.exe /tray2⤵PID:4120
-
-
C:\Windows\SysWOW64\catroot3\rutserv.exeC:\Windows\SysWOW64\catroot3\rutserv.exe1⤵PID:4384
-
C:\Windows\SysWOW64\catroot3\rutserv.exe"rutserv.exe" /firewall1⤵PID:4912
-
C:\Windows\SysWOW64\catroot3\rutserv.exe"rutserv.exe" /silentinstall1⤵PID:532
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\System\CurrentControlSet\Services\RServer3" /f1⤵PID:2368
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "cam_server.exe" /f1⤵PID:2932
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v HelpAssistant /f1⤵PID:2448
-
C:\Windows\SysWOW64\reg.exereg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v "Service Host Controller" /f1⤵
- Modifies registry key
PID:3248
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Windows\System32\catroot3"1⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4316
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f1⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e