Analysis
-
max time kernel
20s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 23:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ff0fb6da13fd245eef8f5c51b35989b5.exe
Resource
win7-20231129-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
ff0fb6da13fd245eef8f5c51b35989b5.exe
Resource
win10v2004-20231222-en
9 signatures
150 seconds
General
-
Target
ff0fb6da13fd245eef8f5c51b35989b5.exe
-
Size
134KB
-
MD5
ff0fb6da13fd245eef8f5c51b35989b5
-
SHA1
c0bb53cd6c6e0329eb167aca1d6166da2eae00c7
-
SHA256
7f670a62b92709d6555aeec5d2df4090f1b710ab6912d1d0fe3ea4ed13ef9cbf
-
SHA512
d763417e683ce9bcd3f6c0f0f84d9adb7be43c88d5cfde0a8a01d637b9551bf5d65c3e56b860648e080af5a3192804305d3310ffc03768f408a0a24715ee06fa
-
SSDEEP
3072:T/0buDQFTfwbJ7MepVjUpOtgRl2L7QFPyUUtyhjWPV:wbuE5cJ7Mep1UY4l2LE9TU1
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1044 51b281.exe -
Loads dropped DLL 2 IoCs
pid Process 1044 51b281.exe 1044 51b281.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX ff0fb6da13fd245eef8f5c51b35989b5.exe File opened for modification C:\Windows\SysWOW64\MSINET.OCX ff0fb6da13fd245eef8f5c51b35989b5.exe File opened for modification C:\Windows\SysWOW64\51b281.exe ff0fb6da13fd245eef8f5c51b35989b5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 51b281.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\ = "0" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX, 1" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS\ = "2" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1\ = "132497" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\ = "Winsock General Property Page Object" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32 51b281.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 51b281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Programmable 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1 51b281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 51b281.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe Token: SeSystemtimePrivilege 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 1044 51b281.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2440 wrote to memory of 1044 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 98 PID 2440 wrote to memory of 1044 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 98 PID 2440 wrote to memory of 1044 2440 ff0fb6da13fd245eef8f5c51b35989b5.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff0fb6da13fd245eef8f5c51b35989b5.exe"C:\Users\Admin\AppData\Local\Temp\ff0fb6da13fd245eef8f5c51b35989b5.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\51b281.exeC:\Windows\system32\51b281.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
C:\Windows\SysWOW64\gggg38.exeC:\Windows\system32\gggg38.exe2⤵PID:1168
-