Analysis
-
max time kernel
86s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 22:50
Static task
static1
Behavioral task
behavioral1
Sample
1efbc94be630bf1ff280896e81adad1c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1efbc94be630bf1ff280896e81adad1c.exe
Resource
win10v2004-20231222-en
General
-
Target
1efbc94be630bf1ff280896e81adad1c.exe
-
Size
158KB
-
MD5
1efbc94be630bf1ff280896e81adad1c
-
SHA1
bf1e425c7b25b43301e21bfce5ebe73522a72316
-
SHA256
c57808a9e2fe1a1e190160d624e9cff6a496ed0d679f7d7a7c0e8760b0b94503
-
SHA512
1e1c62cf05daac39408d4a7155927e9964052adb369f5551a26134acd4decc13fa4181207bbbabdb4ee9d14585907c402027627a4a684323c3d7a9f44015dc64
-
SSDEEP
3072:MR/8rqUUfxIdq1n2UuVr2zJxJDwHTkjRzJFkPnHcCzbKtZc:MB85UfxIcpvwHAjRlFkPnHc2utZc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2980 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1204 Explorer.EXE 464 services.exe -
Registers COM server for autorun 1 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{19350fc2-aa90-f613-4bf0-85f7eee99382}\\n." 1efbc94be630bf1ff280896e81adad1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InprocServer32\ = "\\\\.\\globalroot\\systemroot\\Installer\\{19350fc2-aa90-f613-4bf0-85f7eee99382}\\n." 1efbc94be630bf1ff280896e81adad1c.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 1efbc94be630bf1ff280896e81adad1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" 1efbc94be630bf1ff280896e81adad1c.exe -
Unexpected DNS network traffic destination 9 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 66.85.130.234 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2188 set thread context of 2980 2188 1efbc94be630bf1ff280896e81adad1c.exe 28 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Installer\{19350fc2-aa90-f613-4bf0-85f7eee99382}\@ 1efbc94be630bf1ff280896e81adad1c.exe File created C:\Windows\Installer\{19350fc2-aa90-f613-4bf0-85f7eee99382}\n 1efbc94be630bf1ff280896e81adad1c.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1} 1efbc94be630bf1ff280896e81adad1c.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 1efbc94be630bf1ff280896e81adad1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" 1efbc94be630bf1ff280896e81adad1c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{19350fc2-aa90-f613-4bf0-85f7eee99382}\\n." 1efbc94be630bf1ff280896e81adad1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InprocServer32\ = "\\\\.\\globalroot\\systemroot\\Installer\\{19350fc2-aa90-f613-4bf0-85f7eee99382}\\n." 1efbc94be630bf1ff280896e81adad1c.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\clsid 1efbc94be630bf1ff280896e81adad1c.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2188 1efbc94be630bf1ff280896e81adad1c.exe 2188 1efbc94be630bf1ff280896e81adad1c.exe 2188 1efbc94be630bf1ff280896e81adad1c.exe 2188 1efbc94be630bf1ff280896e81adad1c.exe 2188 1efbc94be630bf1ff280896e81adad1c.exe 2188 1efbc94be630bf1ff280896e81adad1c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2188 1efbc94be630bf1ff280896e81adad1c.exe Token: SeDebugPrivilege 2188 1efbc94be630bf1ff280896e81adad1c.exe Token: SeDebugPrivilege 2188 1efbc94be630bf1ff280896e81adad1c.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1204 2188 1efbc94be630bf1ff280896e81adad1c.exe 13 PID 2188 wrote to memory of 1204 2188 1efbc94be630bf1ff280896e81adad1c.exe 13 PID 2188 wrote to memory of 464 2188 1efbc94be630bf1ff280896e81adad1c.exe 2 PID 2188 wrote to memory of 2980 2188 1efbc94be630bf1ff280896e81adad1c.exe 28 PID 2188 wrote to memory of 2980 2188 1efbc94be630bf1ff280896e81adad1c.exe 28 PID 2188 wrote to memory of 2980 2188 1efbc94be630bf1ff280896e81adad1c.exe 28 PID 2188 wrote to memory of 2980 2188 1efbc94be630bf1ff280896e81adad1c.exe 28 PID 2188 wrote to memory of 2980 2188 1efbc94be630bf1ff280896e81adad1c.exe 28
Processes
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Executes dropped EXE
PID:464
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\1efbc94be630bf1ff280896e81adad1c.exe"C:\Users\Admin\AppData\Local\Temp\1efbc94be630bf1ff280896e81adad1c.exe"2⤵
- Registers COM server for autorun
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Deletes itself
PID:2980
-
-