Analysis
-
max time kernel
127s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:51
Behavioral task
behavioral1
Sample
0f1acd4f9e721e22897073985f9e2116.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f1acd4f9e721e22897073985f9e2116.exe
Resource
win10v2004-20231215-en
General
-
Target
0f1acd4f9e721e22897073985f9e2116.exe
-
Size
4.0MB
-
MD5
0f1acd4f9e721e22897073985f9e2116
-
SHA1
a3271f82509676cbbdb4e74a6425a54443443881
-
SHA256
fcbbd9fa4e2458a10241b4d50e9fce9de68a64a1afc53b5a647f90fae7ba3efa
-
SHA512
1aadfcc5fdb9e767a3823f60e659817845d08ab0cb8b7307b1e92865abd6e12782ea2d4b115af0ae445a8b1da1429c8d4e3086bab1fac3951c371d830acefbdc
-
SSDEEP
98304:Idk4JfSKbza2K3YUu7hoBBjiKiy/ZCvwaFo9OSku:I+6bpK3LT2KDIoaF6OSk
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
resource yara_rule behavioral1/memory/1720-1-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-37-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-38-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-40-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-41-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-42-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-43-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-44-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-45-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-46-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-47-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-48-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-49-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-50-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-51-0x0000000000400000-0x00000000017A7000-memory.dmp themida behavioral1/memory/1720-52-0x0000000000400000-0x00000000017A7000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Movie Maker = "C:\\Arquivos de programas\\RunDLL31.exe" 0f1acd4f9e721e22897073985f9e2116.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2272 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2140 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1720 0f1acd4f9e721e22897073985f9e2116.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1720 0f1acd4f9e721e22897073985f9e2116.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2140 1720 0f1acd4f9e721e22897073985f9e2116.exe 19 PID 1720 wrote to memory of 2140 1720 0f1acd4f9e721e22897073985f9e2116.exe 19 PID 1720 wrote to memory of 2140 1720 0f1acd4f9e721e22897073985f9e2116.exe 19 PID 1720 wrote to memory of 2140 1720 0f1acd4f9e721e22897073985f9e2116.exe 19 PID 1720 wrote to memory of 2272 1720 0f1acd4f9e721e22897073985f9e2116.exe 28 PID 1720 wrote to memory of 2272 1720 0f1acd4f9e721e22897073985f9e2116.exe 28 PID 1720 wrote to memory of 2272 1720 0f1acd4f9e721e22897073985f9e2116.exe 28 PID 1720 wrote to memory of 2272 1720 0f1acd4f9e721e22897073985f9e2116.exe 28 PID 1720 wrote to memory of 2288 1720 0f1acd4f9e721e22897073985f9e2116.exe 26 PID 1720 wrote to memory of 2288 1720 0f1acd4f9e721e22897073985f9e2116.exe 26 PID 1720 wrote to memory of 2288 1720 0f1acd4f9e721e22897073985f9e2116.exe 26 PID 1720 wrote to memory of 2288 1720 0f1acd4f9e721e22897073985f9e2116.exe 26 PID 1720 wrote to memory of 1812 1720 0f1acd4f9e721e22897073985f9e2116.exe 25 PID 1720 wrote to memory of 1812 1720 0f1acd4f9e721e22897073985f9e2116.exe 25 PID 1720 wrote to memory of 1812 1720 0f1acd4f9e721e22897073985f9e2116.exe 25 PID 1720 wrote to memory of 1812 1720 0f1acd4f9e721e22897073985f9e2116.exe 25 PID 1720 wrote to memory of 2292 1720 0f1acd4f9e721e22897073985f9e2116.exe 24 PID 1720 wrote to memory of 2292 1720 0f1acd4f9e721e22897073985f9e2116.exe 24 PID 1720 wrote to memory of 2292 1720 0f1acd4f9e721e22897073985f9e2116.exe 24 PID 1720 wrote to memory of 2292 1720 0f1acd4f9e721e22897073985f9e2116.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f1acd4f9e721e22897073985f9e2116.exe"C:\Users\Admin\AppData\Local\Temp\0f1acd4f9e721e22897073985f9e2116.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\autoexec.bat /sc onstart /ru system2⤵
- Creates scheduled task(s)
PID:2140
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2292
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:1812
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2288
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1