Analysis
-
max time kernel
60s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
11832aaaea01ab2ab4f4bbef2792335a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
11832aaaea01ab2ab4f4bbef2792335a.exe
Resource
win10v2004-20231215-en
General
-
Target
11832aaaea01ab2ab4f4bbef2792335a.exe
-
Size
4.5MB
-
MD5
11832aaaea01ab2ab4f4bbef2792335a
-
SHA1
b086b6796613307e4fc109f224eb9f3550e0d3b4
-
SHA256
e44253c39391bb28f346dd98d874e4587a34ecec25cc920ddcf60751cd1bfdc4
-
SHA512
76c967665ccf20bcdeda6ffab8e0f29929605c3b9e80bb24f9c25f38f3c1674932e65afba486499aac2bce8cb871bfa8a6cd56ee9e78887ac8cd113a39d50286
-
SSDEEP
98304:5MGf2jqPwejTT9k7lw3lgIJm1PBMckd00ZTz+LX2yC0DX:Ff2jqBTG7lw36r1PSna0ZiXD7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2176 _9C1.tmpac7d.exe -
Loads dropped DLL 7 IoCs
pid Process 2172 11832aaaea01ab2ab4f4bbef2792335a.exe 2172 11832aaaea01ab2ab4f4bbef2792335a.exe 2172 11832aaaea01ab2ab4f4bbef2792335a.exe 2172 11832aaaea01ab2ab4f4bbef2792335a.exe 2172 11832aaaea01ab2ab4f4bbef2792335a.exe 2172 11832aaaea01ab2ab4f4bbef2792335a.exe 2172 11832aaaea01ab2ab4f4bbef2792335a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiVirus_AntiSpyware_2011 = "\"C:\\Users\\Admin\\AppData\\Roaming\\AntiVirus_AntiSpyware_2011\\AntiVirus AntiSpyware.exe\" /STARTUP" 11832aaaea01ab2ab4f4bbef2792335a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 11832aaaea01ab2ab4f4bbef2792335a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2172 11832aaaea01ab2ab4f4bbef2792335a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2176 2172 11832aaaea01ab2ab4f4bbef2792335a.exe 29 PID 2172 wrote to memory of 2176 2172 11832aaaea01ab2ab4f4bbef2792335a.exe 29 PID 2172 wrote to memory of 2176 2172 11832aaaea01ab2ab4f4bbef2792335a.exe 29 PID 2172 wrote to memory of 2176 2172 11832aaaea01ab2ab4f4bbef2792335a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\11832aaaea01ab2ab4f4bbef2792335a.exe"C:\Users\Admin\AppData\Local\Temp\11832aaaea01ab2ab4f4bbef2792335a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\_9C1.tmpac7d.exe"C:\Users\Admin\AppData\Local\Temp\_9C1.tmpac7d.exe" -p"09:16 AM" -y -o"C:\Users\Admin\AppData\Roaming\AntiVirus_AntiSpyware_2011"2⤵
- Executes dropped EXE
PID:2176
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C dir "C:\Users\Admin\AppData\Roaming"2⤵PID:1428
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C dir "C:\Users\Admin\AppData\Roaming\AntiVirus_AntiSpyware_2011"2⤵PID:780
-
-
C:\Users\Admin\AppData\Roaming\AntiVirus_AntiSpyware_2011\securitymanager.exe"C:\Users\Admin\AppData\Roaming\AntiVirus_AntiSpyware_2011\securitymanager.exe"2⤵PID:2108
-
-
C:\Users\Admin\AppData\Roaming\AntiVirus_AntiSpyware_2011\AntiVirus AntiSpyware.exe"C:\Users\Admin\AppData\Roaming\AntiVirus_AntiSpyware_2011\AntiVirus AntiSpyware.exe"2⤵PID:2220
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5681⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5c6fa28f482191fdfb789b76c80dad192
SHA11cb2f2d29b33d2de63e1bf556a84259ff5c523a0
SHA256ad479a95bd53730a95c73b0c3f6fb764ef11c33f92fc07c115aabd6aa742185c
SHA512641ab7dddd60f2e6ef964f1cff5cd7662fa0808d104edc9a243cbf8b00414697b722acf78ac4a1e028b157939ee76158508761783ae64e63d33015803c45dd03
-
Filesize
92KB
MD5745963f4b5cdff8d0da26481fdf63518
SHA13744c5cb2d38c171300e2251bf80e2e9e5588198
SHA25610ca892cbe8a11b7a64317941b1bc9ab3c63dd9dfc4c24efdb9e3b447f624291
SHA512e13d5d37a2a17352e06108367e81ddcbd15f7bfd99248ee36d9dfcda0bc67c244871ac9902a951dbfb7c8dac52efaaf8a91491927c083b52e59953f6198d9f46