Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
129fc279f95f5e60709058cb3e052d3d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
129fc279f95f5e60709058cb3e052d3d.exe
Resource
win10v2004-20231215-en
General
-
Target
129fc279f95f5e60709058cb3e052d3d.exe
-
Size
130KB
-
MD5
129fc279f95f5e60709058cb3e052d3d
-
SHA1
3517311341c9b22936d7d725c4c3d5aed3e2415a
-
SHA256
bc10a209f66cfacdca83b3dd9dac9219d5efa0a3a66074e32f6d558f3a59c26a
-
SHA512
175261f985d1282dcbbd360fdd0d04e5e80eca3be166cfc86fe2a0a7f0b579c2f0b20f05c23fdb9d92e9ab6813d645d0527c769ee8c9699f3e0455c51f181af6
-
SSDEEP
3072:q4ohdiJYwBfj8c5G1NxSvlgfo+mw/OhCvSMWttEBnpiJ:7P1j8c5G4dKiw/lJC
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1244 129fc279f95f5e60709058cb3e052d3d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\help\B41346EFA848.dll 129fc279f95f5e60709058cb3e052d3d.exe File opened for modification C:\Windows\help\B41346EFA848.dll 129fc279f95f5e60709058cb3e052d3d.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765} 129fc279f95f5e60709058cb3e052d3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\ = "SSUUDL" 129fc279f95f5e60709058cb3e052d3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32 129fc279f95f5e60709058cb3e052d3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ = "C:\\Windows\\help\\B41346EFA848.dll" 129fc279f95f5e60709058cb3e052d3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ThreadingModel = "Apartment" 129fc279f95f5e60709058cb3e052d3d.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeRestorePrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeRestorePrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeRestorePrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeRestorePrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeRestorePrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeBackupPrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeRestorePrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeRestorePrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeRestorePrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeRestorePrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe Token: SeRestorePrivilege 1244 129fc279f95f5e60709058cb3e052d3d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1244 129fc279f95f5e60709058cb3e052d3d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2948 1244 129fc279f95f5e60709058cb3e052d3d.exe 15 PID 1244 wrote to memory of 2948 1244 129fc279f95f5e60709058cb3e052d3d.exe 15 PID 1244 wrote to memory of 2948 1244 129fc279f95f5e60709058cb3e052d3d.exe 15 PID 1244 wrote to memory of 2948 1244 129fc279f95f5e60709058cb3e052d3d.exe 15 PID 1244 wrote to memory of 2744 1244 129fc279f95f5e60709058cb3e052d3d.exe 30 PID 1244 wrote to memory of 2744 1244 129fc279f95f5e60709058cb3e052d3d.exe 30 PID 1244 wrote to memory of 2744 1244 129fc279f95f5e60709058cb3e052d3d.exe 30 PID 1244 wrote to memory of 2744 1244 129fc279f95f5e60709058cb3e052d3d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\129fc279f95f5e60709058cb3e052d3d.exe"C:\Users\Admin\AppData\Local\Temp\129fc279f95f5e60709058cb3e052d3d.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:2948
-
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:2744
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5e533642619b3d7a825a8af4a7891ebc0
SHA1db4b4872cdcf032f52ac99b846f8106e09a9d10f
SHA2568a5acaedb3906baa4b576a19daa833e48d9a3327596900bf2c18831cebc745e7
SHA512edfa8ce119048d182d8fea748c4622e6f71687a29444424df052fadcf0a8009bb8219c9686785749079d9e02e06d0ef3b0dcbac3c787473e62e0dfd28091085c
-
Filesize
62B
MD5d1e2f8a61226bad0565f9cee05b936ee
SHA143e98474e6cdcb9264d47d2b87e9ffec688dbc46
SHA256a476ed4a9df4b6f2a35e735f308c6419cc1bc2789e587beb723a1d3c4939ac5a
SHA51243a29f4bec3ce7c9685c6e2cdfbabd63ad1c6f3ad09ced145f248cacbe305a055de8598d07337b580a3a6d5fadd69d1d21466627e7c2c2b1e5e15b5718cc80e2
-
Filesize
117KB
MD5e4e1626419fba84759a2448d184ac3d4
SHA13231f947994b1a0be6b7eab110c940e24c422afe
SHA256504cde72c802ac1835979ea7e3145742b8df308ce37dc1d355199308d02153a7
SHA512e40f92421dc76962dcc7bc6d32ce684e9afa4ea2c1587116c0515f28a504aacf9791e92f578d109c96beb5ea59610620655da35998e2ceac12562bf3916dda66