Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24987d19cdb6465e228b9ebcc77c8343.exe
Resource
win7-20231215-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
24987d19cdb6465e228b9ebcc77c8343.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
24987d19cdb6465e228b9ebcc77c8343.exe
-
Size
448KB
-
MD5
24987d19cdb6465e228b9ebcc77c8343
-
SHA1
2e17e290b6cc45f1c594c8d7c8aca34989757437
-
SHA256
2b6bf3225b5fb2f360e04d0d52ce9833ad598f33d666555a05aa4fcc4057d83e
-
SHA512
18e82b25698421a8f17d8ee99a740748dc8aa82e32482a862c965322186cb2b4ae2b8a4cc8c5193963f6ef8b1b5e274b768af02c4a890d36256cde8280bb2444
-
SSDEEP
12288:YtsyqHEPPVfDtqqCorzYxSig7z8XYavxbgfAGqsuxsAY0i:1yAYeqPElg70Yuywe/
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2940 winini.exe 2872 winhost.exe -
Loads dropped DLL 3 IoCs
pid Process 1320 24987d19cdb6465e228b9ebcc77c8343.exe 1320 24987d19cdb6465e228b9ebcc77c8343.exe 2940 winini.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Live = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winini.exe" winini.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2940 set thread context of 2872 2940 winini.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 2208 reg.exe 2684 reg.exe 2664 reg.exe 2140 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 2940 winini.exe Token: 1 2872 winhost.exe Token: SeCreateTokenPrivilege 2872 winhost.exe Token: SeAssignPrimaryTokenPrivilege 2872 winhost.exe Token: SeLockMemoryPrivilege 2872 winhost.exe Token: SeIncreaseQuotaPrivilege 2872 winhost.exe Token: SeMachineAccountPrivilege 2872 winhost.exe Token: SeTcbPrivilege 2872 winhost.exe Token: SeSecurityPrivilege 2872 winhost.exe Token: SeTakeOwnershipPrivilege 2872 winhost.exe Token: SeLoadDriverPrivilege 2872 winhost.exe Token: SeSystemProfilePrivilege 2872 winhost.exe Token: SeSystemtimePrivilege 2872 winhost.exe Token: SeProfSingleProcessPrivilege 2872 winhost.exe Token: SeIncBasePriorityPrivilege 2872 winhost.exe Token: SeCreatePagefilePrivilege 2872 winhost.exe Token: SeCreatePermanentPrivilege 2872 winhost.exe Token: SeBackupPrivilege 2872 winhost.exe Token: SeRestorePrivilege 2872 winhost.exe Token: SeShutdownPrivilege 2872 winhost.exe Token: SeDebugPrivilege 2872 winhost.exe Token: SeAuditPrivilege 2872 winhost.exe Token: SeSystemEnvironmentPrivilege 2872 winhost.exe Token: SeChangeNotifyPrivilege 2872 winhost.exe Token: SeRemoteShutdownPrivilege 2872 winhost.exe Token: SeUndockPrivilege 2872 winhost.exe Token: SeSyncAgentPrivilege 2872 winhost.exe Token: SeEnableDelegationPrivilege 2872 winhost.exe Token: SeManageVolumePrivilege 2872 winhost.exe Token: SeImpersonatePrivilege 2872 winhost.exe Token: SeCreateGlobalPrivilege 2872 winhost.exe Token: 31 2872 winhost.exe Token: 32 2872 winhost.exe Token: 33 2872 winhost.exe Token: 34 2872 winhost.exe Token: 35 2872 winhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2872 winhost.exe 2872 winhost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2940 1320 24987d19cdb6465e228b9ebcc77c8343.exe 31 PID 1320 wrote to memory of 2940 1320 24987d19cdb6465e228b9ebcc77c8343.exe 31 PID 1320 wrote to memory of 2940 1320 24987d19cdb6465e228b9ebcc77c8343.exe 31 PID 1320 wrote to memory of 2940 1320 24987d19cdb6465e228b9ebcc77c8343.exe 31 PID 2940 wrote to memory of 2872 2940 winini.exe 30 PID 2940 wrote to memory of 2872 2940 winini.exe 30 PID 2940 wrote to memory of 2872 2940 winini.exe 30 PID 2940 wrote to memory of 2872 2940 winini.exe 30 PID 2940 wrote to memory of 2872 2940 winini.exe 30 PID 2940 wrote to memory of 2872 2940 winini.exe 30 PID 2940 wrote to memory of 2872 2940 winini.exe 30 PID 2940 wrote to memory of 2872 2940 winini.exe 30 PID 2872 wrote to memory of 2916 2872 winhost.exe 29 PID 2872 wrote to memory of 2916 2872 winhost.exe 29 PID 2872 wrote to memory of 2916 2872 winhost.exe 29 PID 2872 wrote to memory of 2916 2872 winhost.exe 29 PID 2872 wrote to memory of 2788 2872 winhost.exe 28 PID 2872 wrote to memory of 2788 2872 winhost.exe 28 PID 2872 wrote to memory of 2788 2872 winhost.exe 28 PID 2872 wrote to memory of 2788 2872 winhost.exe 28 PID 2872 wrote to memory of 2648 2872 winhost.exe 26 PID 2872 wrote to memory of 2648 2872 winhost.exe 26 PID 2872 wrote to memory of 2648 2872 winhost.exe 26 PID 2872 wrote to memory of 2648 2872 winhost.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\24987d19cdb6465e228b9ebcc77c8343.exe"C:\Users\Admin\AppData\Local\Temp\24987d19cdb6465e228b9ebcc77c8343.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\winini.exe"C:\Users\Admin\AppData\Local\Temp\winini.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\VF9Q3KVYEZ.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\VF9Q3KVYEZ.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies registry key
PID:2140
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies registry key
PID:2208
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies registry key
PID:2684
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\winhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\winhost.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies registry key
PID:2664
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\VF9Q3KVYEZ.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\VF9Q3KVYEZ.exe:*:Enabled:Windows Messanger" /f1⤵PID:2908
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\winhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\winhost.exe:*:Enabled:Windows Messanger" /f1⤵PID:2788
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\winhost.exeC:\Users\Admin\AppData\Local\Temp\winhost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872