Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:07
Behavioral task
behavioral1
Sample
278353d75d65518b2e314e11f78a80d5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
278353d75d65518b2e314e11f78a80d5.exe
Resource
win10v2004-20231222-en
General
-
Target
278353d75d65518b2e314e11f78a80d5.exe
-
Size
9KB
-
MD5
278353d75d65518b2e314e11f78a80d5
-
SHA1
4e75e986a763dabce1ae5b78cfeb25e8c682228a
-
SHA256
3d4869eb1194f6443ed82497639778bdec6144c68fa619ee5db28f40cac88767
-
SHA512
abca3dd3240a59d419052c5fa28b5b2d22d6e430f57d9c12a8683260d9e41fc4fa8e3eea483ee0e0292e1fddbaae9f70f97ef78349e6ee384d74abd226d1e2d1
-
SSDEEP
192:Tb5OGSHUawxokr597j9/lhntUASVgqSB:TFO8apGRjtxVSsB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 278353d75d65518b2e314e11f78a80d5.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\spools.exe 278353d75d65518b2e314e11f78a80d5.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 278353d75d65518b2e314e11f78a80d5.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" 278353d75d65518b2e314e11f78a80d5.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Users\\Admin\\cftmon.exe \"%1\" %*" 278353d75d65518b2e314e11f78a80d5.exe -
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2232-3-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 278353d75d65518b2e314e11f78a80d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" 278353d75d65518b2e314e11f78a80d5.exe Key deleted \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\cftmon.exe" 278353d75d65518b2e314e11f78a80d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 278353d75d65518b2e314e11f78a80d5.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects reg.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" 278353d75d65518b2e314e11f78a80d5.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Users\\Admin\\cftmon.exe \"%1\" %*" 278353d75d65518b2e314e11f78a80d5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2856 2232 278353d75d65518b2e314e11f78a80d5.exe 28 PID 2232 wrote to memory of 2856 2232 278353d75d65518b2e314e11f78a80d5.exe 28 PID 2232 wrote to memory of 2856 2232 278353d75d65518b2e314e11f78a80d5.exe 28 PID 2232 wrote to memory of 2856 2232 278353d75d65518b2e314e11f78a80d5.exe 28 PID 2232 wrote to memory of 2516 2232 278353d75d65518b2e314e11f78a80d5.exe 29 PID 2232 wrote to memory of 2516 2232 278353d75d65518b2e314e11f78a80d5.exe 29 PID 2232 wrote to memory of 2516 2232 278353d75d65518b2e314e11f78a80d5.exe 29 PID 2232 wrote to memory of 2516 2232 278353d75d65518b2e314e11f78a80d5.exe 29 PID 2232 wrote to memory of 2776 2232 278353d75d65518b2e314e11f78a80d5.exe 32 PID 2232 wrote to memory of 2776 2232 278353d75d65518b2e314e11f78a80d5.exe 32 PID 2232 wrote to memory of 2776 2232 278353d75d65518b2e314e11f78a80d5.exe 32 PID 2232 wrote to memory of 2776 2232 278353d75d65518b2e314e11f78a80d5.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\278353d75d65518b2e314e11f78a80d5.exe"C:\Users\Admin\AppData\Local\Temp\278353d75d65518b2e314e11f78a80d5.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Sets service image path in registry
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies WinLogon
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f2⤵
- Installs/modifies Browser Helper Object
PID:2856
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f2⤵
- Adds Run key to start application
PID:2516
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f2⤵
- Adds Run key to start application
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Browser Extensions
1Event Triggered Execution
1Change Default File Association
1