Analysis
-
max time kernel
126s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:12
Behavioral task
behavioral1
Sample
2b5210cdd94d2e35817ca49e9f5c7f91.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b5210cdd94d2e35817ca49e9f5c7f91.exe
Resource
win10v2004-20231215-en
General
-
Target
2b5210cdd94d2e35817ca49e9f5c7f91.exe
-
Size
154KB
-
MD5
2b5210cdd94d2e35817ca49e9f5c7f91
-
SHA1
2c9826bed9a93d34d89777e1e823c4083ede7ba4
-
SHA256
f93464bca9354f9e9a6bdf39641ceeadb19ca79f62d1537acf17840d775ae3b6
-
SHA512
b75184bfd0760213c4347fdaf629fdb159efdc29c950f475de8f0b128a53ff396f9c1a7d1249d8408cd442884a876c7ae9ff9d96b219a2cd0d62721da0b29cb9
-
SSDEEP
1536:t1NAUwtT6sFstwrbU3rnouy8prve6Ot7ytw52e1BVRDhY0z6UcnfeskzhAXyS1Po:fgtTPFsw0jout9ve6Ot7ytMr6jzwSF
Malware Config
Signatures
-
Registers new Print Monitor 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port spoolsv.exe -
resource yara_rule behavioral1/memory/1300-0-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral1/memory/1300-9-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne01:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne01:,15,45" spoolsv.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2804 PING.EXE 2880 PING.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 2724 spoolsv.exe Token: SeRestorePrivilege 2724 spoolsv.exe Token: SeRestorePrivilege 2724 spoolsv.exe Token: SeRestorePrivilege 2724 spoolsv.exe Token: SeRestorePrivilege 2724 spoolsv.exe Token: SeRestorePrivilege 2724 spoolsv.exe Token: SeRestorePrivilege 2724 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2368 1300 2b5210cdd94d2e35817ca49e9f5c7f91.exe 17 PID 1300 wrote to memory of 2368 1300 2b5210cdd94d2e35817ca49e9f5c7f91.exe 17 PID 1300 wrote to memory of 2368 1300 2b5210cdd94d2e35817ca49e9f5c7f91.exe 17 PID 1300 wrote to memory of 2368 1300 2b5210cdd94d2e35817ca49e9f5c7f91.exe 17 PID 2368 wrote to memory of 2476 2368 cmd.exe 16 PID 2368 wrote to memory of 2476 2368 cmd.exe 16 PID 2368 wrote to memory of 2476 2368 cmd.exe 16 PID 2368 wrote to memory of 2476 2368 cmd.exe 16 PID 2476 wrote to memory of 2820 2476 net.exe 14 PID 2476 wrote to memory of 2820 2476 net.exe 14 PID 2476 wrote to memory of 2820 2476 net.exe 14 PID 2476 wrote to memory of 2820 2476 net.exe 14 PID 2368 wrote to memory of 2804 2368 cmd.exe 33 PID 2368 wrote to memory of 2804 2368 cmd.exe 33 PID 2368 wrote to memory of 2804 2368 cmd.exe 33 PID 2368 wrote to memory of 2804 2368 cmd.exe 33 PID 2368 wrote to memory of 2796 2368 cmd.exe 36 PID 2368 wrote to memory of 2796 2368 cmd.exe 36 PID 2368 wrote to memory of 2796 2368 cmd.exe 36 PID 2368 wrote to memory of 2796 2368 cmd.exe 36 PID 2796 wrote to memory of 2756 2796 net.exe 34 PID 2796 wrote to memory of 2756 2796 net.exe 34 PID 2796 wrote to memory of 2756 2796 net.exe 34 PID 2796 wrote to memory of 2756 2796 net.exe 34 PID 2368 wrote to memory of 2880 2368 cmd.exe 37 PID 2368 wrote to memory of 2880 2368 cmd.exe 37 PID 2368 wrote to memory of 2880 2368 cmd.exe 37 PID 2368 wrote to memory of 2880 2368 cmd.exe 37
Processes
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Spooler1⤵PID:2820
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵PID:2384
-
C:\Windows\SysWOW64\net.exenet stop Spooler1⤵
- Suspicious use of WriteProcessMemory
PID:2476
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\E62.tmp\ClearPrinterQueue.bat""1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 42⤵
- Runs ping.exe
PID:2804
-
-
C:\Windows\SysWOW64\net.exenet start Spooler2⤵
- Suspicious use of WriteProcessMemory
PID:2796
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 42⤵
- Runs ping.exe
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\2b5210cdd94d2e35817ca49e9f5c7f91.exe"C:\Users\Admin\AppData\Local\Temp\2b5210cdd94d2e35817ca49e9f5c7f91.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Spooler1⤵PID:2756
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Registers new Print Monitor
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD513b4eb893beae6a88874f662f10c750e
SHA1d9dad08ae3ae1e5f47d53d4d0fe6b3b9d142dd79
SHA2567821b5298cce7f46cfa93f15d6c68a2a9aa0c767b552c39cc6d60712ac1c9fc5
SHA512462e2b5661b3442492eecf44fac2a9b474774e2709d21c571946447bcbbbee9fb11e86dce9f64b3d9be1e5a210a4e9ecf8ebf8ee5887cf16a1751715d2a4464c