Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 14:24

General

  • Target

    3d165c8bcb325241eb3e05c838ec2da5.exe

  • Size

    646KB

  • MD5

    3d165c8bcb325241eb3e05c838ec2da5

  • SHA1

    54588ec7edfb46324f03d259778dee7830b4106d

  • SHA256

    35ecce484d7cc4dad1ac9436ad92922dd42c89f5ebfa8b739ff005de71f652f9

  • SHA512

    079ec0f0114a8882f17c0e54aab49f0b16b7a699a43fb3dafb7cee1250b01a7cee1130b0c878d3225f31d4f4a034427fcdffe56903fe93e625cb562cc9826b9f

  • SSDEEP

    12288:k/dr9yql7Xk+mO0FKUDTtMi1NzW/DaRMvNXx265syu4MrZ:kl8qNUyUdMONUzeosyu4M

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Disables taskbar notifications via registry modification
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies registry class 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:840
  • C:\Windows\system32\csrss.exe
    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
    1⤵
    • Executes dropped EXE
    • Drops desktop.ini file(s)
    • Suspicious use of UnmapMainImage
    PID:336
  • C:\Users\Admin\AppData\Local\Temp\3d165c8bcb325241eb3e05c838ec2da5.exe
    "C:\Users\Admin\AppData\Local\Temp\3d165c8bcb325241eb3e05c838ec2da5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Users\Admin\AppData\Local\Temp\3d165c8bcb325241eb3e05c838ec2da5.exe
      3d165c8bcb325241eb3e05c838ec2da5.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Users\Admin\g6NuH2.exe
        C:\Users\Admin\g6NuH2.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Users\Admin\haucu.exe
          "C:\Users\Admin\haucu.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2744
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del g6NuH2.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1632
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2580
      • C:\Users\Admin\adhost.exe
        C:\Users\Admin\adhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Users\Admin\adhost.exe
          adhost.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2220
      • C:\Users\Admin\bdhost.exe
        C:\Users\Admin\bdhost.exe
        3⤵
        • Modifies security service
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2356
        • C:\Users\Admin\bdhost.exe
          C:\Users\Admin\bdhost.exe startC:\Users\Admin\AppData\Roaming\72DAB\37ED3.exe%C:\Users\Admin\AppData\Roaming\72DAB
          4⤵
          • Executes dropped EXE
          PID:1692
        • C:\Users\Admin\bdhost.exe
          C:\Users\Admin\bdhost.exe startC:\Program Files (x86)\ABD7C\lvvm.exe%C:\Program Files (x86)\ABD7C
          4⤵
          • Executes dropped EXE
          PID:2036
      • C:\Users\Admin\cdhost.exe
        C:\Users\Admin\cdhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\explorer.exe
          00000054*
          4⤵
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:2676
      • C:\Users\Admin\ddhost.exe
        C:\Users\Admin\ddhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3016
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del 3d165c8bcb325241eb3e05c838ec2da5.exe
        3⤵
        • Deletes itself
        PID:1520
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2968
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\72DAB\BD7C.2DA

    Filesize

    600B

    MD5

    79ec51eeae70440cbe0496bc7d05a4d0

    SHA1

    bebde522f372ca765ed17ec4f53bd184e567b021

    SHA256

    4e811f9988d92beafdf08af493d007dcc382f0654e07b07c23c5243c4e942b15

    SHA512

    647808ca9093685765459ccadf44415cda8f2cc0e38be16e45a54cbceea3a786ad70b87f56782f398c4640e8d9b972e73c1f0a31161606f8a02c2023c774e088

  • C:\Users\Admin\AppData\Roaming\72DAB\BD7C.2DA

    Filesize

    996B

    MD5

    349eb32439d335e3fab181460344ed20

    SHA1

    023d67ed6970c04c0f4987e010ee5e4f23d6ac81

    SHA256

    80f8bffb0f02d4da70308a26c2e1e75ba48c1603db1654c9713de19ac6869f1f

    SHA512

    559a99d03b8a7862104c8129189837eda41e6bfcb712402731a9c0e989827f4e6f87231d729241a7145243eaee1b42c0f869c7f546ebc6bc3feeb93e0c77e746

  • C:\Users\Admin\AppData\Roaming\72DAB\BD7C.2DA

    Filesize

    1KB

    MD5

    1dd0c6697bde995bcfc9ae9663352aa0

    SHA1

    9dcd56c9223385613e6593d9295c0ffcf5f150be

    SHA256

    44f7edfab94787eae58f3bba00afa398003b185c62b40b4caaa13e44da2ee3f4

    SHA512

    cc4c3af0f9ad77163620ff17f2d7bc02201fb4af3b8ba6636dbf63c6051e74a8bce6983f08833dc42bebc6a04e89b59bdb75551b066a5dd441d7ac0c0513b12a

  • C:\Users\Admin\cdhost.exe

    Filesize

    118KB

    MD5

    4abe6afa1ff995b70ef6511c1f0567ae

    SHA1

    80935a41582e0fb168c37d2960dce974cab5f0ab

    SHA256

    fba532bcf20eaba48015c06e52efd121a46dffad4a293d47d1ccc6529e0beae8

    SHA512

    bd8521102317e02b91025d8f3b5976e3ea6a93b82d8ca76bc05f43ca845d92d1a206d1a2710c194a018504a1578004f154d83c26243ffa2336a19610ee51c565

  • C:\Windows\system32\consrv.DLL

    Filesize

    53KB

    MD5

    d3bd9c7e7a29daa24c66dc62cd5f5633

    SHA1

    3895247052b6244659e73334e6398677dafa0ac1

    SHA256

    6b87925d0e03ab5daa4760b1a62bed66c49cb489d011e2c9633eb0fe466df83f

    SHA512

    e243a2272887b02417b08b0d0728689c8f01cc57d473ed811ba98c2f5aa4d985d02d0fd7772bc33356474abcc815609ab7a6c0e905d6fe884fb7bc70bc67e9d0

  • \??\globalroot\systemroot\assembly\temp\@

    Filesize

    2KB

    MD5

    31a34a0bf701d4634cabc6f89322b2e5

    SHA1

    0e5aaf9956cbc38047834ca51160f0aa939c0d8c

    SHA256

    27441643a4d0ab60d3e89fd4a00228eb6f9835304b43805eb46ec02cc2b75a9a

    SHA512

    3b873de1dee245a4ab428a49a3c79de8fc517ae718496e158324b81e478c6458bd290a9bb0b7e3cd90e681804dd77cca634be039b02bcbd8c52eda4a6d9ffa2c

  • \Users\Admin\adhost.exe

    Filesize

    172KB

    MD5

    36fa3dbb1702552896cc677b5bda52dc

    SHA1

    c87f2707913047dcd2a896896fe2905b08c33985

    SHA256

    e8a3a99554c8aea64d2afa291655795896fbc14d053d3d29178c3536eee39f74

    SHA512

    9ace90bd8e81b507d2db75a493554b4a676730271883976033e4025dc6d19250070b6fd8825905e2aeea213bfc271e5d2c43a2eeca86bce0b3db497801731c53

  • \Users\Admin\bdhost.exe

    Filesize

    174KB

    MD5

    f3e286f3fc9467d3b9e56d41038b17d5

    SHA1

    3653c381586b01016a56de58d59300e431368162

    SHA256

    ec735fb26d310b803d6c4370b7cdd2a4e0f100dc442d0545f3742b3b48da5f3f

    SHA512

    0ba3b50c8dbce8da4f3a312a8f57375b102dcc7348485300b1d65fec3b6f55f62eb54e8252ddd4d73620442813731f7bfceb84c122c07a778afde76d8a642e2d

  • \Users\Admin\ddhost.exe

    Filesize

    24KB

    MD5

    71aecf19a1aec54e3d2c63f945cc6956

    SHA1

    12213f95739e45881458a7bbb429a0b7b363ccbf

    SHA256

    c98cd0c456aa393a80d81d259dc8077edaf44d833e0691054291a9ba285f74cf

    SHA512

    a8634acb97730db9415fd5cb93cb23e1adea0d19c182cf3daf423a73d76dbf7cd3ae1829a3a24fefaab8ffa3fb5e3b93662559067590c7a6779ead71b8f145e4

  • \Users\Admin\g6NuH2.exe

    Filesize

    256KB

    MD5

    be8379280ac23f08b8b091e1bc345eae

    SHA1

    bb432b69277aec39e5566ec120d6fd8fe4e0097b

    SHA256

    caf1a47f843337e61a31e6faf6745bd9fd70e14af77f171c8764ea9d2fbe9dc5

    SHA512

    d5a26da6a5ded9961cc995a8f6e53b9a97d95330654a1e1e588ddcabcf4d058fe527b1d68de057b8b73be49f4bcb64b58db229a2007c9eb5858a7f1d81ddd215

  • \Users\Admin\haucu.exe

    Filesize

    256KB

    MD5

    3e9daa2216999fd702ac81262464fa82

    SHA1

    4dcf84c57ad7c89bf96d5ead9776ada7e2b1958f

    SHA256

    c766c3cb9a1c226d6eb1a24d46ee0d0c405530bd18613f4bd9610ecef0f22d1a

    SHA512

    c7b6adc26039fa9a92e676c607f39ada13f36eb5d6f46c7aac97846db910fa86795f98df7e3c5b1a94d62f898832c13ee25753f889a0fc932b836b52f1d0291e

  • memory/336-306-0x0000000000A90000-0x0000000000AA2000-memory.dmp

    Filesize

    72KB

  • memory/688-9-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/840-389-0x00000000001F0000-0x00000000001FB000-memory.dmp

    Filesize

    44KB

  • memory/840-376-0x00000000001F0000-0x00000000001FB000-memory.dmp

    Filesize

    44KB

  • memory/840-375-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1692-99-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1692-98-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1692-253-0x0000000000570000-0x0000000000670000-memory.dmp

    Filesize

    1024KB

  • memory/1692-100-0x0000000000570000-0x0000000000670000-memory.dmp

    Filesize

    1024KB

  • memory/1724-318-0x00000000040D0000-0x00000000040D1000-memory.dmp

    Filesize

    4KB

  • memory/1724-309-0x00000000040D0000-0x00000000040D1000-memory.dmp

    Filesize

    4KB

  • memory/2036-178-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2036-179-0x0000000000500000-0x0000000000600000-memory.dmp

    Filesize

    1024KB

  • memory/2216-50-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2216-270-0x0000000000250000-0x0000000000270000-memory.dmp

    Filesize

    128KB

  • memory/2216-268-0x0000000000250000-0x0000000000270000-memory.dmp

    Filesize

    128KB

  • memory/2216-6-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2216-11-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2216-12-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2216-5-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2216-3-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2216-13-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2216-0-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2216-321-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2216-2-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2220-54-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-56-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-75-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-76-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-52-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-65-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-59-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2356-186-0x00000000005A0000-0x00000000006A0000-memory.dmp

    Filesize

    1024KB

  • memory/2356-85-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2356-86-0x00000000005A0000-0x00000000006A0000-memory.dmp

    Filesize

    1024KB

  • memory/2356-106-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2356-185-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2676-277-0x0000000000060000-0x0000000000076000-memory.dmp

    Filesize

    88KB

  • memory/2676-275-0x00000000002F0000-0x0000000000309000-memory.dmp

    Filesize

    100KB

  • memory/2732-74-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2748-42-0x00000000030F0000-0x0000000003BAA000-memory.dmp

    Filesize

    10.7MB

  • memory/2768-279-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2768-280-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2768-274-0x0000000000220000-0x000000000023B000-memory.dmp

    Filesize

    108KB

  • memory/2768-272-0x0000000000220000-0x000000000023B000-memory.dmp

    Filesize

    108KB

  • memory/2768-271-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2768-269-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB