Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
3d75910c5f6945e5c4aecfeeb39fc40b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d75910c5f6945e5c4aecfeeb39fc40b.exe
Resource
win10v2004-20231222-en
General
-
Target
3d75910c5f6945e5c4aecfeeb39fc40b.exe
-
Size
182KB
-
MD5
3d75910c5f6945e5c4aecfeeb39fc40b
-
SHA1
fdcc07b0b2d53735dd07918e3f8e3410611e6178
-
SHA256
d9491b5790f39262d16d716788ddf8731ee27f86ace6e10cebf62cb6a5070c94
-
SHA512
74de743ab34f6f4ba8f9e711184573f824eb9c9889660d69a94d7ec9b3e12b32c3315e2f0e313b4ba0c6f8a09a0b25ff5d29df90faadd9984fb4ab8e481a0996
-
SSDEEP
3072:+nZanaRQGDr9/Ou0EneMP5J3VzvrshGkvLWClAab6k46Zq7S6Qrg:IcnaCm1OMeIJ3GLLtrXhUSt
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\help\B41346EFA848.dll 3d75910c5f6945e5c4aecfeeb39fc40b.exe File opened for modification C:\Windows\help\B41346EFA848.dll 3d75910c5f6945e5c4aecfeeb39fc40b.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\ = "SSUUDL" 3d75910c5f6945e5c4aecfeeb39fc40b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32 3d75910c5f6945e5c4aecfeeb39fc40b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ = "C:\\Windows\\help\\B41346EFA848.dll" 3d75910c5f6945e5c4aecfeeb39fc40b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ThreadingModel = "Apartment" 3d75910c5f6945e5c4aecfeeb39fc40b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765} 3d75910c5f6945e5c4aecfeeb39fc40b.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeRestorePrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeRestorePrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeRestorePrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeRestorePrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeRestorePrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeBackupPrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeRestorePrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeRestorePrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeRestorePrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeRestorePrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe Token: SeRestorePrivilege 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1556 wrote to memory of 2840 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe 27 PID 1556 wrote to memory of 2840 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe 27 PID 1556 wrote to memory of 2840 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe 27 PID 1556 wrote to memory of 2840 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe 27 PID 1556 wrote to memory of 2572 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe 32 PID 1556 wrote to memory of 2572 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe 32 PID 1556 wrote to memory of 2572 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe 32 PID 1556 wrote to memory of 2572 1556 3d75910c5f6945e5c4aecfeeb39fc40b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d75910c5f6945e5c4aecfeeb39fc40b.exe"C:\Users\Admin\AppData\Local\Temp\3d75910c5f6945e5c4aecfeeb39fc40b.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:2840
-
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:2572
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5e533642619b3d7a825a8af4a7891ebc0
SHA1db4b4872cdcf032f52ac99b846f8106e09a9d10f
SHA2568a5acaedb3906baa4b576a19daa833e48d9a3327596900bf2c18831cebc745e7
SHA512edfa8ce119048d182d8fea748c4622e6f71687a29444424df052fadcf0a8009bb8219c9686785749079d9e02e06d0ef3b0dcbac3c787473e62e0dfd28091085c
-
Filesize
62B
MD5d1e2f8a61226bad0565f9cee05b936ee
SHA143e98474e6cdcb9264d47d2b87e9ffec688dbc46
SHA256a476ed4a9df4b6f2a35e735f308c6419cc1bc2789e587beb723a1d3c4939ac5a
SHA51243a29f4bec3ce7c9685c6e2cdfbabd63ad1c6f3ad09ced145f248cacbe305a055de8598d07337b580a3a6d5fadd69d1d21466627e7c2c2b1e5e15b5718cc80e2
-
Filesize
101KB
MD55b23543c1d2baa4ec132d56ffda6e6f1
SHA168b947a3d99503084b8d3ecde5a3b19ca63fe3df
SHA256c7b588d34e7981867ba0cd058126d9ea0fe1c0508a89d3017629a2b8857fbb15
SHA51257760b4460c91d63805f638b41fa88732d852b6d360f3992a1364e8a3926be571184318052ea24037dc390297592c091673ee2bce7808e0b6429149d1689eae9