Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
3da8f6a6e578e2e4a1197cf598aafdac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3da8f6a6e578e2e4a1197cf598aafdac.exe
Resource
win10v2004-20231215-en
General
-
Target
3da8f6a6e578e2e4a1197cf598aafdac.exe
-
Size
1.4MB
-
MD5
3da8f6a6e578e2e4a1197cf598aafdac
-
SHA1
a655c05a5703f2288ba80aee97e6fc79e1727f33
-
SHA256
1ad1481cafa95257df237f59f60272ce33d5005f208d7ed61146ae755792473a
-
SHA512
85786c5df0f6eda252e2d82596d7f64e490dc4deb38367b84cc879e76e7232791eea5859dc1e1d35d2555d8a7e3459ae2643d9a71413bde0de05b1d474bb5ce4
-
SSDEEP
24576:PXwwIoym3/BDp0tOllNRviWXSY09R1s/vwUMa5c6:PXwwIo5vBGkLCYCSJ5c
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" 3da8f6a6e578e2e4a1197cf598aafdac.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 3da8f6a6e578e2e4a1197cf598aafdac.exe -
Deletes itself 1 IoCs
pid Process 1776 notepad.exe -
Executes dropped EXE 1 IoCs
pid Process 2964 winupdate.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Wine 3da8f6a6e578e2e4a1197cf598aafdac.exe Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Wine explorer.exe Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Wine winupdate.exe -
Loads dropped DLL 4 IoCs
pid Process 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 2964 winupdate.exe 2964 winupdate.exe 2964 winupdate.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" 3da8f6a6e578e2e4a1197cf598aafdac.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" notepad.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 2964 winupdate.exe 2592 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 2592 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3da8f6a6e578e2e4a1197cf598aafdac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3da8f6a6e578e2e4a1197cf598aafdac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 3da8f6a6e578e2e4a1197cf598aafdac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 3da8f6a6e578e2e4a1197cf598aafdac.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 3da8f6a6e578e2e4a1197cf598aafdac.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 2964 winupdate.exe 2592 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeSecurityPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeTakeOwnershipPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeLoadDriverPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeSystemProfilePrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeSystemtimePrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeProfSingleProcessPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeIncBasePriorityPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeCreatePagefilePrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeBackupPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeRestorePrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeShutdownPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeDebugPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeSystemEnvironmentPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeChangeNotifyPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeRemoteShutdownPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeUndockPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeManageVolumePrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeImpersonatePrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeCreateGlobalPrivilege 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: 33 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: 34 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: 35 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe Token: SeIncreaseQuotaPrivilege 2964 winupdate.exe Token: SeSecurityPrivilege 2964 winupdate.exe Token: SeTakeOwnershipPrivilege 2964 winupdate.exe Token: SeLoadDriverPrivilege 2964 winupdate.exe Token: SeSystemProfilePrivilege 2964 winupdate.exe Token: SeSystemtimePrivilege 2964 winupdate.exe Token: SeProfSingleProcessPrivilege 2964 winupdate.exe Token: SeIncBasePriorityPrivilege 2964 winupdate.exe Token: SeCreatePagefilePrivilege 2964 winupdate.exe Token: SeBackupPrivilege 2964 winupdate.exe Token: SeRestorePrivilege 2964 winupdate.exe Token: SeShutdownPrivilege 2964 winupdate.exe Token: SeDebugPrivilege 2964 winupdate.exe Token: SeSystemEnvironmentPrivilege 2964 winupdate.exe Token: SeChangeNotifyPrivilege 2964 winupdate.exe Token: SeRemoteShutdownPrivilege 2964 winupdate.exe Token: SeUndockPrivilege 2964 winupdate.exe Token: SeManageVolumePrivilege 2964 winupdate.exe Token: SeImpersonatePrivilege 2964 winupdate.exe Token: SeCreateGlobalPrivilege 2964 winupdate.exe Token: 33 2964 winupdate.exe Token: 34 2964 winupdate.exe Token: 35 2964 winupdate.exe Token: SeIncreaseQuotaPrivilege 2592 explorer.exe Token: SeSecurityPrivilege 2592 explorer.exe Token: SeTakeOwnershipPrivilege 2592 explorer.exe Token: SeLoadDriverPrivilege 2592 explorer.exe Token: SeSystemProfilePrivilege 2592 explorer.exe Token: SeSystemtimePrivilege 2592 explorer.exe Token: SeProfSingleProcessPrivilege 2592 explorer.exe Token: SeIncBasePriorityPrivilege 2592 explorer.exe Token: SeCreatePagefilePrivilege 2592 explorer.exe Token: SeBackupPrivilege 2592 explorer.exe Token: SeRestorePrivilege 2592 explorer.exe Token: SeShutdownPrivilege 2592 explorer.exe Token: SeDebugPrivilege 2592 explorer.exe Token: SeSystemEnvironmentPrivilege 2592 explorer.exe Token: SeChangeNotifyPrivilege 2592 explorer.exe Token: SeRemoteShutdownPrivilege 2592 explorer.exe Token: SeUndockPrivilege 2592 explorer.exe Token: SeManageVolumePrivilege 2592 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2964 winupdate.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2080 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 28 PID 2528 wrote to memory of 2592 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 29 PID 2528 wrote to memory of 2592 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 29 PID 2528 wrote to memory of 2592 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 29 PID 2528 wrote to memory of 2592 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 29 PID 2528 wrote to memory of 2592 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 29 PID 2528 wrote to memory of 2592 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 29 PID 2528 wrote to memory of 2964 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 30 PID 2528 wrote to memory of 2964 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 30 PID 2528 wrote to memory of 2964 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 30 PID 2528 wrote to memory of 2964 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 30 PID 2528 wrote to memory of 2964 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 30 PID 2528 wrote to memory of 2964 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 30 PID 2528 wrote to memory of 2964 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 30 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31 PID 2528 wrote to memory of 1776 2528 3da8f6a6e578e2e4a1197cf598aafdac.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3da8f6a6e578e2e4a1197cf598aafdac.exe"C:\Users\Admin\AppData\Local\Temp\3da8f6a6e578e2e4a1197cf598aafdac.exe"1⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Adds Run key to start application
PID:2080
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe2⤵
- Deletes itself
PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD553fb487379f9bad56a4edcb6596cbe42
SHA1e619a13cea5e885443b859595a9f14a51cd7fac0
SHA256de7a6452ba060d48c5c443a12824b2f08079716efef1184780cddc95fe7cd23b
SHA5128b1e4b27bf8f731af4e4f180cab6a81a7f4b12c18c1661cce2331f1bed46821cdb100a9f3990579986d2db9925c608263bac9bfc49f9c514d472f80478cb0f4f