Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 15:04
Behavioral task
behavioral1
Sample
1df66f2519b48d352e296392dd3b2d24.exe
Resource
win7-20231215-en
11 signatures
150 seconds
General
-
Target
1df66f2519b48d352e296392dd3b2d24.exe
-
Size
13.2MB
-
MD5
1df66f2519b48d352e296392dd3b2d24
-
SHA1
c53147218b1cea16e77f1e9d49277e146a8c5052
-
SHA256
caadf28a1cb775a2a11ad018b83403078648e709e8e18cf96c3c70b2f499a59a
-
SHA512
f054df316219a99c0c3e38fcf141192f7f6022905c1d3aae481e1b5dc998b3abb7b34e800eacf978e3e30dada031c2dd465260a670b5b93e1ba5f34615792f9e
-
SSDEEP
768:c+ezP/jtEY83YKBWXALL0H4UwcHQ0BrV6HHW/:hIXeYLQP0rw8xv/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" TabIt.exe -
Executes dropped EXE 1 IoCs
pid Process 4648 TabIt.exe -
Loads dropped DLL 2 IoCs
pid Process 4648 TabIt.exe 4648 TabIt.exe -
resource yara_rule behavioral2/memory/4240-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-5-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4240-25-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-30-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-33-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-35-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-37-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-39-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-41-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-43-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-45-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-47-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-49-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-51-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-53-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-55-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4648-57-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: TabIt.exe File opened (read-only) \??\o: TabIt.exe File opened (read-only) \??\q: TabIt.exe File opened (read-only) \??\s: TabIt.exe File opened (read-only) \??\i: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\q: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\t: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\l: TabIt.exe File opened (read-only) \??\n: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\v: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\g: TabIt.exe File opened (read-only) \??\o: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\z: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\e: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\g: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\j: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\i: TabIt.exe File opened (read-only) \??\k: TabIt.exe File opened (read-only) \??\x: TabIt.exe File opened (read-only) \??\z: TabIt.exe File opened (read-only) \??\l: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\r: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\s: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\w: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\x: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\j: TabIt.exe File opened (read-only) \??\k: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\m: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\p: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\w: TabIt.exe File opened (read-only) \??\y: TabIt.exe File opened (read-only) \??\h: TabIt.exe File opened (read-only) \??\p: TabIt.exe File opened (read-only) \??\t: TabIt.exe File opened (read-only) \??\r: TabIt.exe File opened (read-only) \??\u: TabIt.exe File opened (read-only) \??\v: TabIt.exe File opened (read-only) \??\u: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\y: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\e: TabIt.exe File opened (read-only) \??\h: 1df66f2519b48d352e296392dd3b2d24.exe File opened (read-only) \??\n: TabIt.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\TabIt.exe 1df66f2519b48d352e296392dd3b2d24.exe File opened for modification C:\Program Files (x86)\Common Files\TabIt.exe 1df66f2519b48d352e296392dd3b2d24.exe File created C:\Program Files (x86)\Common Files\wjnnds.dll TabIt.exe File opened for modification C:\Program Files (x86)\Common Files\wjnnds.dll TabIt.exe File opened for modification C:\Program Files (x86)\Common Files\TabIt.exe TabIt.exe File opened for modification C:\Program Files (x86)\Common Files TabIt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4648 TabIt.exe 4648 TabIt.exe 4648 TabIt.exe 4648 TabIt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4648 TabIt.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4648 TabIt.exe 4648 TabIt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4648 4240 1df66f2519b48d352e296392dd3b2d24.exe 66 PID 4240 wrote to memory of 4648 4240 1df66f2519b48d352e296392dd3b2d24.exe 66 PID 4240 wrote to memory of 4648 4240 1df66f2519b48d352e296392dd3b2d24.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df66f2519b48d352e296392dd3b2d24.exe"C:\Users\Admin\AppData\Local\Temp\1df66f2519b48d352e296392dd3b2d24.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Common Files\TabIt.exe"C:\Program Files (x86)\Common Files\TabIt.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4648
-