Analysis
-
max time kernel
151s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
43b3cb0d8ead9a35e8bcda2048c3312f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43b3cb0d8ead9a35e8bcda2048c3312f.exe
Resource
win10v2004-20231222-en
General
-
Target
43b3cb0d8ead9a35e8bcda2048c3312f.exe
-
Size
201KB
-
MD5
43b3cb0d8ead9a35e8bcda2048c3312f
-
SHA1
ba6b0d323f7a84367318bee772fe5cef0aff8c4c
-
SHA256
212289b78e550d8af514e2efe785521d8c6e439d46789993711bdfe5b0bb2e6e
-
SHA512
8d976541f6795db207b4bf56fe6298126017322d6498fb7fd7f1b34e91068784d81e43efc7df131ece0b03476479afb7c91338396002edec4452a39b00e689a2
-
SSDEEP
6144:Hza2Nj+MLxwkcWTq/81DDiSTz9nqEja3TXU0xtFb:HqEjk7l7Fb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2608 security.exe 2928 security.exe -
Loads dropped DLL 6 IoCs
pid Process 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 2608 security.exe -
resource yara_rule behavioral1/memory/392-393-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/392-399-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/392-899-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2928-902-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security = "C:\\Users\\Admin\\AppData\\Roaming\\Security\\security.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 632 set thread context of 392 632 43b3cb0d8ead9a35e8bcda2048c3312f.exe 19 PID 2608 set thread context of 2928 2608 security.exe 33 PID 2608 set thread context of 3044 2608 security.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe Token: SeDebugPrivilege 2928 security.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 632 43b3cb0d8ead9a35e8bcda2048c3312f.exe 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 2608 security.exe 2928 security.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 632 wrote to memory of 392 632 43b3cb0d8ead9a35e8bcda2048c3312f.exe 19 PID 632 wrote to memory of 392 632 43b3cb0d8ead9a35e8bcda2048c3312f.exe 19 PID 632 wrote to memory of 392 632 43b3cb0d8ead9a35e8bcda2048c3312f.exe 19 PID 632 wrote to memory of 392 632 43b3cb0d8ead9a35e8bcda2048c3312f.exe 19 PID 632 wrote to memory of 392 632 43b3cb0d8ead9a35e8bcda2048c3312f.exe 19 PID 632 wrote to memory of 392 632 43b3cb0d8ead9a35e8bcda2048c3312f.exe 19 PID 632 wrote to memory of 392 632 43b3cb0d8ead9a35e8bcda2048c3312f.exe 19 PID 632 wrote to memory of 392 632 43b3cb0d8ead9a35e8bcda2048c3312f.exe 19 PID 392 wrote to memory of 2704 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 29 PID 392 wrote to memory of 2704 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 29 PID 392 wrote to memory of 2704 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 29 PID 392 wrote to memory of 2704 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 29 PID 2704 wrote to memory of 2740 2704 cmd.exe 31 PID 2704 wrote to memory of 2740 2704 cmd.exe 31 PID 2704 wrote to memory of 2740 2704 cmd.exe 31 PID 2704 wrote to memory of 2740 2704 cmd.exe 31 PID 392 wrote to memory of 2608 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 32 PID 392 wrote to memory of 2608 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 32 PID 392 wrote to memory of 2608 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 32 PID 392 wrote to memory of 2608 392 43b3cb0d8ead9a35e8bcda2048c3312f.exe 32 PID 2608 wrote to memory of 2928 2608 security.exe 33 PID 2608 wrote to memory of 2928 2608 security.exe 33 PID 2608 wrote to memory of 2928 2608 security.exe 33 PID 2608 wrote to memory of 2928 2608 security.exe 33 PID 2608 wrote to memory of 2928 2608 security.exe 33 PID 2608 wrote to memory of 2928 2608 security.exe 33 PID 2608 wrote to memory of 2928 2608 security.exe 33 PID 2608 wrote to memory of 2928 2608 security.exe 33 PID 2608 wrote to memory of 3044 2608 security.exe 34 PID 2608 wrote to memory of 3044 2608 security.exe 34 PID 2608 wrote to memory of 3044 2608 security.exe 34 PID 2608 wrote to memory of 3044 2608 security.exe 34 PID 2608 wrote to memory of 3044 2608 security.exe 34 PID 2608 wrote to memory of 3044 2608 security.exe 34 PID 2608 wrote to memory of 3044 2608 security.exe 34 PID 2608 wrote to memory of 3044 2608 security.exe 34 PID 2608 wrote to memory of 3044 2608 security.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\43b3cb0d8ead9a35e8bcda2048c3312f.exe"C:\Users\Admin\AppData\Local\Temp\43b3cb0d8ead9a35e8bcda2048c3312f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\43b3cb0d8ead9a35e8bcda2048c3312f.exe"C:\Users\Admin\AppData\Local\Temp\43b3cb0d8ead9a35e8bcda2048c3312f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\JAVWK.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Security" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Security\security.exe" /f4⤵
- Adds Run key to start application
PID:2740
-
-
-
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Roaming\Security\security.exe"C:\Users\Admin\AppData\Roaming\Security\security.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:3044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD56f473a1ba53e043362047f72e20b34f4
SHA1e8f121a589e1207ed950453376ee1d21b1223835
SHA2565fbce2c77a90ba9edbcf60be3851ab81633b7c10b1babb624d475c7be589de4b
SHA512b4976d40bc708ae6cddf367a5382cd532e4cf235b848cdaa4e4d317e06d9126e50745a7772591bc21dc7380689f4399e57501b0aa73cd231bce32e22d53b0818
-
Filesize
201KB
MD55e7317034b96ad31d99edf9393a8fcab
SHA1fa1da9050b79389a9f91e8370f2bfc2092eb731b
SHA25693523e64a0a8b3340fb13e5179d1c092111223df22c494f366e867cbf532ee84
SHA512a46d05b0acb8a44a8b346f2c472afe07c74b45592e7b46e2e00eabcf408deba7ecc242e00d6142c82c4e4c464d7547e68cb15ab2f363a193dc8e4b6842b97f09
-
Filesize
190KB
MD5c283c26065cd205aa29501dfc2d51294
SHA19e8d73847951c7702e743a0993f89bbe8fc70e4e
SHA2566427af6b36819c33a323dea8a3cd4c1ed1e9a2578da6837e960906d2e65a04c5
SHA512f01820566725b307b4375f59f6fd52f40dd5217763e11a9060f54fd1c5a3ae02b3109bf643140ee2c81f41909c98dfbb6a8e44048b88202f6b415373a8237d1e
-
Filesize
173KB
MD58303199d069ded12e9f1ff7609198928
SHA1d95b13b31caf84f391f58927c4f6aa522d97b49d
SHA2564b99b2bee93f0b1919237f8c4e16780ccb9c2c6e268e7211199475fdd1962d20
SHA5124ef967db25d085530faed828d2bf41e654d5c290d8c8f278a7bbe8659c8c93a85cc1dc958e3605faf2c8062483f55fd6d91d03d121f2b712fcb32b6b5532ff9f
-
Filesize
179KB
MD5fda23ffa13a5dc4ba7bf9c1345a64eb3
SHA1606595fa0b442867ab437bc08d7d8a09a9ce1a1c
SHA2568cc2d92f80462c5f7b96dc892bde917e9002f18405690163dd6fe660bbb40d9a
SHA512a3c86fea5d235f6c8377024d99c2922ee87d5817813cd3a998759a676d6c63e8e48faa753049480f26c369cdb9363cc5562a0962c1ae6734e03a94b472667252
-
Filesize
7KB
MD5921e05535c0caab4db83e246abeff3b8
SHA1e9b421ed4640781dfe8421ea3010605b3cdbbc22
SHA25679bdbf13b1d53c755d2ebe6aaa41ae6849d36f9ccd5574ab4912943eef2f83a4
SHA512c4b5c07c1c308bdfe7ec2db397433460e1b16fe89f419aefb19a782cfb356443525de858ca988b5b4fc6e1c6c3fd1f6b0dc68ffa66db1c0b77c4f5ef48ed2cb2
-
Filesize
177KB
MD51c0d82bd8f3d0e24c5590086467e9c66
SHA191e05c79903b2efda3f9acb7755259fd86822b90
SHA256c68e32d14a051e7947e46c62999ab8c6872fadf1e07f1d53f108b56dc1ed5703
SHA51241f84df5b98bf002e60a438d181ce25126e8c0d0d8d17b976937fd57d21f0ef649a1eeea827fb940b914918645e7b95a293059e82501e124ac136bc300d2f165
-
Filesize
150KB
MD54569700ecb300043b2cc12c0fb7f85ab
SHA103c34b1cc74bed1ec303183681f7b46777906f52
SHA2567d1c78c444ff9b83899c2ca0a93cee3d036b9823bd14cae8c6ca9e1d02ec1394
SHA512b2f70de3368ba3a425ab9b8b9696fc5d42552387f05f3f084f28c383236d3ab4a11a42991bb7bdd883c8e85789f2aff0f7fd10fce86b6e2062b706f80f30fd85
-
Filesize
156KB
MD50da7da229f38aaa571b126ffbb6604ce
SHA1ce379d5d94b7e951c9914c5bc7c96cc0f519d080
SHA2560d7060c7e794560956ba7db109691cd566c66ab1def57b71a8cb182b0c89d594
SHA5125680dcd0e007c2c09f71b6afbe0574516d76943665a62254f4a8a7a8b3f8465ea3f2da445de169ba111d9ea6c8bb589db05fd10e89b7a779f9ad93436afc7811
-
Filesize
197KB
MD5282581402cc68f081d820c7aa98da6b7
SHA1214dd573f63a168ed6927be2de08a2ba1dfe33f0
SHA256fccd53114ebfe5c08857629a2c4a44c647eeb15b610c2bdfadf5f952e7f609eb
SHA512ecf46f7eb4b581a7cb0135c3d12a7325fa043bf2d93b7c0acb29591df4d6097648688fb2d5821595e7af2ec534eda84af15ae2757955ef57da9ed1d1fadcdc05