Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
465e2c70a110fa365faca85de8d81e43.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
465e2c70a110fa365faca85de8d81e43.exe
Resource
win10v2004-20231215-en
General
-
Target
465e2c70a110fa365faca85de8d81e43.exe
-
Size
67KB
-
MD5
465e2c70a110fa365faca85de8d81e43
-
SHA1
9fdc92ab8961a0d6630ba208b8b9f15b2a25bd28
-
SHA256
caa6f0c7b05f2459a4b58498f3078270cb79879ff95b499d1626c09a61fe93e8
-
SHA512
c1aa4cc877aefa2f7ca863b607d25a4711f1e1fe1c34fde504fe7918a5e79ceeea53e4d19ecaf7f6ff6cd760af82862f3bc20bfecec182898fe4f66bd046a155
-
SSDEEP
1536:HuHBOqDdUwC2AVH+wDxPDsUnKntZ+EWAnTj42LoFLMBN:OLJ8Fhu+rkeMP
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 465e2c70a110fa365faca85de8d81e43.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 465e2c70a110fa365faca85de8d81e43.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 465e2c70a110fa365faca85de8d81e43.exe -
Sets file execution options in registry 2 TTPs 48 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcsched.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "verclsid.exe" 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Licwiz.exe 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ndfedit.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcod.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\niu.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Delnvc5.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Delnvc5.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "verclsid.exe" 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlh.exe 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\elogsvc.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zanda.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwscl.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nse.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcoas.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ndfedit.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nren.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nwscl.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcc.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcc.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcte.exe 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcut.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlh.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zanda.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\elogsvc.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nse.exe 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvccx.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvccx.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcut.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Licwiz.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ninfo.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\niu.exe 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcod.exe 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcsched.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\elogger.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvccf.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CClaw.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nip.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CClaw.exe 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nip.exe 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcoas.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvcte.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\elogger.exe 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ninfo.exe 465e2c70a110fa365faca85de8d81e43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nren.exe 465e2c70a110fa365faca85de8d81e43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nvccf.exe\Debugger = "cmd.exe /c del /f /q " 465e2c70a110fa365faca85de8d81e43.exe -
Executes dropped EXE 2 IoCs
pid Process 2508 mplayerc.exe 2624 mplayerc.exe -
Loads dropped DLL 2 IoCs
pid Process 2868 465e2c70a110fa365faca85de8d81e43.exe 2508 mplayerc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MediaPlayerClassic = "C:\\Program Files (x86)\\K-Lite\\mplayerc.exe" 465e2c70a110fa365faca85de8d81e43.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 465e2c70a110fa365faca85de8d81e43.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\mIRC\mirc.ini 465e2c70a110fa365faca85de8d81e43.exe File opened for modification C:\Program Files (x86)\mIRC\script.ini 465e2c70a110fa365faca85de8d81e43.exe File opened for modification C:\Program Files (x86)\K-Lite mplayerc.exe File opened for modification C:\Program Files (x86)\K-Lite\mplayerc.exe 465e2c70a110fa365faca85de8d81e43.exe File opened for modification C:\Program Files (x86)\K-Lite 465e2c70a110fa365faca85de8d81e43.exe File opened for modification C:\Program Files (x86)\K-Lite\mplayerc.exe mplayerc.exe File opened for modification C:\Program Files (x86)\mIRC\mirc.ini 465e2c70a110fa365faca85de8d81e43.exe File created C:\Program Files (x86)\mIRC\script.ini 465e2c70a110fa365faca85de8d81e43.exe File opened for modification C:\Program Files (x86)\mIRC\aliases.ini 465e2c70a110fa365faca85de8d81e43.exe File created C:\Program Files (x86)\mIRC\aliases.ini 465e2c70a110fa365faca85de8d81e43.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1272 REG.exe 3028 REG.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2336 ping.exe 2592 ping.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2868 465e2c70a110fa365faca85de8d81e43.exe 2508 mplayerc.exe 2624 mplayerc.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2868 wrote to memory of 3028 2868 465e2c70a110fa365faca85de8d81e43.exe 28 PID 2868 wrote to memory of 3028 2868 465e2c70a110fa365faca85de8d81e43.exe 28 PID 2868 wrote to memory of 3028 2868 465e2c70a110fa365faca85de8d81e43.exe 28 PID 2868 wrote to memory of 3028 2868 465e2c70a110fa365faca85de8d81e43.exe 28 PID 2868 wrote to memory of 2592 2868 465e2c70a110fa365faca85de8d81e43.exe 26 PID 2868 wrote to memory of 2592 2868 465e2c70a110fa365faca85de8d81e43.exe 26 PID 2868 wrote to memory of 2592 2868 465e2c70a110fa365faca85de8d81e43.exe 26 PID 2868 wrote to memory of 2592 2868 465e2c70a110fa365faca85de8d81e43.exe 26 PID 2868 wrote to memory of 2336 2868 465e2c70a110fa365faca85de8d81e43.exe 25 PID 2868 wrote to memory of 2336 2868 465e2c70a110fa365faca85de8d81e43.exe 25 PID 2868 wrote to memory of 2336 2868 465e2c70a110fa365faca85de8d81e43.exe 25 PID 2868 wrote to memory of 2336 2868 465e2c70a110fa365faca85de8d81e43.exe 25 PID 2868 wrote to memory of 1660 2868 465e2c70a110fa365faca85de8d81e43.exe 23 PID 2868 wrote to memory of 1660 2868 465e2c70a110fa365faca85de8d81e43.exe 23 PID 2868 wrote to memory of 1660 2868 465e2c70a110fa365faca85de8d81e43.exe 23 PID 2868 wrote to memory of 1660 2868 465e2c70a110fa365faca85de8d81e43.exe 23 PID 1660 wrote to memory of 2196 1660 wmplayer.exe 21 PID 1660 wrote to memory of 2196 1660 wmplayer.exe 21 PID 1660 wrote to memory of 2196 1660 wmplayer.exe 21 PID 1660 wrote to memory of 2196 1660 wmplayer.exe 21 PID 1660 wrote to memory of 2196 1660 wmplayer.exe 21 PID 1660 wrote to memory of 2196 1660 wmplayer.exe 21 PID 1660 wrote to memory of 2196 1660 wmplayer.exe 21 PID 2868 wrote to memory of 1272 2868 465e2c70a110fa365faca85de8d81e43.exe 20 PID 2868 wrote to memory of 1272 2868 465e2c70a110fa365faca85de8d81e43.exe 20 PID 2868 wrote to memory of 1272 2868 465e2c70a110fa365faca85de8d81e43.exe 20 PID 2868 wrote to memory of 1272 2868 465e2c70a110fa365faca85de8d81e43.exe 20 PID 2868 wrote to memory of 2508 2868 465e2c70a110fa365faca85de8d81e43.exe 19 PID 2868 wrote to memory of 2508 2868 465e2c70a110fa365faca85de8d81e43.exe 19 PID 2868 wrote to memory of 2508 2868 465e2c70a110fa365faca85de8d81e43.exe 19 PID 2868 wrote to memory of 2508 2868 465e2c70a110fa365faca85de8d81e43.exe 19 PID 2508 wrote to memory of 2624 2508 mplayerc.exe 18 PID 2508 wrote to memory of 2624 2508 mplayerc.exe 18 PID 2508 wrote to memory of 2624 2508 mplayerc.exe 18 PID 2508 wrote to memory of 2624 2508 mplayerc.exe 18 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 465e2c70a110fa365faca85de8d81e43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 465e2c70a110fa365faca85de8d81e43.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\465e2c70a110fa365faca85de8d81e43.exe"C:\Users\Admin\AppData\Local\Temp\465e2c70a110fa365faca85de8d81e43.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2868 -
C:\Program Files (x86)\K-Lite\mplayerc.exe"C:\Program Files (x86)\K-Lite\mplayerc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Modifies registry key
PID:1272
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1660
-
-
C:\Windows\SysWOW64\ping.exeping www.bok3p.com -n 996699 -l 13302⤵
- Runs ping.exe
PID:2336
-
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 996699 -l 13302⤵
- Runs ping.exe
PID:2592
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Modifies registry key
PID:3028
-
-
C:\Program Files (x86)\K-Lite\mplayerc.exe"C:\Program Files (x86)\K-Lite\mplayerc.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624
-
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"1⤵PID:2196
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5b3c28423fa8c8df40890db6607a58649
SHA12c68e8c6f695f4d05a49c8d1593bb1d21391a7c4
SHA256a4a5fe5dd5b9e54c25709af5368257f48888ac2c15fdbd574d6bfb05b27d033b
SHA5125f2ed5c8443805579be104a034796abc1f61be830e5779e4ed290ad30f0659a3d61b529968c929ae2037920458751d2504f028e6e6b8c9e880b2beffbebddad7