Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
48c54bd6bfc41a887a8f2be5eabd74cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48c54bd6bfc41a887a8f2be5eabd74cb.exe
Resource
win10v2004-20231215-en
General
-
Target
48c54bd6bfc41a887a8f2be5eabd74cb.exe
-
Size
588KB
-
MD5
48c54bd6bfc41a887a8f2be5eabd74cb
-
SHA1
eac42ed5fbec3840857b8f246040f5cb7fb1b94f
-
SHA256
c84fe4f8fc5086cb9271f6be3f7225e1b8ed2de80532d23669a79b534c033f8b
-
SHA512
105cb025d53026e9f5f96419cb26fe0eb656406dc1f0ae595d874a0c66956dd321fde5c916089b810adbe67c28ed48172941c50e7faa2086eac1f5edf9976e40
-
SSDEEP
6144:PcGfbFqB5/cWuaFT7p0Dxe5MUkHHd8m6Wb0ui+EXnWLe8:PVWe+T7paw51eHjVL
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\local.exe = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\48c54bd6bfc41a887a8f2be5eabd74cb.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 48c54bd6bfc41a887a8f2be5eabd74cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe" 48c54bd6bfc41a887a8f2be5eabd74cb.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{73EDFB6B-DB80-D244-CFEE-A5BDF9FCC0FD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe" 48c54bd6bfc41a887a8f2be5eabd74cb.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{73EDFB6B-DB80-D244-CFEE-A5BDF9FCC0FD} 48c54bd6bfc41a887a8f2be5eabd74cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Active Setup\Installed Components\{73EDFB6B-DB80-D244-CFEE-A5BDF9FCC0FD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe" 48c54bd6bfc41a887a8f2be5eabd74cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{73EDFB6B-DB80-D244-CFEE-A5BDF9FCC0FD} 48c54bd6bfc41a887a8f2be5eabd74cb.exe -
resource yara_rule behavioral1/memory/2368-19-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-20-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-23-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-25-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-27-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-26-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-36-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-37-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-39-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-46-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-49-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-51-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-53-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-56-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-60-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-63-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-65-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2368-67-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe" 48c54bd6bfc41a887a8f2be5eabd74cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe" 48c54bd6bfc41a887a8f2be5eabd74cb.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 48c54bd6bfc41a887a8f2be5eabd74cb.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2232 set thread context of 1872 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 28 PID 1872 set thread context of 2368 1872 48c54bd6bfc41a887a8f2be5eabd74cb.exe 29 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2828 reg.exe 2740 reg.exe 2716 reg.exe 2776 reg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeCreateTokenPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeAssignPrimaryTokenPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeLockMemoryPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeIncreaseQuotaPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeMachineAccountPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeTcbPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeSecurityPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeTakeOwnershipPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeLoadDriverPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeSystemProfilePrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeSystemtimePrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeProfSingleProcessPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeIncBasePriorityPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeCreatePagefilePrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeCreatePermanentPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeBackupPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeRestorePrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeShutdownPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeDebugPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeAuditPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeSystemEnvironmentPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeChangeNotifyPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeRemoteShutdownPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeUndockPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeSyncAgentPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeEnableDelegationPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeManageVolumePrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeImpersonatePrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeCreateGlobalPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: 31 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: 32 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: 33 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: 34 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: 35 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe Token: SeDebugPrivilege 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 1872 48c54bd6bfc41a887a8f2be5eabd74cb.exe 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1872 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 28 PID 2232 wrote to memory of 1872 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 28 PID 2232 wrote to memory of 1872 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 28 PID 2232 wrote to memory of 1872 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 28 PID 2232 wrote to memory of 1872 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 28 PID 2232 wrote to memory of 1872 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 28 PID 2232 wrote to memory of 1872 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 28 PID 2232 wrote to memory of 1872 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 28 PID 2232 wrote to memory of 1872 2232 48c54bd6bfc41a887a8f2be5eabd74cb.exe 28 PID 1872 wrote to memory of 2368 1872 48c54bd6bfc41a887a8f2be5eabd74cb.exe 29 PID 1872 wrote to memory of 2368 1872 48c54bd6bfc41a887a8f2be5eabd74cb.exe 29 PID 1872 wrote to memory of 2368 1872 48c54bd6bfc41a887a8f2be5eabd74cb.exe 29 PID 1872 wrote to memory of 2368 1872 48c54bd6bfc41a887a8f2be5eabd74cb.exe 29 PID 1872 wrote to memory of 2368 1872 48c54bd6bfc41a887a8f2be5eabd74cb.exe 29 PID 1872 wrote to memory of 2368 1872 48c54bd6bfc41a887a8f2be5eabd74cb.exe 29 PID 1872 wrote to memory of 2368 1872 48c54bd6bfc41a887a8f2be5eabd74cb.exe 29 PID 1872 wrote to memory of 2368 1872 48c54bd6bfc41a887a8f2be5eabd74cb.exe 29 PID 2368 wrote to memory of 2872 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 41 PID 2368 wrote to memory of 2872 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 41 PID 2368 wrote to memory of 2872 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 41 PID 2368 wrote to memory of 2872 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 41 PID 2368 wrote to memory of 2756 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 40 PID 2368 wrote to memory of 2756 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 40 PID 2368 wrote to memory of 2756 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 40 PID 2368 wrote to memory of 2756 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 40 PID 2368 wrote to memory of 2708 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 39 PID 2368 wrote to memory of 2708 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 39 PID 2368 wrote to memory of 2708 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 39 PID 2368 wrote to memory of 2708 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 39 PID 2368 wrote to memory of 2020 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 37 PID 2368 wrote to memory of 2020 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 37 PID 2368 wrote to memory of 2020 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 37 PID 2368 wrote to memory of 2020 2368 48c54bd6bfc41a887a8f2be5eabd74cb.exe 37 PID 2020 wrote to memory of 2716 2020 cmd.exe 30 PID 2020 wrote to memory of 2716 2020 cmd.exe 30 PID 2020 wrote to memory of 2716 2020 cmd.exe 30 PID 2020 wrote to memory of 2716 2020 cmd.exe 30 PID 2756 wrote to memory of 2776 2756 cmd.exe 31 PID 2756 wrote to memory of 2776 2756 cmd.exe 31 PID 2756 wrote to memory of 2776 2756 cmd.exe 31 PID 2756 wrote to memory of 2776 2756 cmd.exe 31 PID 2708 wrote to memory of 2740 2708 cmd.exe 33 PID 2708 wrote to memory of 2740 2708 cmd.exe 33 PID 2708 wrote to memory of 2740 2708 cmd.exe 33 PID 2708 wrote to memory of 2740 2708 cmd.exe 33 PID 2872 wrote to memory of 2828 2872 cmd.exe 32 PID 2872 wrote to memory of 2828 2872 cmd.exe 32 PID 2872 wrote to memory of 2828 2872 cmd.exe 32 PID 2872 wrote to memory of 2828 2872 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe"C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe"C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe"C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe"3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\local.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2020
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2708
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2756
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2872
-
-
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\local.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:2716
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\48c54bd6bfc41a887a8f2be5eabd74cb.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:2776
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:2828
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:2740
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1