Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
4d82b339090969beb92592c9559ca8f2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4d82b339090969beb92592c9559ca8f2.exe
Resource
win10v2004-20231222-en
General
-
Target
4d82b339090969beb92592c9559ca8f2.exe
-
Size
526KB
-
MD5
4d82b339090969beb92592c9559ca8f2
-
SHA1
aac6009791e0439cfe94749d2fb9fe962c8eac14
-
SHA256
3d48126c37845f90ea4b721441a455f42721f7f95d89314231e6cc157c0b5594
-
SHA512
d095813b09f045e9b8e3961bdf4256d918bf5fbb0357ec5ee98aa81b21ed381e74ce8af8782b73599424401e6927f49bd5a6bf2988abb620385d20dce5223799
-
SSDEEP
12288:fT56KM9fKAuxVTGAF3Z4mxxx9e8vcAezIML63HA:bUt9fK/xVdQmXTe8EAezIMWQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\Kvmon.exe -ini" 4.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 4.exe -
Loads dropped DLL 2 IoCs
pid Process 836 4d82b339090969beb92592c9559ca8f2.exe 836 4d82b339090969beb92592c9559ca8f2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4d82b339090969beb92592c9559ca8f2.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Kvmon.exe 4.exe File opened for modification C:\Windows\Kvmon.exe 4.exe File created C:\Windows\Kvmon.dll 4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2940 4.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 836 wrote to memory of 2940 836 4d82b339090969beb92592c9559ca8f2.exe 28 PID 836 wrote to memory of 2940 836 4d82b339090969beb92592c9559ca8f2.exe 28 PID 836 wrote to memory of 2940 836 4d82b339090969beb92592c9559ca8f2.exe 28 PID 836 wrote to memory of 2940 836 4d82b339090969beb92592c9559ca8f2.exe 28 PID 2940 wrote to memory of 2608 2940 4.exe 29 PID 2940 wrote to memory of 2608 2940 4.exe 29 PID 2940 wrote to memory of 2608 2940 4.exe 29 PID 2940 wrote to memory of 2608 2940 4.exe 29 PID 2940 wrote to memory of 2608 2940 4.exe 29 PID 2940 wrote to memory of 2668 2940 4.exe 30 PID 2940 wrote to memory of 2668 2940 4.exe 30 PID 2940 wrote to memory of 2668 2940 4.exe 30 PID 2940 wrote to memory of 2668 2940 4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d82b339090969beb92592c9559ca8f2.exe"C:\Users\Admin\AppData\Local\Temp\4d82b339090969beb92592c9559ca8f2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files\Internet Explorer\IEXPLORE.EXEabout:blank3⤵PID:2608
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe3⤵PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD57d521688bb974e05380fe7e958c802b8
SHA1185a22598b9dd9235fbc643e38dc2ae3ce24a667
SHA2567886ef873c46103b6ede07699fd3a20c4b2b9fa4b10fdc6f6f5755c7d293f918
SHA5129cba65ef90dd5a2510041f208914d0df70affa56bbaa55de2791645efa151c42eff1a0ea6efd16b1ad82556e248933f82e53ba8cb20c2732f879e93d78d89fa9