Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
e75d27a4dec7334e548a776a58137877.exe
Resource
win7-20231215-en
General
-
Target
e75d27a4dec7334e548a776a58137877.exe
-
Size
318KB
-
MD5
e75d27a4dec7334e548a776a58137877
-
SHA1
85e46d71cd015e4714459d2fe73f6c9a066199f5
-
SHA256
5e9b31834d9951e950f884bea2a45bafb99c1761fbb8b7be4301467f55795d1a
-
SHA512
28669e18a2ea427fa90f11ec4ed5f024bd3a28a4602bfe091fc6155e3b2f170f9f7f245a0912aa6cca627c6bc9802d4b39a75043c57d6d5e4c4ac3896710755f
-
SSDEEP
6144:TKjZaimwIqlazWEIBk4ZAs3CaYo/TRg4w6kT1kYftg5d672:dZqIzW35RFn9g311kYfi6K
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2776 explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 2776 explorer.exe 2592 nvxdsinc.exe 568 nwtray.exe -
Loads dropped DLL 6 IoCs
pid Process 2904 e75d27a4dec7334e548a776a58137877.exe 2904 e75d27a4dec7334e548a776a58137877.exe 2776 explorer.exe 2776 explorer.exe 2592 nvxdsinc.exe 2592 nvxdsinc.exe -
resource yara_rule behavioral1/memory/2608-26-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-28-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-32-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-33-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-34-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-43-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-49-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-51-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-52-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-56-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-58-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2608-60-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/568-59-0x00000000004A0000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2608-79-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\nvxdsinc.exe" nvxdsinc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2776 set thread context of 2608 2776 explorer.exe 29 PID 568 set thread context of 1496 568 nwtray.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2776 explorer.exe 2592 nvxdsinc.exe 2776 explorer.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe 2776 explorer.exe 568 nwtray.exe 2592 nvxdsinc.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 2904 e75d27a4dec7334e548a776a58137877.exe Token: SeDebugPrivilege 2776 explorer.exe Token: SeDebugPrivilege 2592 nvxdsinc.exe Token: SeIncreaseQuotaPrivilege 2608 AppLaunch.exe Token: SeSecurityPrivilege 2608 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2608 AppLaunch.exe Token: SeLoadDriverPrivilege 2608 AppLaunch.exe Token: SeSystemProfilePrivilege 2608 AppLaunch.exe Token: SeSystemtimePrivilege 2608 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2608 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2608 AppLaunch.exe Token: SeCreatePagefilePrivilege 2608 AppLaunch.exe Token: SeBackupPrivilege 2608 AppLaunch.exe Token: SeRestorePrivilege 2608 AppLaunch.exe Token: SeShutdownPrivilege 2608 AppLaunch.exe Token: SeDebugPrivilege 2608 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2608 AppLaunch.exe Token: SeChangeNotifyPrivilege 2608 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2608 AppLaunch.exe Token: SeUndockPrivilege 2608 AppLaunch.exe Token: SeManageVolumePrivilege 2608 AppLaunch.exe Token: SeImpersonatePrivilege 2608 AppLaunch.exe Token: SeCreateGlobalPrivilege 2608 AppLaunch.exe Token: 33 2608 AppLaunch.exe Token: 34 2608 AppLaunch.exe Token: 35 2608 AppLaunch.exe Token: SeDebugPrivilege 568 nwtray.exe Token: SeIncreaseQuotaPrivilege 1496 AppLaunch.exe Token: SeSecurityPrivilege 1496 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1496 AppLaunch.exe Token: SeLoadDriverPrivilege 1496 AppLaunch.exe Token: SeSystemProfilePrivilege 1496 AppLaunch.exe Token: SeSystemtimePrivilege 1496 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1496 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1496 AppLaunch.exe Token: SeCreatePagefilePrivilege 1496 AppLaunch.exe Token: SeBackupPrivilege 1496 AppLaunch.exe Token: SeRestorePrivilege 1496 AppLaunch.exe Token: SeShutdownPrivilege 1496 AppLaunch.exe Token: SeDebugPrivilege 1496 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1496 AppLaunch.exe Token: SeChangeNotifyPrivilege 1496 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1496 AppLaunch.exe Token: SeUndockPrivilege 1496 AppLaunch.exe Token: SeManageVolumePrivilege 1496 AppLaunch.exe Token: SeImpersonatePrivilege 1496 AppLaunch.exe Token: SeCreateGlobalPrivilege 1496 AppLaunch.exe Token: 33 1496 AppLaunch.exe Token: 34 1496 AppLaunch.exe Token: 35 1496 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2608 AppLaunch.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2776 2904 e75d27a4dec7334e548a776a58137877.exe 28 PID 2904 wrote to memory of 2776 2904 e75d27a4dec7334e548a776a58137877.exe 28 PID 2904 wrote to memory of 2776 2904 e75d27a4dec7334e548a776a58137877.exe 28 PID 2904 wrote to memory of 2776 2904 e75d27a4dec7334e548a776a58137877.exe 28 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2608 2776 explorer.exe 29 PID 2776 wrote to memory of 2592 2776 explorer.exe 30 PID 2776 wrote to memory of 2592 2776 explorer.exe 30 PID 2776 wrote to memory of 2592 2776 explorer.exe 30 PID 2776 wrote to memory of 2592 2776 explorer.exe 30 PID 2592 wrote to memory of 568 2592 nvxdsinc.exe 31 PID 2592 wrote to memory of 568 2592 nvxdsinc.exe 31 PID 2592 wrote to memory of 568 2592 nvxdsinc.exe 31 PID 2592 wrote to memory of 568 2592 nvxdsinc.exe 31 PID 568 wrote to memory of 1496 568 nwtray.exe 32 PID 568 wrote to memory of 1496 568 nwtray.exe 32 PID 568 wrote to memory of 1496 568 nwtray.exe 32 PID 568 wrote to memory of 1496 568 nwtray.exe 32 PID 568 wrote to memory of 1496 568 nwtray.exe 32 PID 568 wrote to memory of 1496 568 nwtray.exe 32 PID 568 wrote to memory of 1496 568 nwtray.exe 32 PID 568 wrote to memory of 1496 568 nwtray.exe 32 PID 568 wrote to memory of 1496 568 nwtray.exe 32 PID 568 wrote to memory of 1496 568 nwtray.exe 32 PID 568 wrote to memory of 1496 568 nwtray.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e75d27a4dec7334e548a776a58137877.exe"C:\Users\Admin\AppData\Local\Temp\e75d27a4dec7334e548a776a58137877.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70B
MD510f8e5ef710815f8042993d8a493148c
SHA1ca1311ec6a490dd0cae48a970d9bd52347c26a66
SHA2568b388565259a47221d1ea8753f40c174862c43b0e097026e8e99c7d785aaaea8
SHA512d81dbf5ede3ae69894fecd63201b1b8b7b5529396643dda74ec96b415d7e50fb53dedf2b784f28e014d61892bd90b41d50f94aa1cad2a6b874c610c79826a157
-
Filesize
39KB
MD538abcaec6ee62213f90b1717d830a1bb
SHA1d8f5849d0d3f4ccc0dfb66a9a4a0442ac66a31b9
SHA2566fee9a2c70b2cc48b0812f7cb2e09497c9c90941976f430a8f8279ad3c787768
SHA51277eaabcbc6f7a3835b6220d72c4b1cae82d2125ea971907e33b15ceeede7e4da0741c6e63e988bd782ed6eb72ad3cbcba10ea83919eafd9b95d612c43a735274
-
Filesize
318KB
MD5e75d27a4dec7334e548a776a58137877
SHA185e46d71cd015e4714459d2fe73f6c9a066199f5
SHA2565e9b31834d9951e950f884bea2a45bafb99c1761fbb8b7be4301467f55795d1a
SHA51228669e18a2ea427fa90f11ec4ed5f024bd3a28a4602bfe091fc6155e3b2f170f9f7f245a0912aa6cca627c6bc9802d4b39a75043c57d6d5e4c4ac3896710755f