Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
59ae4f79e3ae6f4035777fbfa5e15688.exe
Resource
win7-20231215-en
General
-
Target
59ae4f79e3ae6f4035777fbfa5e15688.exe
-
Size
2.2MB
-
MD5
59ae4f79e3ae6f4035777fbfa5e15688
-
SHA1
91314991baa2d97f9e4e22f3370f29cbde65733f
-
SHA256
ca05d3ab36565eac8ea1e51defde0ed20d7dfed046e00de4808d0dc71bf51973
-
SHA512
d05b8f69c89dbc5b92173c6a32dda989d9bd404b6562f0d92789ae7d854b44118c18b6172fc5482dd98a8e6678def8c053cb83452e1ded77f2cda026d2c263bb
-
SSDEEP
49152:haPNbH/WLJpZ6xCNg1TdY4zEJ0yCHAC4fHu2+ADK/k6P1y:s48CNE2wli5DQd
Malware Config
Extracted
bitrat
1.35
storage.nsupdate.info:8973
-
communication_password
bf771c9d082071fe80b18bb678220682
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1688-28-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-31-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-39-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-42-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-44-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-37-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-51-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-35-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-56-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-57-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-60-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-58-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-62-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-63-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-64-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-65-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-66-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-67-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-68-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-69-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-70-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-71-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-72-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-73-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-74-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1688-75-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
MSBuild.exepid process 1688 MSBuild.exe 1688 MSBuild.exe 1688 MSBuild.exe 1688 MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
59ae4f79e3ae6f4035777fbfa5e15688.exedescription pid process target process PID 2920 set thread context of 1688 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
59ae4f79e3ae6f4035777fbfa5e15688.exepowershell.exepowershell.exepowershell.exepid process 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe 848 powershell.exe 2832 powershell.exe 2572 powershell.exe 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
59ae4f79e3ae6f4035777fbfa5e15688.exepowershell.exepowershell.exepowershell.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe Token: SeDebugPrivilege 848 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 1688 MSBuild.exe Token: SeShutdownPrivilege 1688 MSBuild.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MSBuild.exepid process 1688 MSBuild.exe 1688 MSBuild.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
59ae4f79e3ae6f4035777fbfa5e15688.exedescription pid process target process PID 2920 wrote to memory of 2572 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 2572 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 2572 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 2572 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 2832 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 2832 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 2832 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 2832 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 2820 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe schtasks.exe PID 2920 wrote to memory of 2820 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe schtasks.exe PID 2920 wrote to memory of 2820 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe schtasks.exe PID 2920 wrote to memory of 2820 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe schtasks.exe PID 2920 wrote to memory of 848 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 848 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 848 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 848 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe powershell.exe PID 2920 wrote to memory of 1992 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1992 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1992 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1992 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 2504 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 2504 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 2504 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 2504 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1688 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1688 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1688 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1688 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1688 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1688 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1688 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe PID 2920 wrote to memory of 1688 2920 59ae4f79e3ae6f4035777fbfa5e15688.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59ae4f79e3ae6f4035777fbfa5e15688.exe"C:\Users\Admin\AppData\Local\Temp\59ae4f79e3ae6f4035777fbfa5e15688.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\59ae4f79e3ae6f4035777fbfa5e15688.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EqgDXdibLF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EqgDXdibLF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4605.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EqgDXdibLF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4605.tmpFilesize
1KB
MD568c7c12acd320031640ac0bf86787695
SHA1e455537d9638bd4360cfe44b79cfab9bb8a67672
SHA2564c40290d21a45dd221abb9b480c021d47b91822096bad32444578afed72edae1
SHA5122f22ef3f0c432b0f21eb9ddaa52c4148114fcfbd815b1143f01e540ec3a0bcf6291412a4e5d62c0c4eabcb0bbc47202333a5c2149b6f1422b4ffdf79e46cb5d8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S69H0AAXQ61IESR50O59.tempFilesize
7KB
MD51bccb058858af793b8a80dc65176e35d
SHA1f95b3aea33e0f5f7dd0bbd66ce659a4e0f073246
SHA256178d193469a618000f7bb405aca0fa8f094dc57a1ac8d7661eb9a94cb818328b
SHA512701d02c4d997606bc21bc793b31961bc58281e6c2c2ee37c25d4e56e41b5893cdd04e8e9e1412c4166199831ba26271ddca888f4d633b4c4119d29b4c5a11741
-
memory/848-53-0x000000006F4A0000-0x000000006FA4B000-memory.dmpFilesize
5.7MB
-
memory/848-47-0x0000000002750000-0x0000000002790000-memory.dmpFilesize
256KB
-
memory/848-43-0x0000000002750000-0x0000000002790000-memory.dmpFilesize
256KB
-
memory/848-40-0x0000000002750000-0x0000000002790000-memory.dmpFilesize
256KB
-
memory/848-38-0x000000006F4A0000-0x000000006FA4B000-memory.dmpFilesize
5.7MB
-
memory/1688-60-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-37-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-75-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-25-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-74-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-28-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-73-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-72-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-34-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1688-31-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-71-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-70-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-39-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-42-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-69-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-68-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-44-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-67-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-66-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-65-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-64-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-63-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-62-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-58-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-57-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-51-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-35-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/1688-56-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/2572-46-0x0000000001DF0000-0x0000000001E30000-memory.dmpFilesize
256KB
-
memory/2572-30-0x000000006F4A0000-0x000000006FA4B000-memory.dmpFilesize
5.7MB
-
memory/2572-50-0x0000000001DF0000-0x0000000001E30000-memory.dmpFilesize
256KB
-
memory/2572-49-0x0000000001DF0000-0x0000000001E30000-memory.dmpFilesize
256KB
-
memory/2572-54-0x000000006F4A0000-0x000000006FA4B000-memory.dmpFilesize
5.7MB
-
memory/2832-52-0x000000006F4A0000-0x000000006FA4B000-memory.dmpFilesize
5.7MB
-
memory/2832-27-0x000000006F4A0000-0x000000006FA4B000-memory.dmpFilesize
5.7MB
-
memory/2832-36-0x000000006F4A0000-0x000000006FA4B000-memory.dmpFilesize
5.7MB
-
memory/2832-33-0x00000000026F0000-0x0000000002730000-memory.dmpFilesize
256KB
-
memory/2832-48-0x00000000026F0000-0x0000000002730000-memory.dmpFilesize
256KB
-
memory/2832-45-0x00000000026F0000-0x0000000002730000-memory.dmpFilesize
256KB
-
memory/2920-3-0x00000000008B0000-0x00000000008C2000-memory.dmpFilesize
72KB
-
memory/2920-2-0x0000000004F00000-0x0000000004F40000-memory.dmpFilesize
256KB
-
memory/2920-41-0x00000000746C0000-0x0000000074DAE000-memory.dmpFilesize
6.9MB
-
memory/2920-4-0x00000000746C0000-0x0000000074DAE000-memory.dmpFilesize
6.9MB
-
memory/2920-5-0x0000000004F00000-0x0000000004F40000-memory.dmpFilesize
256KB
-
memory/2920-7-0x000000000B430000-0x000000000B5AA000-memory.dmpFilesize
1.5MB
-
memory/2920-1-0x0000000000FF0000-0x000000000122A000-memory.dmpFilesize
2.2MB
-
memory/2920-0-0x00000000746C0000-0x0000000074DAE000-memory.dmpFilesize
6.9MB
-
memory/2920-6-0x0000000005E60000-0x0000000006050000-memory.dmpFilesize
1.9MB