Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-01-2024 02:47
Static task
static1
Behavioral task
behavioral1
Sample
618b42e14d1b6476e4880d99ca6fa8dd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
618b42e14d1b6476e4880d99ca6fa8dd.exe
Resource
win10v2004-20231222-en
General
-
Target
618b42e14d1b6476e4880d99ca6fa8dd.exe
-
Size
2.0MB
-
MD5
618b42e14d1b6476e4880d99ca6fa8dd
-
SHA1
c939cb3334a913567607b6f85f3b86278b7a9267
-
SHA256
9c6984f9235508550479de6e3c40425ccfd0513a5f7718da2df0c2f7859fc55f
-
SHA512
09c73eb8b226cbcea440329bac4b50f1bfee9078ddbd32fce6cad914a849f1d0f97f087d218de43f6e75b50e26bbf5a1625598975deaac290c94e58caccd62ca
-
SSDEEP
49152:CdWbX42j7fxTxJkiFLIe3xlkG31GyXygHheYNr1IVZQT:CdWbX4srBxJlFEe3x+85HhTNr1IVZQT
Malware Config
Extracted
bitrat
1.38
162.33.178.83:6969
-
communication_password
1d85fa3449602b11c72669aa360263fb
-
tor_process
tor
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Google\\Chrome.exe\"," 618b42e14d1b6476e4880d99ca6fa8dd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2900 618b42e14d1b6476e4880d99ca6fa8dd.exe 2900 618b42e14d1b6476e4880d99ca6fa8dd.exe 2900 618b42e14d1b6476e4880d99ca6fa8dd.exe 2900 618b42e14d1b6476e4880d99ca6fa8dd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1712 set thread context of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2044 powershell.exe 2496 powershell.exe 2476 powershell.exe 1756 powershell.exe 820 powershell.exe 2640 powershell.exe 2700 powershell.exe 1444 powershell.exe 1768 powershell.exe 2152 powershell.exe 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2044 powershell.exe Token: SeIncreaseQuotaPrivilege 2044 powershell.exe Token: SeSecurityPrivilege 2044 powershell.exe Token: SeTakeOwnershipPrivilege 2044 powershell.exe Token: SeLoadDriverPrivilege 2044 powershell.exe Token: SeSystemProfilePrivilege 2044 powershell.exe Token: SeSystemtimePrivilege 2044 powershell.exe Token: SeProfSingleProcessPrivilege 2044 powershell.exe Token: SeIncBasePriorityPrivilege 2044 powershell.exe Token: SeCreatePagefilePrivilege 2044 powershell.exe Token: SeBackupPrivilege 2044 powershell.exe Token: SeRestorePrivilege 2044 powershell.exe Token: SeShutdownPrivilege 2044 powershell.exe Token: SeDebugPrivilege 2044 powershell.exe Token: SeSystemEnvironmentPrivilege 2044 powershell.exe Token: SeRemoteShutdownPrivilege 2044 powershell.exe Token: SeUndockPrivilege 2044 powershell.exe Token: SeManageVolumePrivilege 2044 powershell.exe Token: 33 2044 powershell.exe Token: 34 2044 powershell.exe Token: 35 2044 powershell.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeIncreaseQuotaPrivilege 2496 powershell.exe Token: SeSecurityPrivilege 2496 powershell.exe Token: SeTakeOwnershipPrivilege 2496 powershell.exe Token: SeLoadDriverPrivilege 2496 powershell.exe Token: SeSystemProfilePrivilege 2496 powershell.exe Token: SeSystemtimePrivilege 2496 powershell.exe Token: SeProfSingleProcessPrivilege 2496 powershell.exe Token: SeIncBasePriorityPrivilege 2496 powershell.exe Token: SeCreatePagefilePrivilege 2496 powershell.exe Token: SeBackupPrivilege 2496 powershell.exe Token: SeRestorePrivilege 2496 powershell.exe Token: SeShutdownPrivilege 2496 powershell.exe Token: SeDebugPrivilege 2496 powershell.exe Token: SeSystemEnvironmentPrivilege 2496 powershell.exe Token: SeRemoteShutdownPrivilege 2496 powershell.exe Token: SeUndockPrivilege 2496 powershell.exe Token: SeManageVolumePrivilege 2496 powershell.exe Token: 33 2496 powershell.exe Token: 34 2496 powershell.exe Token: 35 2496 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeIncreaseQuotaPrivilege 2476 powershell.exe Token: SeSecurityPrivilege 2476 powershell.exe Token: SeTakeOwnershipPrivilege 2476 powershell.exe Token: SeLoadDriverPrivilege 2476 powershell.exe Token: SeSystemProfilePrivilege 2476 powershell.exe Token: SeSystemtimePrivilege 2476 powershell.exe Token: SeProfSingleProcessPrivilege 2476 powershell.exe Token: SeIncBasePriorityPrivilege 2476 powershell.exe Token: SeCreatePagefilePrivilege 2476 powershell.exe Token: SeBackupPrivilege 2476 powershell.exe Token: SeRestorePrivilege 2476 powershell.exe Token: SeShutdownPrivilege 2476 powershell.exe Token: SeDebugPrivilege 2476 powershell.exe Token: SeSystemEnvironmentPrivilege 2476 powershell.exe Token: SeRemoteShutdownPrivilege 2476 powershell.exe Token: SeUndockPrivilege 2476 powershell.exe Token: SeManageVolumePrivilege 2476 powershell.exe Token: 33 2476 powershell.exe Token: 34 2476 powershell.exe Token: 35 2476 powershell.exe Token: SeDebugPrivilege 1756 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2900 618b42e14d1b6476e4880d99ca6fa8dd.exe 2900 618b42e14d1b6476e4880d99ca6fa8dd.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2044 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 29 PID 1712 wrote to memory of 2044 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 29 PID 1712 wrote to memory of 2044 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 29 PID 1712 wrote to memory of 2044 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 29 PID 1712 wrote to memory of 2496 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 32 PID 1712 wrote to memory of 2496 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 32 PID 1712 wrote to memory of 2496 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 32 PID 1712 wrote to memory of 2496 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 32 PID 1712 wrote to memory of 2476 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 34 PID 1712 wrote to memory of 2476 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 34 PID 1712 wrote to memory of 2476 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 34 PID 1712 wrote to memory of 2476 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 34 PID 1712 wrote to memory of 1756 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 36 PID 1712 wrote to memory of 1756 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 36 PID 1712 wrote to memory of 1756 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 36 PID 1712 wrote to memory of 1756 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 36 PID 1712 wrote to memory of 820 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 38 PID 1712 wrote to memory of 820 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 38 PID 1712 wrote to memory of 820 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 38 PID 1712 wrote to memory of 820 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 38 PID 1712 wrote to memory of 2640 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 39 PID 1712 wrote to memory of 2640 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 39 PID 1712 wrote to memory of 2640 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 39 PID 1712 wrote to memory of 2640 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 39 PID 1712 wrote to memory of 2700 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 42 PID 1712 wrote to memory of 2700 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 42 PID 1712 wrote to memory of 2700 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 42 PID 1712 wrote to memory of 2700 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 42 PID 1712 wrote to memory of 1444 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 44 PID 1712 wrote to memory of 1444 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 44 PID 1712 wrote to memory of 1444 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 44 PID 1712 wrote to memory of 1444 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 44 PID 1712 wrote to memory of 1768 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 46 PID 1712 wrote to memory of 1768 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 46 PID 1712 wrote to memory of 1768 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 46 PID 1712 wrote to memory of 1768 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 46 PID 1712 wrote to memory of 2152 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 48 PID 1712 wrote to memory of 2152 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 48 PID 1712 wrote to memory of 2152 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 48 PID 1712 wrote to memory of 2152 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 48 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51 PID 1712 wrote to memory of 2900 1712 618b42e14d1b6476e4880d99ca6fa8dd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\618b42e14d1b6476e4880d99ca6fa8dd.exe"C:\Users\Admin\AppData\Local\Temp\618b42e14d1b6476e4880d99ca6fa8dd.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:820
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\618b42e14d1b6476e4880d99ca6fa8dd.exeC:\Users\Admin\AppData\Local\Temp\618b42e14d1b6476e4880d99ca6fa8dd.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TGX1HTM0SZ4X6F49WJL6.temp
Filesize7KB
MD5c1506e8ad3b8aa735ea10dcf47278c4c
SHA12bc0d8f8b488bdb8020ab390575d5f4e6527528a
SHA2560ea12fd0cdf861a6c5398fe9239be74b0c57e58f867717b7127c970cbe492aee
SHA51245678b21f5615f55c769e8f218f7cb0ab9dd5519c4b3c05942bb9f4946af21e7c091be7513c26dc0c4d90d8e3ea1a4f88385342bd731a28f60de69780eef02c7