Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
6fbc13ce46257b3c10123fd06c2a1766.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6fbc13ce46257b3c10123fd06c2a1766.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20231215-en
General
-
Target
6fbc13ce46257b3c10123fd06c2a1766.exe
-
Size
929KB
-
MD5
6fbc13ce46257b3c10123fd06c2a1766
-
SHA1
0c6b67422f0cb8bcf0a5a7b0d463f8b6c012d4fb
-
SHA256
83ed08f7701b6e397d46fa3ea9e381625625b7e3933f2c0f5e454bb9c309e24f
-
SHA512
ba9f6692fc1af0d39748f08f0b51daba0099803e24543af0e5e91c65507afa0ee8258795766ce11f8a6fa031d2b8a24be2ed8619a0195aa78afdd4f0c247ea66
-
SSDEEP
24576:1tjOMEWc7JCrA1H0qxA2+a9KEKGWrEWJCi3uXDMSqDr:1QMEWc7+3Ra9KFPHuXq/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2844 internal6fbc13ce46257b3c10123fd06c2a1766.exe -
Loads dropped DLL 2 IoCs
pid Process 2936 6fbc13ce46257b3c10123fd06c2a1766.exe 2936 6fbc13ce46257b3c10123fd06c2a1766.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 internal6fbc13ce46257b3c10123fd06c2a1766.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e internal6fbc13ce46257b3c10123fd06c2a1766.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 804 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2844 internal6fbc13ce46257b3c10123fd06c2a1766.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2844 internal6fbc13ce46257b3c10123fd06c2a1766.exe 2844 internal6fbc13ce46257b3c10123fd06c2a1766.exe 2844 internal6fbc13ce46257b3c10123fd06c2a1766.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2844 2936 6fbc13ce46257b3c10123fd06c2a1766.exe 28 PID 2936 wrote to memory of 2844 2936 6fbc13ce46257b3c10123fd06c2a1766.exe 28 PID 2936 wrote to memory of 2844 2936 6fbc13ce46257b3c10123fd06c2a1766.exe 28 PID 2936 wrote to memory of 2844 2936 6fbc13ce46257b3c10123fd06c2a1766.exe 28 PID 2936 wrote to memory of 2844 2936 6fbc13ce46257b3c10123fd06c2a1766.exe 28 PID 2936 wrote to memory of 2844 2936 6fbc13ce46257b3c10123fd06c2a1766.exe 28 PID 2936 wrote to memory of 2844 2936 6fbc13ce46257b3c10123fd06c2a1766.exe 28 PID 2844 wrote to memory of 2288 2844 internal6fbc13ce46257b3c10123fd06c2a1766.exe 31 PID 2844 wrote to memory of 2288 2844 internal6fbc13ce46257b3c10123fd06c2a1766.exe 31 PID 2844 wrote to memory of 2288 2844 internal6fbc13ce46257b3c10123fd06c2a1766.exe 31 PID 2844 wrote to memory of 2288 2844 internal6fbc13ce46257b3c10123fd06c2a1766.exe 31 PID 2288 wrote to memory of 804 2288 cmd.exe 32 PID 2288 wrote to memory of 804 2288 cmd.exe 32 PID 2288 wrote to memory of 804 2288 cmd.exe 32 PID 2288 wrote to memory of 804 2288 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fbc13ce46257b3c10123fd06c2a1766.exe"C:\Users\Admin\AppData\Local\Temp\6fbc13ce46257b3c10123fd06c2a1766.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\nsd1853.tmp\internal6fbc13ce46257b3c10123fd06c2a1766.exeC:\Users\Admin\AppData\Local\Temp\nsd1853.tmp\internal6fbc13ce46257b3c10123fd06c2a1766.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/6fbc13ce46257b3c10123fd06c2a1766.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsd1853.tmp/fallbackfiles/'2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\23585.bat" "C:\Users\Admin\AppData\Local\Temp\2A30D14308E24C81AD173D7CB9903AAF\""3⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:804
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544B
MD5d89e055155d037389c54e0d9e67c47e4
SHA1171fd819612f8e60dbab13aaea380c49c053eba2
SHA2562b5be091ffcd3124d1955c882d1fed74dd6ead2983f86dffc1191020d087702d
SHA512c0be67cfa4066f3442fdb67c5a265b9eca66c5d74b58368176f6c47d2cfca324c44c6caa46f60be40b5687b8456e63a38e464923cacef8c1f17a558896e3728a
-
Filesize
544B
MD571768169bd010fed7e428d87b91fb0c2
SHA19084c7aae79d634209ab84bae911fce5828df81d
SHA2569ca82e1afb1b594d5ecb35ac4195db1533a83c7e001a1c32cb9d9ebf7b69b7b2
SHA512c30b404ad56fca3154d82d31ec44260d396a8aa99dcf2b47c2f05317f92319d582464859d8accca49b3ae98fae4dab158e436d9a5ad3c161ba0c1a5bd2f11cd5
-
Filesize
49KB
MD58fa90675e7165acb563add157fbef61d
SHA19ac3eac65f3b856b3ee243bf97a8cb8ec50efa9d
SHA256d43091292193766b8ae3245375ca9b493374efb23fba0d441c5c29a21fd87073
SHA51254a127b62c5cfbd2460184d39f6701599263e35605d63b48508d9f2fa847ebe69884bce66a37e1b63cebdf7e8a9bbbbb04d4fbe3d855975d7af7d964a16673ab
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596aa75a6cb8aedafd5e6649a51326ead
SHA1933b6dc41b9f8fde7ba9b8d207ebfcf1d1a38a18
SHA2565b892aa91e460ac27407bbb598c0b8921059d729dc21464a78e563bb713acf8c
SHA512bf6240d470216edc7dfaa3251493224154ed86764c6e94cc1a93100702c479bc3dd200a795e9c1b9ee55562574857b931731a6d3e6deee0b68e3098a882c505e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0829f79ee5b2d6c3d90e5dd515a1a17
SHA182c21d99532c70ebe540f01c01dcc46e083c878e
SHA2566528dd95748f8d77d70ea33bea4e29141e5f849f5e2738671ba8061d532bf994
SHA5121dbe631f1ada7672089164ecd4a6428ff047f88303e526f814a9f9547c7e76839ba3bdb09c10d9c30698690801d6a025882bf6fa3987c472d0678b5c9999faff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5123e87066b99e61edbf1819b08f8a138
SHA10f6c55637d4c55d915a01c64f094ba1318a2d774
SHA2567492d2445830109dcd43fb17078bd6f26dc6e09335839efc27d38de384ff12b5
SHA512b81c50180262deb9201219e72ccb2a9835cd17a35396c79f91661a364b31d5108b55326ad686c3ab28c97d65058621b22d6f47770c66ce3041d3b6e3504b0136
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\2A30D14308E24C81AD173D7CB9903AAF\2A30D14308E24C81AD173D7CB9903AAF_LogFile.txt
Filesize4KB
MD5b12572f29e5899d159e13b5e4493bd38
SHA1fb57b3e55b4e37519273365ba7e3ec869d2a97f4
SHA25645481e5d1a6f1b23a980e5d11984bc503dc6f906bdcad2117c81ce4b36bf67d9
SHA5121261407fa7738e09f9e1d566a08757724469610931ad31e5900f4b214cb9a28d1b11e841466c527e5fe2c232804aa73a399e265a06c812d93adfcc67c21c3bb3
-
Filesize
78KB
MD580be7c3a54a695ab2b9b7b410e80becc
SHA118b2a54f4eaccfc637544e8594a88356536db7a3
SHA25657d768942f138023cce90d191fbee5d6bbb21422cab5100c386da2b96bc5914d
SHA512bffcde04a629693c889f5d128787bc28fdb58351a6e225af9d8bd70d9752f49f0d5ce79e6540b9b38a8a1f20683cf01c2d68bba3b7ce660e8e32ee8b702c043b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
425KB
MD5b7c9baedd3a539be700f98fcda5da25d
SHA1bb9f5ad960cc2ff2cd09666c2aaa381176bb4dc7
SHA256b7725c7b459eb7da8b442b44ab2e3874a0613f988d87b7c0012498eb229e2d5a
SHA5124cb58f1f6c5f90aa50ce8a7e8e8c70ccd714438d5abccdbbdaa446029fc1206b27cf7a407cd59651d8558454222ff91e6278b242f41ad2e842947e3016d4f0ee
-
Filesize
244KB
MD574c3e9796cc36146b34b9e9dff7d3118
SHA1bcdf44cb8d4335d38c96cbc837a24f2455217a5f
SHA256faca5f9e66793b4ff9dbb8eb79aa1c6cd5ca6e41dbc081eaa5a49ebad1529424
SHA5121be47d4378c8b976520dcac3a5811d5dcbf5863e40347bef12022f5f5590c2b162759f5dd6060bd8c94e32937708aff2a233560f9d4c08bb95561f8d93b9eb45
-
Filesize
31KB
MD5eec554d70735944a1bf70cbb2c3994c1
SHA11163cd11203af2c1861ae865523326d3030703ce
SHA25662b1f196c385d93a5740e0d9f929200fbe56ff3f98234f09a003196f6a78b851
SHA512bb57052319337ca306ab2e7e43b1a9c326e9eff8726edf0a569bd17c894f6681f9a9e3c29c9a5a7e5ff038dbf6a82e435991f21f64f808cb17877817873038ae
-
Filesize
133KB
MD553cd76edf8ffb4fbf9685f7897070019
SHA1e840f9c64493216194209fbcef1ce102f16d7263
SHA2565f3f4d0c1ecc3b9505ed63b55450e598391cbb432fc060bdb08185c463a5c1b9
SHA51236980728c9dd2abd341df4e373fc5831641ba408127765523ea5df1cf432c2cdd2e38d5f7fa187697dd744dc72700fe04330ef77fe4339277b6e76f276ece8bc
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
Filesize
345KB
MD5c2467573c4c033b635b5c5688085b6cc
SHA14652c6ce1fcca5583fd59c292e31bac42098fc51
SHA2560c11574400179610c55782ec33b1b408aceb6eb03a35df0cae37126d33122a5d
SHA5127c5fe92acb9c849b1ea81661b12181bb645774e48b444da133a6b00484065bfca91a4111e7935bddda1414f4bfa0deaaf8e98c2b5607bee888489e5f74fb153a