Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 21:08

General

  • Target

    7e0244a8bc506ac34c494c55c52a03b5.exe

  • Size

    2.1MB

  • MD5

    7e0244a8bc506ac34c494c55c52a03b5

  • SHA1

    60552dff2005084e18aa148ea1e865f5580d067d

  • SHA256

    40d8d89e6aa8a95ed370d23588de5bf3601c650334986d8a222e4582be7c4ef5

  • SHA512

    6cecdec9ed0dca6714e299be18043e932e5ed9a25c5018af56f5f7823a1ec46a50a735f933236fe6d70bc338effe5896daf838f8594559ebb02c4d0e9c81e45a

  • SSDEEP

    49152:51vqjd/Qvq/AvCGVIBzES3kJy7qE6kDHfZ5:51vqjskOi0JUB5

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 9 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e0244a8bc506ac34c494c55c52a03b5.exe
    "C:\Users\Admin\AppData\Local\Temp\7e0244a8bc506ac34c494c55c52a03b5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Users\Admin\AppData\Roaming\RDP6\ConnectionClient7.exe
      "C:\Users\Admin\AppData\Roaming\RDP6\ConnectionClient7.exe" -server 82.233.77.1 -port 443 -user owdemo1 -psw owdemo1 -color 15 -alttab 0 -full 1 -printer on -preview on -seamless on -wallp green -sound on -loadbalancing 0 -localtb 32
      2⤵
      • Modifies firewall policy service
      • UAC bypass
      • Windows security bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Checks whether UAC is enabled
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies Control Panel
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3604
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\RDP6\TSFTPClient.dll"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5816
      • C:\Users\Admin\AppData\Roaming\RDP6\TsCredentials.exe
        "C:\Users\Admin\AppData\Roaming\RDP6\TsCredentials.exe" 82.233.77.1 /Delete
        3⤵
        • Executes dropped EXE
        PID:2044
      • C:\Users\Admin\AppData\Roaming\RDP6\TsCredentials.exe
        "C:\Users\Admin\AppData\Roaming\RDP6\TsCredentials.exe" 82.233.77.1 owdemo1 owdemo1
        3⤵
        • Executes dropped EXE
        PID:5776
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c regsvr32.exe /s C:\Windows\SysWOW64\mstscax.dll
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /s C:\Windows\SysWOW64\mstscax.dll
          4⤵
          • Modifies registry class
          PID:3700
      • C:\Users\Admin\AppData\Roaming\RDP6\TsCredentials.exe
        "C:\Users\Admin\AppData\Roaming\RDP6\TsCredentials.exe" 82.233.77.1 /Delete
        3⤵
        • Executes dropped EXE
        PID:1040
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c regsvr32.exe "C:\Windows\SysWOW64\mstscax.dll" /s
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2172
  • C:\Windows\SysWOW64\regsvr32.exe
    regsvr32.exe /s "C:\Users\Admin\AppData\Roaming\RDP6\TSFTPClient.dll"
    1⤵
    • Loads dropped DLL
    PID:752
  • C:\Windows\SysWOW64\regsvr32.exe
    regsvr32.exe "C:\Windows\SysWOW64\mstscax.dll" /s
    1⤵
    • Modifies registry class
    PID:868

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\RDP6\ConnectionClient7.exe

          Filesize

          917KB

          MD5

          6f46f9edd355b899a14067bd7bb65333

          SHA1

          f5e7cfcea1075927452210a042fc3185ba1419a1

          SHA256

          c28fc522a25aa9f2bbb6fe3222249e00d39f8140829c5729c32de774fb8c4b68

          SHA512

          3bcd54d6c9241b46875e8fade9065870b5625a4687d807d2fa131faaea0c5c84959f3ef0e1d7887d7cfe1c569acede162a26f1e59e5fb7ce80cd0b5ddb20c430

        • C:\Users\Admin\AppData\Roaming\RDP6\TSFTPClient.dll

          Filesize

          180KB

          MD5

          0dc3c0622c59ae9b97d874eb312cf69e

          SHA1

          6068890a47e89ac4c6ddd2d282d82e82dea40930

          SHA256

          c81971f6747c521b4409d3bbc2c39a50d34dc95cd60a4f9f321a768f8e9d29c3

          SHA512

          ec2350a39474cb799f22c4ce72fa43e2fbcc4af1ff98b014ccddb1fe6f72449b325b6d4269b5a37eb72252179101eb0a7fa03dbe7b4f28799d74123c70319935

        • C:\Users\Admin\AppData\Roaming\RDP6\TsCredentials.exe

          Filesize

          131KB

          MD5

          d0350c7da46fdc8e6b4fdec70ef9d48a

          SHA1

          def3d6d9a24d53e922d2edf5b22a4c3c49df7637

          SHA256

          9f2ef867247663b1db6aad6eaebb57bfab80f093c2b52d8bf664e135995b471d

          SHA512

          2c14655746154339dd245b42ae530cdaa10f9123dd23c14a6f9470336942ff3e55cc03eaa9eb97162df0c39d129ba4b82c8b7285832734ab867a2daee86be27f

        • C:\Users\Admin\AppData\Roaming\RDP6\bkgscgreen.bmp

          Filesize

          7KB

          MD5

          feb0692918248950d909d114b957d722

          SHA1

          6858973ee8e05a16aabae9065f10617d4147e826

          SHA256

          3c1fb9294d8e0c12d608d3d59a798d3b065a06c1f845fdbceafd22b31096c10a

          SHA512

          d9e7eb8746686b3864ec25b662e05747ed35c954650c6feb064417abfa93257eef1862235bd3d60c0f9098cdcb0f915025325b9fd1d853b32b5d23a187b851f7

        • C:\Users\Admin\AppData\Roaming\RDP6\languk.ini

          Filesize

          4KB

          MD5

          6376d93f503ea89c279fe132cf02d3f5

          SHA1

          4e97b8ec955c9a45853c4a51196bd6ba39821b15

          SHA256

          ba430972b2204862a0e1958256db90f435a1364b01d358cc92d4df00338e2049

          SHA512

          6e16357ec249e1ab114654b67cc1b3a3b99fbe641dbf1cd3d39da24e5f1c72fa51465f8d78f44b297ddfe6e4421447d058d28d44a3a8da15806a477fb0f08cb9

        • memory/1040-98-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2044-81-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3604-90-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/3604-92-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB

        • memory/3604-91-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/3604-93-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB

        • memory/3604-94-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/3604-95-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

          Filesize

          64KB

        • memory/5776-83-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB