Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
802265850cd5616f53ecbf59222ff973.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
802265850cd5616f53ecbf59222ff973.exe
Resource
win10v2004-20231215-en
General
-
Target
802265850cd5616f53ecbf59222ff973.exe
-
Size
31KB
-
MD5
802265850cd5616f53ecbf59222ff973
-
SHA1
1316bdeaf01791c65cd304ee9c1eb04ecef7daa3
-
SHA256
4ad15dacb7efa41354bed63e742f98804eba7c886b6aad5f5709d32c84bfc5b5
-
SHA512
d4566586b30526442821bb42cda6dfc0f9d21503799fabcfa3365052e6429bb6d2f80863c25b79324bdae47f6d83d8fde091ac5e76dcfe83dfac4d97a64a3b67
-
SSDEEP
768:bU6wHpNgNDldoV46qTahK+5ROHf+5orZStqJg12rstlAH:bU6wJNgNH6mF+5RAfK6ItqIxtl6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2988 gbvgbv07.exe 2904 gbvgbv07.exe -
Loads dropped DLL 5 IoCs
pid Process 2644 802265850cd5616f53ecbf59222ff973.exe 2644 802265850cd5616f53ecbf59222ff973.exe 2988 gbvgbv07.exe 2904 gbvgbv07.exe 2904 gbvgbv07.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SfcDisable = "4294967197" gbvgbv07.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\gbvgbv07.exe 802265850cd5616f53ecbf59222ff973.exe File opened for modification C:\Windows\SysWOW64\gbvgbv07.exe 802265850cd5616f53ecbf59222ff973.exe File opened for modification C:\Windows\SysWOW64\comres.dll gbvgbv07.exe File opened for modification C:\Windows\SysWOW64\comres.dll.ocx gbvgbv07.exe File created C:\Windows\SysWOW64\comres.dll.ocx gbvgbv07.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fonts\dbr07027.ttf 802265850cd5616f53ecbf59222ff973.exe File opened for modification C:\Windows\fonts\dbr07027.ttf 802265850cd5616f53ecbf59222ff973.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2644 802265850cd5616f53ecbf59222ff973.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1348 2644 802265850cd5616f53ecbf59222ff973.exe 6 PID 2644 wrote to memory of 2988 2644 802265850cd5616f53ecbf59222ff973.exe 28 PID 2644 wrote to memory of 2988 2644 802265850cd5616f53ecbf59222ff973.exe 28 PID 2644 wrote to memory of 2988 2644 802265850cd5616f53ecbf59222ff973.exe 28 PID 2644 wrote to memory of 2988 2644 802265850cd5616f53ecbf59222ff973.exe 28 PID 2644 wrote to memory of 2904 2644 802265850cd5616f53ecbf59222ff973.exe 29 PID 2644 wrote to memory of 2904 2644 802265850cd5616f53ecbf59222ff973.exe 29 PID 2644 wrote to memory of 2904 2644 802265850cd5616f53ecbf59222ff973.exe 29 PID 2644 wrote to memory of 2904 2644 802265850cd5616f53ecbf59222ff973.exe 29 PID 2904 wrote to memory of 2788 2904 gbvgbv07.exe 30 PID 2904 wrote to memory of 2788 2904 gbvgbv07.exe 30 PID 2904 wrote to memory of 2788 2904 gbvgbv07.exe 30 PID 2904 wrote to memory of 2788 2904 gbvgbv07.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\802265850cd5616f53ecbf59222ff973.exe"C:\Users\Admin\AppData\Local\Temp\802265850cd5616f53ecbf59222ff973.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\gbvgbv07.exeC:\Windows\system32\gbvgbv07.exe C:\Windows\system32\dbr07027.ocx pfjaoidjglkajd C:\Users\Admin\AppData\Local\Temp\802265850cd5616f53ecbf59222ff973.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
PID:2988
-
-
C:\Windows\SysWOW64\gbvgbv07.exeC:\Windows\system32\gbvgbv07.exe C:\Windows\system32\dbr99005.ocx pfjieaoidjglkajd3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:2788
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD576948da567806229012ad2a3d697e468
SHA1027b9b69eda64b4872647d49f88236603c2433d3
SHA25673c5b0cbd6e42dad24ee43750a8aee23a8a00b245e8aba577f88563f73eabbd3
SHA51298af9d35cafa124a0ec4a37a44e6e541641cbf474ccefabfe3c30fea15d671496e8ee37a770f727f1651032dc9496fea664423ac7e5b7c46aa1bfa9d8c39a827
-
Filesize
412B
MD59d0c58014a0788e4931420fb21778ded
SHA102a5eaa0b080399a28960b1088997a176fd43ad9
SHA2565e6517f1bc90348282282108fdf796882c4c62940eff484968cad31cd6b0289a
SHA5122691cf0607180067998398e5b489dbc802741ab3d684fb9c4fa890680903eada878ad55373548ab89ab75060949ecae48c4bb81d4e006d0f20baba179ae24ab2
-
Filesize
40KB
MD501f891d680e9cec5563080332ee6d444
SHA10ccb4afd3ee1dfc58ce33cd27c498b45b0ec359b
SHA25698a5e1fdbf326640350129a043a7af3faef47a643f26539dbc513114963731be
SHA512eccc4bdee7b2ecbbfa50d774fc681ae44e04dcfb720904cb68c058a132a62d1ebf149f97fdbe8a0a8e8726db9a5c0ec30c484bc05b221ea1b3fb7f2545b4d54e
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d