Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
8ab40474d3eaafcf734e9528c5dd61a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ab40474d3eaafcf734e9528c5dd61a9.exe
Resource
win10v2004-20231215-en
General
-
Target
8ab40474d3eaafcf734e9528c5dd61a9.exe
-
Size
7.0MB
-
MD5
8ab40474d3eaafcf734e9528c5dd61a9
-
SHA1
d07bf98a988d7a9a9938d1a86b17000c6fdf465b
-
SHA256
2ba0c79ae23070dbc2e0c54184d76aab5dae7707fbb1920aaca0357225f07001
-
SHA512
3c791c27468ee4357775a17c69bbbefa94a044f05d29cbebe33a76eafe90661e3f942e3741e34158d4ac457d9653ff317acd0a1fc87f5c395743850768f731d5
-
SSDEEP
196608:N7effIPEsy58doQaTxLhQyZbIly38doQalArdfehQM9rdQyZb9eMf1WIEly38doi:N7effIPEsy58doQaTxLhQyZbIly38doY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 8ab40474d3eaafcf734e9528c5dd61a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe," 8ab40474d3eaafcf734e9528c5dd61a9.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\spools.exe 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 8ab40474d3eaafcf734e9528c5dd61a9.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" 8ab40474d3eaafcf734e9528c5dd61a9.exe -
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a000000014a56-37.dat acprotect behavioral1/memory/2128-39-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral1/memory/2128-49-0x0000000010000000-0x000000001010B000-memory.dmp acprotect -
Loads dropped DLL 1 IoCs
pid Process 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe -
resource yara_rule behavioral1/files/0x000a000000014a56-37.dat upx behavioral1/memory/2128-39-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral1/memory/2128-49-0x0000000010000000-0x000000001010B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 8ab40474d3eaafcf734e9528c5dd61a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 8ab40474d3eaafcf734e9528c5dd61a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 8ab40474d3eaafcf734e9528c5dd61a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 8ab40474d3eaafcf734e9528c5dd61a9.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\L: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\J: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\Q: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\T: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\J: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\K: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\M: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\O: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\G: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\S: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\G: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\Q: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\R: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\Q: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\O: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\V: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\H: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\M: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\G: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\S: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\J: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\S: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\K: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\N: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\P: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\U: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\E: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\E: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\I: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\N: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\O: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\P: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\X: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\T: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\R: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\E: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\R: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\I: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\W: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\I: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\K: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\M: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\H: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\U: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\V: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\L: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\N: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\W: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\X: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\K: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\M: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\X: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\W: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\L: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\P: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\S: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\H: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\I: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\N: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\U: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\E: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\T: 8ab40474d3eaafcf734e9528c5dd61a9.exe File opened (read-only) \??\P: 8ab40474d3eaafcf734e9528c5dd61a9.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} reg.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" 8ab40474d3eaafcf734e9528c5dd61a9.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ftpdll.dll 8ab40474d3eaafcf734e9528c5dd61a9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2692 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 1036 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2692 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 1036 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2692 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 1036 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2692 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 1036 8ab40474d3eaafcf734e9528c5dd61a9.exe 2692 8ab40474d3eaafcf734e9528c5dd61a9.exe 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 1036 8ab40474d3eaafcf734e9528c5dd61a9.exe 2692 8ab40474d3eaafcf734e9528c5dd61a9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2480 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 29 PID 2128 wrote to memory of 2480 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 29 PID 2128 wrote to memory of 2480 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 29 PID 2128 wrote to memory of 2480 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 29 PID 2128 wrote to memory of 2692 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 31 PID 2128 wrote to memory of 2692 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 31 PID 2128 wrote to memory of 2692 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 31 PID 2128 wrote to memory of 2692 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 31 PID 2480 wrote to memory of 1036 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 33 PID 2480 wrote to memory of 1036 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 33 PID 2480 wrote to memory of 1036 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 33 PID 2480 wrote to memory of 1036 2480 8ab40474d3eaafcf734e9528c5dd61a9.exe 33 PID 2128 wrote to memory of 2828 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 35 PID 2128 wrote to memory of 2828 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 35 PID 2128 wrote to memory of 2828 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 35 PID 2128 wrote to memory of 2828 2128 8ab40474d3eaafcf734e9528c5dd61a9.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ab40474d3eaafcf734e9528c5dd61a9.exe"C:\Users\Admin\AppData\Local\Temp\8ab40474d3eaafcf734e9528c5dd61a9.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\8ab40474d3eaafcf734e9528c5dd61a9.exeC:\Users\Admin\AppData\Local\Temp\8ab40474d3eaafcf734e9528c5dd61a9.exe2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\8ab40474d3eaafcf734e9528c5dd61a9.exeC:\Users\Admin\AppData\Local\Temp\8ab40474d3eaafcf734e9528c5dd61a9.exe3⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
-
C:\Users\Admin\AppData\Local\Temp\8ab40474d3eaafcf734e9528c5dd61a9.exeC:\Users\Admin\AppData\Local\Temp\8ab40474d3eaafcf734e9528c5dd61a9.exe2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f2⤵
- Installs/modifies Browser Helper Object
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
7.1MB
MD59a8f04813d35f01b5e692e21e81a3fc8
SHA11cfa6149cc42437e5a4780aa8e228b2dd362ed03
SHA256ba83f633f5b17c7a19cea30b1325ad7a64fc0285d6274cd0fb00113fe1bdf711
SHA512291c070d23998fb845f3c10e1ea7f9d39c2198f6514b45f5b993fbc3e0db555295331ac2c96dcfd0c6cc3c5160384a4ee981bc035d4bc124448fdd93351f6e42
-
Filesize
5KB
MD5d807aa04480d1d149f7a4cac22984188
SHA1ffd5be65fd10017e34c11cecd105ebf4aa6c0cd9
SHA256eddf092d901afe128322910c3ff41a3f242d33d6b4cdf91ece327076b324ccbb
SHA512875543583c20ab164f37a4fb2587d234ce0a15d649d22b0d1dae5933f0a7683db170578746ea4458c51fec26e2243c6ec00dc10db8d4289789e50d5800cf863e