Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
8d9b0ab6fe990d1372a2b932d26bf95c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8d9b0ab6fe990d1372a2b932d26bf95c.exe
Resource
win10v2004-20231215-en
General
-
Target
8d9b0ab6fe990d1372a2b932d26bf95c.exe
-
Size
4.6MB
-
MD5
8d9b0ab6fe990d1372a2b932d26bf95c
-
SHA1
5e7a9a0697e0dbf7f46683a916af0dadd32c2d3e
-
SHA256
098cd0ad43bde05484a110f4a60ede71472f3c77d8edcf64fca1c1eafdbaae0a
-
SHA512
c733874a41cb0fcd5ddcd86aa043c71dc99911e5c31c778fdfa089300f17cd36cc1b1a1dc7f453ff1e21c41bdafcea1973986b94fa94575063effa0781a1f2eb
-
SSDEEP
98304:5nq/RqOFNic0xg+USnxfTNa1ICDmQJbxrLCjD8fPxv9zVjvQsJnhK1B7br:5nOqOicr+USnxbgeCNbUXAx5VjvPJn8b
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\win = "C:\\win.exe" 8d9b0ab6fe990d1372a2b932d26bf95c.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\reg_0001.txt 8d9b0ab6fe990d1372a2b932d26bf95c.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2168 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2732 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 28 PID 2216 wrote to memory of 2732 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 28 PID 2216 wrote to memory of 2732 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 28 PID 2216 wrote to memory of 2732 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 28 PID 2216 wrote to memory of 2168 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 29 PID 2216 wrote to memory of 2168 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 29 PID 2216 wrote to memory of 2168 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 29 PID 2216 wrote to memory of 2168 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 29 PID 2216 wrote to memory of 2124 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 30 PID 2216 wrote to memory of 2124 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 30 PID 2216 wrote to memory of 2124 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 30 PID 2216 wrote to memory of 2124 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 30 PID 2216 wrote to memory of 2572 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 31 PID 2216 wrote to memory of 2572 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 31 PID 2216 wrote to memory of 2572 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 31 PID 2216 wrote to memory of 2572 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 31 PID 2216 wrote to memory of 2652 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 32 PID 2216 wrote to memory of 2652 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 32 PID 2216 wrote to memory of 2652 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 32 PID 2216 wrote to memory of 2652 2216 8d9b0ab6fe990d1372a2b932d26bf95c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d9b0ab6fe990d1372a2b932d26bf95c.exe"C:\Users\Admin\AppData\Local\Temp\8d9b0ab6fe990d1372a2b932d26bf95c.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\autoexec.bat /sc onstart /ru system2⤵
- Creates scheduled task(s)
PID:2732
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
PID:2168
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2124
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2572
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1