Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe
Resource
win10v2004-20231215-en
General
-
Target
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe
-
Size
4.4MB
-
MD5
9631809ff9e66cc5809e51e2929dfbe8
-
SHA1
4ee1085393d94978fc17b1453517f0aa7f40b8a3
-
SHA256
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583
-
SHA512
3e350e41e7a86756438762c0a6772e5781757bb941e8c88c58238e1f19e15a3eb743301119050b30476d69bc68568a0bad1cdd4560f1ecac2cf4c0c72c9d77d1
-
SSDEEP
98304:k8sjkFhRWieWT0ywsagZ9VeXD3qJJXg2cMUGZWh:2jyhRPeWvnzwrivWh
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral1/files/0x0009000000015c71-5.dat UPX behavioral1/memory/1840-8-0x0000000002EF0000-0x0000000003113000-memory.dmp UPX behavioral1/memory/2220-110-0x0000000000400000-0x0000000000623000-memory.dmp UPX -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsLoader.exe -
Executes dropped EXE 1 IoCs
pid Process 2220 WindowsLoader.exe -
Loads dropped DLL 2 IoCs
pid Process 1840 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 2924 regsvr32.exe -
resource yara_rule behavioral1/files/0x0009000000015c71-5.dat upx behavioral1/memory/1840-8-0x0000000002EF0000-0x0000000003113000-memory.dmp upx behavioral1/memory/2220-110-0x0000000000400000-0x0000000000623000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Win = "rundll32 shell32,ShellExec_RunDLL regsvr32 -s \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sfx.dll\"" c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS WindowsLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct WindowsLoader.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2220 WindowsLoader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2220 WindowsLoader.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2220 WindowsLoader.exe Token: SeIncBasePriorityPrivilege 2220 WindowsLoader.exe Token: 33 2220 WindowsLoader.exe Token: SeIncBasePriorityPrivilege 2220 WindowsLoader.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 WindowsLoader.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2220 1840 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 28 PID 1840 wrote to memory of 2220 1840 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 28 PID 1840 wrote to memory of 2220 1840 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 28 PID 1840 wrote to memory of 2220 1840 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 28 PID 1840 wrote to memory of 2468 1840 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 30 PID 1840 wrote to memory of 2468 1840 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 30 PID 1840 wrote to memory of 2468 1840 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 30 PID 1840 wrote to memory of 2468 1840 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 30 PID 2468 wrote to memory of 2924 2468 cmd.exe 32 PID 2468 wrote to memory of 2924 2468 cmd.exe 32 PID 2468 wrote to memory of 2924 2468 cmd.exe 32 PID 2468 wrote to memory of 2924 2468 cmd.exe 32 PID 2468 wrote to memory of 2924 2468 cmd.exe 32 PID 2468 wrote to memory of 2924 2468 cmd.exe 32 PID 2468 wrote to memory of 2924 2468 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe"C:\Users\Admin\AppData\Local\Temp\c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\WindowsLoader.exeC:\Users\Admin\AppData\Local\Temp\WindowsLoader.exe2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start regsvr32 -s "C:\Users\Admin\AppData\Local\Temp\sfx.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -s "C:\Users\Admin\AppData\Local\Temp\sfx.dll"3⤵
- Loads dropped DLL
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5213477e5ea9cc5e1a553dedb7f0545ac
SHA123204a5ac52da20047555f58246528f7cc3c44fb
SHA256f03074dc1b7ed148915c112edf33d7ff09601ed718a971e0d0574d314f74cdfc
SHA512472b0304098dbcb489e5b3f4fef99add3f79e253dad638f96e75bd5f1c9ecdaf6d4e8e1fcd964e69256d9d8bd6dbb14632952e9da64c4d608d8818c11b156612
-
Filesize
3.8MB
MD5323c0fd51071400b51eedb1be90a8188
SHA10efc35935957c25193bbe9a83ab6caa25a487ada
SHA2562f2aba1e074f5f4baa08b524875461889f8f04d4ffc43972ac212e286022ab94
SHA5124c501c7135962e2f02b68d6069f2191ddb76f990528dacd209955a44972122718b9598400ba829abab2d4345b4e1a4b93453c8e7ba42080bd492a34cf8443e7e