Analysis

  • max time kernel
    152s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 17:13

General

  • Target

    security_scanner.exe

  • Size

    221KB

  • MD5

    97294280cfc2a51b58bd3a9a7f93f35a

  • SHA1

    70b68fefa4d85cbf6d43b3ea68e400168bb9d21c

  • SHA256

    b615aec0875ee66dcc76777fd07f398cf9cb2d553d4d93a0e9120fde86fe42b6

  • SHA512

    7b01aa3b8cd5127ff138e383ffb1ec4436fe7822fd8c35cc6106e73c364ccc7eea945a91aa3b1067ca7e720ec83f7e4d6e3f56cb8bf7c280e124b34f908f6f20

  • SSDEEP

    6144:/kMEkWi0SSl+dyxDsEDYPh9O6o21r+OXCNJZkUb6TqJK:/ZuB+dyvIxo2ptXCNJfD

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\security_scanner.exe
    "C:\Users\Admin\AppData\Local\Temp\security_scanner.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\stf.exe
      "C:\Users\Admin\AppData\Local\stf.exe" -gav C:\Users\Admin\AppData\Local\Temp\security_scanner.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2672
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\stf.exe

    Filesize

    221KB

    MD5

    97294280cfc2a51b58bd3a9a7f93f35a

    SHA1

    70b68fefa4d85cbf6d43b3ea68e400168bb9d21c

    SHA256

    b615aec0875ee66dcc76777fd07f398cf9cb2d553d4d93a0e9120fde86fe42b6

    SHA512

    7b01aa3b8cd5127ff138e383ffb1ec4436fe7822fd8c35cc6106e73c364ccc7eea945a91aa3b1067ca7e720ec83f7e4d6e3f56cb8bf7c280e124b34f908f6f20

  • memory/1244-22-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/1244-18-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/1900-14-0x0000000001D10000-0x0000000001DEE000-memory.dmp

    Filesize

    888KB

  • memory/1900-3-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1900-12-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1900-0-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/1900-2-0x0000000001D10000-0x0000000001DEE000-memory.dmp

    Filesize

    888KB

  • memory/1900-1-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2672-13-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2672-15-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2672-16-0x0000000000550000-0x000000000062E000-memory.dmp

    Filesize

    888KB

  • memory/2672-17-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2672-19-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2672-21-0x0000000000550000-0x000000000062E000-memory.dmp

    Filesize

    888KB