Analysis
-
max time kernel
152s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
security_scanner.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
security_scanner.exe
Resource
win10v2004-20240226-en
General
-
Target
security_scanner.exe
-
Size
221KB
-
MD5
97294280cfc2a51b58bd3a9a7f93f35a
-
SHA1
70b68fefa4d85cbf6d43b3ea68e400168bb9d21c
-
SHA256
b615aec0875ee66dcc76777fd07f398cf9cb2d553d4d93a0e9120fde86fe42b6
-
SHA512
7b01aa3b8cd5127ff138e383ffb1ec4436fe7822fd8c35cc6106e73c364ccc7eea945a91aa3b1067ca7e720ec83f7e4d6e3f56cb8bf7c280e124b34f908f6f20
-
SSDEEP
6144:/kMEkWi0SSl+dyxDsEDYPh9O6o21r+OXCNJZkUb6TqJK:/ZuB+dyvIxo2ptXCNJfD
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2672 stf.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 stf.exe -
Loads dropped DLL 2 IoCs
pid Process 1900 security_scanner.exe 1900 security_scanner.exe -
resource yara_rule behavioral1/memory/1900-3-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral1/memory/1900-12-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral1/memory/2672-17-0x0000000000400000-0x00000000004DE000-memory.dmp upx behavioral1/memory/2672-19-0x0000000000400000-0x00000000004DE000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1900 security_scanner.exe 1900 security_scanner.exe 1900 security_scanner.exe 1900 security_scanner.exe 1900 security_scanner.exe 1900 security_scanner.exe 1900 security_scanner.exe 1900 security_scanner.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1244 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe Token: SeShutdownPrivilege 1244 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe 1244 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2672 1900 security_scanner.exe 28 PID 1900 wrote to memory of 2672 1900 security_scanner.exe 28 PID 1900 wrote to memory of 2672 1900 security_scanner.exe 28 PID 1900 wrote to memory of 2672 1900 security_scanner.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\security_scanner.exe"C:\Users\Admin\AppData\Local\Temp\security_scanner.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\stf.exe"C:\Users\Admin\AppData\Local\stf.exe" -gav C:\Users\Admin\AppData\Local\Temp\security_scanner.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2672
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221KB
MD597294280cfc2a51b58bd3a9a7f93f35a
SHA170b68fefa4d85cbf6d43b3ea68e400168bb9d21c
SHA256b615aec0875ee66dcc76777fd07f398cf9cb2d553d4d93a0e9120fde86fe42b6
SHA5127b01aa3b8cd5127ff138e383ffb1ec4436fe7822fd8c35cc6106e73c364ccc7eea945a91aa3b1067ca7e720ec83f7e4d6e3f56cb8bf7c280e124b34f908f6f20