Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
b7be221d96dddd3ca71f41bb0c268b12.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7be221d96dddd3ca71f41bb0c268b12.exe
Resource
win10v2004-20240226-en
General
-
Target
b7be221d96dddd3ca71f41bb0c268b12.exe
-
Size
27KB
-
MD5
b7be221d96dddd3ca71f41bb0c268b12
-
SHA1
5829f0b4a7cc162dce361d60314b39ee6cbaea22
-
SHA256
5a2b97d8ded2fc70a3cc4c767a4e4e44337e2e0ef1440c1608dda3f87d436f06
-
SHA512
8ce7b791b71f0b4c6cc5245da9a6c428d8ff0328fe662415dec2d5daa7dac1cc88d57fb397cc4ba73ea97d88758c1049ad8ef8b0c14ee27cf7479a1defc37d77
-
SSDEEP
768:LrXJcX8W8qBQEF/kRRJsnhjQcBwsJvNs5gxxTOiR:LrXS1iAEunhQcZsyxS6
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatchUI.EXE clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NVC95.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IAMSERV.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FPROT.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLEANER3.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rising.exe clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Logo_1.exe\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SPHINX.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\F-PROT.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VSCAN40.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLAW95.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BLACKICE.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PAVSCHED.EXE clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ICLOAD95.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapw32.exe\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.exe clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EGHOST.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VSSTAT.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\JEDI.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IAMAPP.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCRSCAN.EXE clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ECENGINE.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ECENGINE.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SWEEP95.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PAVCL.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ICSUPPNT.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AUTODOWN.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VETTRAY.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMC.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCAN32.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAV7.EXE clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAVNT.EXE clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ICMON.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TDS2-98.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCAN95.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FESCUE.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PERSFW.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IBMAVSP.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVWUPD32.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP32.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP32.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCANPM.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PERSFW.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FRW.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLAW95CF.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navw32.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VSECOMR.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NORMIST.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MPFTRAY.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLEANER.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGCTRL.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Logo1_.exe clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAV7WIN.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NUPGRADE.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ICLOADNT.EXE clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVSCHED32.EXE clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navw32.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NVC95.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\F-AGNT95.EXE clfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CFIAUDIT.EXE\Debugger = "c:\\\\xue.exe" clfmon.exe -
Executes dropped EXE 1 IoCs
pid Process 3508 clfmon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TBMExe = "C:\\Windows\\Fonts\\6d9f33f42e574309ce13d687b4ea1d79\\system\\clfmon.exe" clfmon.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: clfmon.exe File opened (read-only) \??\O: clfmon.exe File opened (read-only) \??\P: clfmon.exe File opened (read-only) \??\Q: clfmon.exe File opened (read-only) \??\S: clfmon.exe File opened (read-only) \??\E: clfmon.exe File opened (read-only) \??\G: clfmon.exe File opened (read-only) \??\L: clfmon.exe File opened (read-only) \??\T: clfmon.exe File opened (read-only) \??\U: clfmon.exe File opened (read-only) \??\K: clfmon.exe File opened (read-only) \??\R: clfmon.exe File opened (read-only) \??\Y: clfmon.exe File opened (read-only) \??\Z: clfmon.exe File opened (read-only) \??\B: clfmon.exe File opened (read-only) \??\H: clfmon.exe File opened (read-only) \??\I: clfmon.exe File opened (read-only) \??\V: clfmon.exe File opened (read-only) \??\X: clfmon.exe File opened (read-only) \??\J: clfmon.exe File opened (read-only) \??\N: clfmon.exe File opened (read-only) \??\W: clfmon.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\6d9f33f42e574309ce13d687b4ea1d79\system\clfmon.exe b7be221d96dddd3ca71f41bb0c268b12.exe File created C:\Windows\Fonts\6d9f33f42e574309ce13d687b4ea1d79\system\clfmon.exe b7be221d96dddd3ca71f41bb0c268b12.exe -
Modifies Control Panel 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\Cursors\Arrow = "%SYSTEMROOT%\\Cursors\\arrow_m.cur" clfmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\Cursors\AppStarting clfmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\Cursors\Arrow clfmon.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\Cursors\ clfmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\Cursors\AppStarting = "%SYSTEMROOT%\\Cursors\\arrow_m.cur" clfmon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3508 clfmon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4120 b7be221d96dddd3ca71f41bb0c268b12.exe Token: SeDebugPrivilege 3508 clfmon.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3508 4120 b7be221d96dddd3ca71f41bb0c268b12.exe 91 PID 4120 wrote to memory of 3508 4120 b7be221d96dddd3ca71f41bb0c268b12.exe 91 PID 4120 wrote to memory of 3508 4120 b7be221d96dddd3ca71f41bb0c268b12.exe 91 PID 4120 wrote to memory of 3876 4120 b7be221d96dddd3ca71f41bb0c268b12.exe 93 PID 4120 wrote to memory of 3876 4120 b7be221d96dddd3ca71f41bb0c268b12.exe 93 PID 4120 wrote to memory of 3876 4120 b7be221d96dddd3ca71f41bb0c268b12.exe 93 PID 3876 wrote to memory of 2308 3876 cmd.exe 95 PID 3876 wrote to memory of 2308 3876 cmd.exe 95 PID 3876 wrote to memory of 2308 3876 cmd.exe 95 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2308 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7be221d96dddd3ca71f41bb0c268b12.exe"C:\Users\Admin\AppData\Local\Temp\b7be221d96dddd3ca71f41bb0c268b12.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\Fonts\6d9f33f42e574309ce13d687b4ea1d79\system\clfmon.exeC:\Windows\Fonts\6d9f33f42e574309ce13d687b4ea1d79\system\clfmon.exe2⤵
- Sets file execution options in registry
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Modifies Control Panel
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\b7be221d96dddd3ca71f41bb0c268b12.exe.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\attrib.exeattrib -s -h -a "C:\Users\Admin\AppData\Local\Temp\b7be221d96dddd3ca71f41bb0c268b12.exe"3⤵
- Views/modifies file attributes
PID:2308
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348B
MD5e3c3aff310f0a1c1a6fc7f3b8e9d289a
SHA1f3fa996936581c1698903d299e9032f258487d29
SHA2569227658cda01d42780d343b1b9d215c81fa8bf451a7f0c96026c03f36a9577cb
SHA5121809ed2dc03d98d51eaf5005e52f4d9546f8310247d4b4af95c1fec9f80a991e96fe1e672b672024a3e33e671785e71082209d7a5c04a8d48a3f69faaffe6830
-
Filesize
27KB
MD5b7be221d96dddd3ca71f41bb0c268b12
SHA15829f0b4a7cc162dce361d60314b39ee6cbaea22
SHA2565a2b97d8ded2fc70a3cc4c767a4e4e44337e2e0ef1440c1608dda3f87d436f06
SHA5128ce7b791b71f0b4c6cc5245da9a6c428d8ff0328fe662415dec2d5daa7dac1cc88d57fb397cc4ba73ea97d88758c1049ad8ef8b0c14ee27cf7479a1defc37d77