Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 22:49
Static task
static1
Behavioral task
behavioral1
Sample
b9dc1399a6f3b9f4e2143f97c8b33c7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9dc1399a6f3b9f4e2143f97c8b33c7e.exe
Resource
win10v2004-20240226-en
General
-
Target
b9dc1399a6f3b9f4e2143f97c8b33c7e.exe
-
Size
100KB
-
MD5
b9dc1399a6f3b9f4e2143f97c8b33c7e
-
SHA1
959a332b99fb39b6e743b9c46cd509906fee23eb
-
SHA256
bdc9d1464bc134fba84ad814eab3901f7f16ec8da8647f1a01aa66e63f69cfd4
-
SHA512
602a3f186e61e1e8bdc402bd2e79fce7c12f7b8e2f595b52b432c2439cc3a587ee47ca7cdcc5f5c59b406099b26a41719d84d11062ab03752d9afe17857dda85
-
SSDEEP
3072:fg5qO5/oPeu37EgnA0oe+JQzBvD7Vly8:NO5/oPeurVgnQtvD7S
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" b9dc1399a6f3b9f4e2143f97c8b33c7e.exe -
Deletes itself 1 IoCs
pid Process 2624 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1724 ld11.exe -
Loads dropped DLL 4 IoCs
pid Process 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 1724 ld11.exe 1724 ld11.exe 1724 ld11.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OKOTray = "C:\\Users\\Public\\Music\\ld11.exe" ld11.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b9dc1399a6f3b9f4e2143f97c8b33c7e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ld11.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dxxdv34567.bat b9dc1399a6f3b9f4e2143f97c8b33c7e.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\SOFTWARE\Microsoft\Internet Explorer\Main ld11.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\TP = "4" ld11.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1724 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 28 PID 2088 wrote to memory of 1724 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 28 PID 2088 wrote to memory of 1724 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 28 PID 2088 wrote to memory of 1724 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 28 PID 2088 wrote to memory of 1724 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 28 PID 2088 wrote to memory of 1724 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 28 PID 2088 wrote to memory of 1724 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 28 PID 2088 wrote to memory of 2624 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 29 PID 2088 wrote to memory of 2624 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 29 PID 2088 wrote to memory of 2624 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 29 PID 2088 wrote to memory of 2624 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 29 PID 2088 wrote to memory of 2624 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 29 PID 2088 wrote to memory of 2624 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 29 PID 2088 wrote to memory of 2624 2088 b9dc1399a6f3b9f4e2143f97c8b33c7e.exe 29 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" b9dc1399a6f3b9f4e2143f97c8b33c7e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9dc1399a6f3b9f4e2143f97c8b33c7e.exe"C:\Users\Admin\AppData\Local\Temp\b9dc1399a6f3b9f4e2143f97c8b33c7e.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2088 -
C:\Users\Public\Music\ld11.exeC:\Users\Public\Music\ld11.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:1724
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\dxxdv34567.bat2⤵
- Deletes itself
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249B
MD54f8e06c27d0d557be8be293383bd44bc
SHA1d5adcf73082fbf02b7c9b55f93e8ff9aa99bc213
SHA256780f7f022b878a3e99fdfa085f721109211c271f25066cc9876850066fe58502
SHA512e29e0de5502cc2f4be91392e9982baf3b946b5ddd57edc012586b39bc5e37f1f29f4f758ca338b2ca606cca316b5eff6f64dd0f4555bfe6964c530df5eaf7e07
-
Filesize
100KB
MD5b9dc1399a6f3b9f4e2143f97c8b33c7e
SHA1959a332b99fb39b6e743b9c46cd509906fee23eb
SHA256bdc9d1464bc134fba84ad814eab3901f7f16ec8da8647f1a01aa66e63f69cfd4
SHA512602a3f186e61e1e8bdc402bd2e79fce7c12f7b8e2f595b52b432c2439cc3a587ee47ca7cdcc5f5c59b406099b26a41719d84d11062ab03752d9afe17857dda85