Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
ba7ff1c7291fffc5d73975abe06f43ee.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba7ff1c7291fffc5d73975abe06f43ee.exe
Resource
win10v2004-20240226-en
General
-
Target
ba7ff1c7291fffc5d73975abe06f43ee.exe
-
Size
293KB
-
MD5
ba7ff1c7291fffc5d73975abe06f43ee
-
SHA1
c8d590b0cf3fd32d86aa6c60dbc13fbbd3db0994
-
SHA256
27bb67656f06fc1a191945ccb9c3901a6fa1f120dc9683c8e52a16d93c7643bb
-
SHA512
02a0e205a8abe8ff7600867ed2174b497275fc8c48fe3c624cc3705e695303c90414712713f137ae71292ab8c735b9f22303b23b970f0524f41a2e2141fcc241
-
SSDEEP
6144:GPdMcMANEVzGlcEDUl4qaRYVQ9JTGbusJRhgnGXcND7Xm2BeddhMHH6li:iNEh8cSLqd+sisDhgnGCBBedDMn6A
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1432 efot.exe -
Loads dropped DLL 2 IoCs
pid Process 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\{9001F4C8-8465-AD4E-4A54-86C64CCDA5DB} = "C:\\Users\\Admin\\AppData\\Roaming\\Acqao\\efot.exe" efot.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1132 set thread context of 2316 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Privacy ba7ff1c7291fffc5d73975abe06f43ee.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" ba7ff1c7291fffc5d73975abe06f43ee.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe 1432 efot.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe Token: SeSecurityPrivilege 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe Token: SeSecurityPrivilege 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 1432 efot.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1432 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 28 PID 1132 wrote to memory of 1432 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 28 PID 1132 wrote to memory of 1432 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 28 PID 1132 wrote to memory of 1432 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 28 PID 1432 wrote to memory of 1116 1432 efot.exe 19 PID 1432 wrote to memory of 1116 1432 efot.exe 19 PID 1432 wrote to memory of 1116 1432 efot.exe 19 PID 1432 wrote to memory of 1116 1432 efot.exe 19 PID 1432 wrote to memory of 1116 1432 efot.exe 19 PID 1432 wrote to memory of 1176 1432 efot.exe 20 PID 1432 wrote to memory of 1176 1432 efot.exe 20 PID 1432 wrote to memory of 1176 1432 efot.exe 20 PID 1432 wrote to memory of 1176 1432 efot.exe 20 PID 1432 wrote to memory of 1176 1432 efot.exe 20 PID 1432 wrote to memory of 1208 1432 efot.exe 21 PID 1432 wrote to memory of 1208 1432 efot.exe 21 PID 1432 wrote to memory of 1208 1432 efot.exe 21 PID 1432 wrote to memory of 1208 1432 efot.exe 21 PID 1432 wrote to memory of 1208 1432 efot.exe 21 PID 1432 wrote to memory of 1636 1432 efot.exe 23 PID 1432 wrote to memory of 1636 1432 efot.exe 23 PID 1432 wrote to memory of 1636 1432 efot.exe 23 PID 1432 wrote to memory of 1636 1432 efot.exe 23 PID 1432 wrote to memory of 1636 1432 efot.exe 23 PID 1432 wrote to memory of 1132 1432 efot.exe 27 PID 1432 wrote to memory of 1132 1432 efot.exe 27 PID 1432 wrote to memory of 1132 1432 efot.exe 27 PID 1432 wrote to memory of 1132 1432 efot.exe 27 PID 1432 wrote to memory of 1132 1432 efot.exe 27 PID 1132 wrote to memory of 2316 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 29 PID 1132 wrote to memory of 2316 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 29 PID 1132 wrote to memory of 2316 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 29 PID 1132 wrote to memory of 2316 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 29 PID 1132 wrote to memory of 2316 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 29 PID 1132 wrote to memory of 2316 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 29 PID 1132 wrote to memory of 2316 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 29 PID 1132 wrote to memory of 2316 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 29 PID 1132 wrote to memory of 2316 1132 ba7ff1c7291fffc5d73975abe06f43ee.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\ba7ff1c7291fffc5d73975abe06f43ee.exe"C:\Users\Admin\AppData\Local\Temp\ba7ff1c7291fffc5d73975abe06f43ee.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Roaming\Acqao\efot.exe"C:\Users\Admin\AppData\Roaming\Acqao\efot.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp480b6e6d.bat"3⤵
- Deletes itself
PID:2316
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5c48b8201c8e62875ae544fade141f69d
SHA12d0aef75a777f225212873b99ab058408497be0d
SHA2568cc1faab2708d2ef0f8f6ae831de9a7a9d0c98e627054592d85f11884b0baa51
SHA512af08987555470ad47da271074d8e59a2951616d8f6237f0150cab5a64c31085a8d4c39c4d63c1dcb98ffe12be1960ba42dfa24a376959b686266e889c8409b24
-
Filesize
366B
MD5412bda50cca7a9b7a308caa5cadb7321
SHA1e86867d5ec3b86cc84fc1a887779b17c0dd3d151
SHA256312be804def7b428d9c072ff820fd8233f88a1e88d66718e30685c296b07a0fa
SHA512e6faf07a018b67bf20cf1c90b02eb69577b675a4e333471188f7884620bad6f2850f07091dddb2e9ecc2b4bdc41c4b367b46aa92ca9ffa45f56c533bf9daf054
-
Filesize
293KB
MD5cd111d51fb535a1ab5407d80216ce05a
SHA19ac63f236f3c9ec8823bd2261fdaf282d57c74f4
SHA2566ef0db9a86500b343386cb3b85fe11e6e31e54c834cf046dd5c1d77d8244c723
SHA5121f64dca3e5d6ced04f0c8e17332ac4d3371060b2d3ba7ebe3e7d84622009d958374ebc070b2982fbc076fff338f4a895d4c97e930e79d935c55d34dcf5129cca