Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 10:01

General

  • Target

    baf8f498549a0c7fe9887400e7b44e5c.exe

  • Size

    201KB

  • MD5

    baf8f498549a0c7fe9887400e7b44e5c

  • SHA1

    3ee9890309714072e8a22633a8b7ac3e6cec1720

  • SHA256

    d4c1c18012d84abc332a82ada956555289e86494d3a4b99febd7ee6a497afc75

  • SHA512

    cd77add984851010083e1d45d4e571cba8cc4e0ad9a63bb95d2e5737da6440ee1124328c5aceb669b339b22f30397ba043576825cbdf09d8be966be5cbf413d3

  • SSDEEP

    3072:xlbVxDAcCV0GYUdNvH6gomuVqdh+D5ib3UkXXHoamErz8/Xhg7Jkm5R:XV+0GYU7vH0/VQqEr8a9

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\baf8f498549a0c7fe9887400e7b44e5c.exe
    "C:\Users\Admin\AppData\Local\Temp\baf8f498549a0c7fe9887400e7b44e5c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\baf8f498549a0c7fe9887400e7b44e5c.exe
      baf8f498549a0c7fe9887400e7b44e5c.exe
      2⤵
        PID:2504
      • C:\Users\Admin\AppData\Local\Temp\baf8f498549a0c7fe9887400e7b44e5c.exe
        baf8f498549a0c7fe9887400e7b44e5c.exe
        2⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 /s C:\msinet.ocx
          3⤵
          • Modifies registry class
          PID:2772
        • C:\windows\SysWOW64\svshost.exe
          C:\windows\system32\svshost.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\windows\SysWOW64\svshost.exe
            svshost.exe
            4⤵
              PID:2728
            • C:\windows\SysWOW64\svshost.exe
              svshost.exe
              4⤵
              • UAC bypass
              • Executes dropped EXE
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Modifies Internet Explorer settings
              • Modifies Internet Explorer start page
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:2736
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h +s C:\windows\system32\svshost.exe
            3⤵
            • Drops file in System32 directory
            • Views/modifies file attributes
            PID:2424

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\msinet.ocx

              Filesize

              112KB

              MD5

              7bec181a21753498b6bd001c42a42722

              SHA1

              3249f233657dc66632c0539c47895bfcee5770cc

              SHA256

              73da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31

              SHA512

              d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc

            • \Windows\SysWOW64\svshost.exe

              Filesize

              49KB

              MD5

              73ad74827f32e4d57204b617930b8dbc

              SHA1

              894270abdf29c079715846f48b5d7fc5ce599be0

              SHA256

              2ac4ec5fe940b2b7b7c1449c7855e1265e5fa7f52cd072f237489e1421759342

              SHA512

              275ec540d378940178d0cc288b5e6c3219dfe67a35a41cff763e1ff099fe6685d503c13c3d54e8489c3e61b44f3c42f6d21a0a6f69454ace83e2b4ea9117b840

            • memory/1600-1-0x00000000746D0000-0x0000000074C7B000-memory.dmp

              Filesize

              5.7MB

            • memory/1600-0-0x00000000746D0000-0x0000000074C7B000-memory.dmp

              Filesize

              5.7MB

            • memory/1600-2-0x0000000000C40000-0x0000000000C80000-memory.dmp

              Filesize

              256KB

            • memory/1600-12-0x00000000746D0000-0x0000000074C7B000-memory.dmp

              Filesize

              5.7MB

            • memory/2664-24-0x0000000000470000-0x00000000004B0000-memory.dmp

              Filesize

              256KB

            • memory/2664-35-0x0000000074120000-0x00000000746CB000-memory.dmp

              Filesize

              5.7MB

            • memory/2664-27-0x0000000074120000-0x00000000746CB000-memory.dmp

              Filesize

              5.7MB

            • memory/2664-23-0x0000000074120000-0x00000000746CB000-memory.dmp

              Filesize

              5.7MB

            • memory/2736-34-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/2736-31-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/2736-48-0x0000000005290000-0x0000000005479000-memory.dmp

              Filesize

              1.9MB

            • memory/2736-25-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/2736-46-0x0000000004FB0000-0x0000000005125000-memory.dmp

              Filesize

              1.5MB

            • memory/2736-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2736-28-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/2736-26-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/2900-9-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2900-5-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2900-4-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2900-3-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2900-11-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2900-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB