Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/inst.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/inst.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
General
-
Target
027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe
-
Size
199KB
-
MD5
310020d11dca5daa292c6d121ce044e0
-
SHA1
974b85852d942d4bcf7fba23fc417d9083c1fb7d
-
SHA256
027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20
-
SHA512
39e7f13bb2a2e17f3a7e057a11567e1f70494181a08fe7d0847917677b8a4320c74105666b007bd25f697a739dc244fa12d2aac10e4ad0ce99597d01e3c729e7
-
SSDEEP
6144:FsaocyLCxJy0823optx30uY4OifzyHFuNn:FtobQy089tx3DYfGzyluNn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2052 inst.exe 2508 4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe -
Loads dropped DLL 3 IoCs
pid Process 1312 027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe 1312 027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe 1312 027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81 inst.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 0f000000010000001400000085fef11b4f47fe3952f98301c9f98976fefee0ce09000000010000002a000000302806082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030353000000010000002500000030233021060b6086480186f8450107300130123010060a2b0601040182373c0101030200c01400000001000000140000007b5b45cfafcecb7afd31921a6ab6f346eb5748501d00000001000000100000005b3b67000eeb80022e42605b6b3b72400b000000010000000e000000740068006100770074006500000003000000010000001400000091c6d6ee3e8ac86384e548c299295c756c817b812000000001000000240400003082042030820308a0030201020210344ed55720d5edec49f42fce37db2b6d300d06092a864886f70d01010505003081a9310b300906035504061302555331153013060355040a130c7468617774652c20496e632e31283026060355040b131f43657274696669636174696f6e205365727669636573204469766973696f6e31383036060355040b132f2863292032303036207468617774652c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79311f301d06035504031316746861777465205072696d61727920526f6f74204341301e170d3036313131373030303030305a170d3336303731363233353935395a3081a9310b300906035504061302555331153013060355040a130c7468617774652c20496e632e31283026060355040b131f43657274696669636174696f6e205365727669636573204469766973696f6e31383036060355040b132f2863292032303036207468617774652c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79311f301d06035504031316746861777465205072696d61727920526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100aca0f0fb8059d49cc7a4cf9da159730910450c0d2c6e68f16c5b4868495937fc0b3319c2777fcc102d95341ce6eb4d09a71cd2b8c9973602b789d4245f06c0cc4494948d02626feb5add118d289a5c8490107a0dbd74662f6a38a0e2d55444eb1d079f07ba6feee9fd4e0b29f53e84a001f19cabf81c7e89a4e8a1d871650da3517beebcd222600db95b9ddfbafc515b0baf98b2e92ee904e86287de2bc8d74ec14c641eddcf8758ba4a4fca68071d1c9d4ac6d52f91cc7c71721cc5c067eb32fdc9925c94da85c09bbf537d2b09f48c9d911f976a52cbde0936a477d87b875044d53e6e2969fb3949261e09a5807b402debe82785c9fe61fd7ee67c971dd59d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e041604147b5b45cfafcecb7afd31921a6ab6f346eb574850300d06092a864886f70d010105050003820101007911c04bb391b6fcf0e967d40d6e45be55e893d2ce033fedda25b01d57cb1e3a76a04cec5076e864720ca4a9f1b88bd6d68784bb32e54111c077d9b3609deb1bd5d16e4444a9a601ec55621d77b85c8e48497c9c3b5711acad73378e2f785c906847d96060e6fc073d222017c4f716e9c4d872f9c8737cdf162f15a93efd6a27b6a1eb5aba981fd5e34d640a9d13c861baf5391c87bab8bd7b227ff6feac4079e5ac106f3d8f1b79768bc437b3211884e53600eb632099b9e9fe3304bb41c8c102f94463209e81ce42d3d63f2c76d3639c59dd8fa6e10ea02e41f72e9547cfbcfd33f3f60b617e7e912b8147c22730eea7105d378f5c392be404f07b8d568c68 inst.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 190000000100000010000000dc73f9b71e16d51d26527d32b11a6a3d03000000010000001400000091c6d6ee3e8ac86384e548c299295c756c817b810b000000010000000e00000074006800610077007400650000001d00000001000000100000005b3b67000eeb80022e42605b6b3b72401400000001000000140000007b5b45cfafcecb7afd31921a6ab6f346eb57485053000000010000002500000030233021060b6086480186f8450107300130123010060a2b0601040182373c0101030200c009000000010000002a000000302806082b0601050507030106082b0601050507030206082b0601050507030406082b060105050703030f000000010000001400000085fef11b4f47fe3952f98301c9f98976fefee0ce2000000001000000240400003082042030820308a0030201020210344ed55720d5edec49f42fce37db2b6d300d06092a864886f70d01010505003081a9310b300906035504061302555331153013060355040a130c7468617774652c20496e632e31283026060355040b131f43657274696669636174696f6e205365727669636573204469766973696f6e31383036060355040b132f2863292032303036207468617774652c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79311f301d06035504031316746861777465205072696d61727920526f6f74204341301e170d3036313131373030303030305a170d3336303731363233353935395a3081a9310b300906035504061302555331153013060355040a130c7468617774652c20496e632e31283026060355040b131f43657274696669636174696f6e205365727669636573204469766973696f6e31383036060355040b132f2863292032303036207468617774652c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79311f301d06035504031316746861777465205072696d61727920526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100aca0f0fb8059d49cc7a4cf9da159730910450c0d2c6e68f16c5b4868495937fc0b3319c2777fcc102d95341ce6eb4d09a71cd2b8c9973602b789d4245f06c0cc4494948d02626feb5add118d289a5c8490107a0dbd74662f6a38a0e2d55444eb1d079f07ba6feee9fd4e0b29f53e84a001f19cabf81c7e89a4e8a1d871650da3517beebcd222600db95b9ddfbafc515b0baf98b2e92ee904e86287de2bc8d74ec14c641eddcf8758ba4a4fca68071d1c9d4ac6d52f91cc7c71721cc5c067eb32fdc9925c94da85c09bbf537d2b09f48c9d911f976a52cbde0936a477d87b875044d53e6e2969fb3949261e09a5807b402debe82785c9fe61fd7ee67c971dd59d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e041604147b5b45cfafcecb7afd31921a6ab6f346eb574850300d06092a864886f70d010105050003820101007911c04bb391b6fcf0e967d40d6e45be55e893d2ce033fedda25b01d57cb1e3a76a04cec5076e864720ca4a9f1b88bd6d68784bb32e54111c077d9b3609deb1bd5d16e4444a9a601ec55621d77b85c8e48497c9c3b5711acad73378e2f785c906847d96060e6fc073d222017c4f716e9c4d872f9c8737cdf162f15a93efd6a27b6a1eb5aba981fd5e34d640a9d13c861baf5391c87bab8bd7b227ff6feac4079e5ac106f3d8f1b79768bc437b3211884e53600eb632099b9e9fe3304bb41c8c102f94463209e81ce42d3d63f2c76d3639c59dd8fa6e10ea02e41f72e9547cfbcfd33f3f60b617e7e912b8147c22730eea7105d378f5c392be404f07b8d568c68 inst.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 inst.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2508 4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2508 4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe 2508 4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2052 1312 027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe 28 PID 1312 wrote to memory of 2052 1312 027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe 28 PID 1312 wrote to memory of 2052 1312 027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe 28 PID 1312 wrote to memory of 2052 1312 027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe 28 PID 2052 wrote to memory of 2508 2052 inst.exe 30 PID 2052 wrote to memory of 2508 2052 inst.exe 30 PID 2052 wrote to memory of 2508 2052 inst.exe 30 PID 2052 wrote to memory of 2508 2052 inst.exe 30 PID 2052 wrote to memory of 2508 2052 inst.exe 30 PID 2052 wrote to memory of 2508 2052 inst.exe 30 PID 2052 wrote to memory of 2508 2052 inst.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe"C:\Users\Admin\AppData\Local\Temp\027224e42ddba610a50c3bd948d8c81d824de1adc8d031808c6a65d3c291ac20.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\nsy259C.tmp\inst.exeC:\Users\Admin\AppData\Local\Temp\nsy259C.tmp\inst.exe 4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe /dT131491501S /e4813309 /t /u4e9422ac-75a8-4a0f-9b5b-46785bc06f2f2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\nsy259C.tmp\4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe"C:\Users\Admin\AppData\Local\Temp\nsy259C.tmp\4e9422ac-75a8-4a0f-9b5b-46785bc06f2f.exe" /dT131491501S /e4813309 /t /u4e9422ac-75a8-4a0f-9b5b-46785bc06f2f3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30
Filesize1KB
MD53f4f56ba8e6d4467067ab67d38382af2
SHA1507bdd129d7e01a8b3f6da087454d4638283b7e9
SHA25624bcfb5601bfc7f9140013257df5767a2974e0f3182f7df060c026d3be21cc0f
SHA5123e2a37b61cbc1d7d28d8c6ef772098b523af071e870348e7e233d01ceee52de72ece9445cb622805b283dc19cacfe83ac6f8508711432e3dd473fed5d3b744f2
-
Filesize
604B
MD5a8c8eb8bf71ea727e35148b09b26fec7
SHA1f4ab4a15766b9d1e7253ecbb20973af8affbdb7c
SHA25621c9949032173647ca9cd7fd03822577e2eaeefa0954974f9dd8a9d7ed4c0e13
SHA512dc04414bf8dd78dafef8d5582ced4c8ab9e466354c03ddaa3014c1400934692a4dbabbf6200616e5364b4a69ce4192f283852a126c1e938a1705cd005d0c6d55
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959
Filesize5B
MD54842e206e4cfff2954901467ad54169e
SHA180c9820ff2efe8aa3d361df7011ae6eee35ec4f0
SHA2562acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e
SHA512ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30
Filesize412B
MD599f6c429751585268df81728720b62c4
SHA1401a23d667af4d7639b3e90a27b0514f5c0b1851
SHA256f8e74e69e1a8f794b101ad6d661bf3d5637cd8a198a75473141e656e041d274b
SHA512715a48db7516c773e8cc1e369db56c3cb196e2832aabfe97dab70ae50019fafc4d082480e7b649345eb5191928568192c7d36238b25bc461ceb41c4b557cdd89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B
Filesize188B
MD51d615e28530155789b6635f3173508a3
SHA114031a93aafd44bff164f80873a0da715c302756
SHA256c7d365e696a821da7bea19e144fc77893d028b48a9e85873e438d46b7b8a1ebb
SHA5123388b12c4cef66da2743ca0dedc80fa194625145b1017872c0e7c5ace7d555da0c597f5ba51207606fd55bef82f627beee579d59cfe08b0e9217618524f9260f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3d6880c30cdce7709405cee527e61f1
SHA1e8981e8454ad61208cb160e9c5a1d7f0836bd6e1
SHA25696243becb8f3a0c58460f49e1b1a056ceb2d89a2ab4ce0b7511e03583158436c
SHA5123559805b0043c425488e045e9ec05771068a3f18aaad67d0d9a7d4c7b1b20feacc496ffbcd9ab27e1bb6f1324cb5a8d2ff66bf230b394eace75dca3fd149a37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9
Filesize404B
MD59b482c8bc973c169e2ce63ac13faaef0
SHA1e21f412241adf227fd13387bb3c30d5b9153febe
SHA256f7438af04bc86da07569ca72d299464cf5057866c9a919048aa6cbf3c9d5aaa3
SHA51289efb7bf1adf800cd28c8b250dd7b0bebc67bbfb005f05faa3ca0758bca64ee16ae29007f0c62118a84b706a085e1316d20d0c381f3eddce8a83688aacc608e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959
Filesize482B
MD57167e67056a889da7ecc2f58a30a9110
SHA1d558a13afef8976eedbce2f667c7dd33c30efa70
SHA256b9d82186c3d44b92c426662c2df715f942231a18acf7f73f2e76e74063dc94ad
SHA51207f91beaa579e1bb912116186ee97622dab01efd8553701d10ff0c099153a947fc84c71ff8aa93e55aecbcdee2f7a4907695d12aa030607850008e6cab8af3cc
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
163KB
MD5c79eb4f84596b7e43f7800b158c034c4
SHA123c3184f55dc9dce991662f5fd38d95054930f56
SHA256a153b4705136b923cfc8fcf3fc7cee6539039f410abc99719ff5edb8ef3c23ec
SHA5125f5eeeb35ecfc95fdf306c2e984ffc0c610c295b3e35fdd9f87d6f03362210e66155910aa16c31ef35162a39a536ee9e0c57463f3d5081e2185e905e9cd759a9
-
Filesize
143KB
MD50f9c02df96da8a059c83ddfcfc0f8c6a
SHA12a3fa9056603c843a4c086136557c4ad9cd190c3
SHA25656099fbbb997f4fdee7bcb8fabe62f3d49273028bcee7f12018e6c18b54af455
SHA5121481ca881e19074da73a46009d35d12e4221ec6f8c9aefe007a0a9d12d52eef4db6c5a38dfda18922d0fffd519c15032997df1df7c79f93361650f91476bbe7b
-
Filesize
8KB
MD5249ae678f0dac4c625c6de6aca53823a
SHA16ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201
SHA2567298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce
SHA51266e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7