Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
bcb8d7a53953e95be674eed01818bbf6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcb8d7a53953e95be674eed01818bbf6.exe
Resource
win10v2004-20231215-en
General
-
Target
bcb8d7a53953e95be674eed01818bbf6.exe
-
Size
695KB
-
MD5
bcb8d7a53953e95be674eed01818bbf6
-
SHA1
f58c16e1809a4f6cf42e655f52f3c062afb43869
-
SHA256
4c6464e472c0b92872637dfa5e52cc85c0085bafb103cd924199c9fcc49e54ad
-
SHA512
3ad305ed7a09bd4a163a48b7142b3d865d62858e0141580c0ca739397e281bd8aa25c40f508d7c01c21dd941f3cf60a183c337561b1c7e4b0e110b96a8b6cf5c
-
SSDEEP
12288:UsfLEtC11+Ijp3p2/534mWRe9Opi4/n1ZCWXzF3Z4mxxp7Hl8xGhGqupSIu:H5TpeVWAlGrXQmXp7l8EIu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2628 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2616 windwos.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat windwos.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\windwos.exe bcb8d7a53953e95be674eed01818bbf6.exe File created C:\Windows\uninstal.bat bcb8d7a53953e95be674eed01818bbf6.exe File created C:\Windows\windwos.exe bcb8d7a53953e95be674eed01818bbf6.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-5a-bd-a4-4e-e1\WpadDecisionReason = "1" windwos.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-5a-bd-a4-4e-e1\WpadDecisionTime = 603b0ec65f72da01 windwos.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings windwos.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections windwos.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 windwos.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 windwos.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ windwos.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A923B1D-C92F-45D4-9F9F-E7435FE5ECBE}\WpadDecisionReason = "1" windwos.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-5a-bd-a4-4e-e1\WpadDecisionTime = 006d83f75f72da01 windwos.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A923B1D-C92F-45D4-9F9F-E7435FE5ECBE}\WpadDecisionTime = 006d83f75f72da01 windwos.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" windwos.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A923B1D-C92F-45D4-9F9F-E7435FE5ECBE}\WpadDecisionTime = 603b0ec65f72da01 windwos.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A923B1D-C92F-45D4-9F9F-E7435FE5ECBE} windwos.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A923B1D-C92F-45D4-9F9F-E7435FE5ECBE}\fe-5a-bd-a4-4e-e1 windwos.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix windwos.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0086000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 windwos.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad windwos.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-5a-bd-a4-4e-e1 windwos.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-5a-bd-a4-4e-e1\WpadDetectedUrl windwos.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" windwos.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" windwos.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0086000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 windwos.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A923B1D-C92F-45D4-9F9F-E7435FE5ECBE}\WpadDecision = "0" windwos.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-5a-bd-a4-4e-e1\WpadDecision = "0" windwos.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings windwos.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A923B1D-C92F-45D4-9F9F-E7435FE5ECBE}\WpadNetworkName = "Network 3" windwos.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" windwos.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" windwos.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1908 bcb8d7a53953e95be674eed01818bbf6.exe Token: SeDebugPrivilege 2616 windwos.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2616 windwos.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2520 2616 windwos.exe 29 PID 2616 wrote to memory of 2520 2616 windwos.exe 29 PID 2616 wrote to memory of 2520 2616 windwos.exe 29 PID 2616 wrote to memory of 2520 2616 windwos.exe 29 PID 1908 wrote to memory of 2628 1908 bcb8d7a53953e95be674eed01818bbf6.exe 30 PID 1908 wrote to memory of 2628 1908 bcb8d7a53953e95be674eed01818bbf6.exe 30 PID 1908 wrote to memory of 2628 1908 bcb8d7a53953e95be674eed01818bbf6.exe 30 PID 1908 wrote to memory of 2628 1908 bcb8d7a53953e95be674eed01818bbf6.exe 30 PID 1908 wrote to memory of 2628 1908 bcb8d7a53953e95be674eed01818bbf6.exe 30 PID 1908 wrote to memory of 2628 1908 bcb8d7a53953e95be674eed01818bbf6.exe 30 PID 1908 wrote to memory of 2628 1908 bcb8d7a53953e95be674eed01818bbf6.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcb8d7a53953e95be674eed01818bbf6.exe"C:\Users\Admin\AppData\Local\Temp\bcb8d7a53953e95be674eed01818bbf6.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
PID:2628
-
-
C:\Windows\windwos.exeC:\Windows\windwos.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5ab83ea631b923ac15c1e165c931bb4d0
SHA13df5372540c083e82191cc83e59677a1c9256264
SHA2562f5860ac9eff7a3d5fc765d9db5c158b750d42bcfac9c05bb516657bfcb122e7
SHA512559e3535f55321e775a30e61678e639dda2d847c769b826748f5c1a59278b05331329039b3cd3459790d5b361068d36293886e35b26e4e2ab0ebedb0b75884fe
-
Filesize
695KB
MD5bcb8d7a53953e95be674eed01818bbf6
SHA1f58c16e1809a4f6cf42e655f52f3c062afb43869
SHA2564c6464e472c0b92872637dfa5e52cc85c0085bafb103cd924199c9fcc49e54ad
SHA5123ad305ed7a09bd4a163a48b7142b3d865d62858e0141580c0ca739397e281bd8aa25c40f508d7c01c21dd941f3cf60a183c337561b1c7e4b0e110b96a8b6cf5c