Analysis

  • max time kernel
    142s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-03-2024 11:38

General

  • Target

    be838d8a3798aa2c819bc732169c4fda.exe

  • Size

    1.7MB

  • MD5

    be838d8a3798aa2c819bc732169c4fda

  • SHA1

    6947bbafb56885590e82c777b048e57313c1d71d

  • SHA256

    645377175c395442380c5127c969b233e7e419b34699338b35ac12019e9a4d9e

  • SHA512

    bc8091ca319aa4058d37864a757ca108b44ff18da04ddf3dacce6ac3bf943454201aed7047491f4546340fa74456c3a27ce0adf2b60d771606597923d327d41c

  • SSDEEP

    49152:ZdfNsO2VaBicRmu1sJhAb547NSOzAv62Szj4:yWgFiqSOzAv62K4

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 27 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies WinLogon 2 TTPs 4 IoCs
  • Drops file in System32 directory 19 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be838d8a3798aa2c819bc732169c4fda.exe
    "C:\Users\Admin\AppData\Local\Temp\be838d8a3798aa2c819bc732169c4fda.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\SysWOW64\1.exe
      "C:\Windows\system32\1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 156
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2728
    • C:\Windows\SysWOW64\2.exe
      "C:\Windows\system32\2.exe"
      2⤵
      • Executes dropped EXE
      PID:2532
    • C:\Windows\SysWOW64\3.exe
      "C:\Windows\system32\3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\SysWOW64\ntldr\microchip.exe
        "C:\Windows\system32\ntldr\microchip.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Modifies WinLogon
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del /F /Q /A R S H C:\ntldr
          4⤵
            PID:1684
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del /F /S /Q "%USERPROFILE%\Mis Documentos\*.*"
            4⤵
              PID:1608
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del /F /S /Q "%USERPROFILE%\Escritorio\*.*"
              4⤵
                PID:2484
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c copy "%Windir%\System32\ntldr\ntldr\ntldr" C:\ntldr & attrib C:\ntldr +s +h +r
                4⤵
                  PID:2624
                  • C:\Windows\SysWOW64\attrib.exe
                    attrib C:\ntldr +s +h +r
                    5⤵
                    • Sets file to hidden
                    • Views/modifies file attributes
                    PID:1276
              • C:\Windows\SysWOW64\ntldr\microchip.exe
                "C:\Windows\system32\ntldr\microchip.exe"
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Modifies WinLogon
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1208
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del /F /Q /A R S H C:\ntldr
                  4⤵
                    PID:940
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del /F /S /Q "%USERPROFILE%\Mis Documentos\*.*"
                    4⤵
                      PID:904
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del /F /S /Q "%USERPROFILE%\Escritorio\*.*"
                      4⤵
                        PID:1628
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c copy "%Windir%\System32\ntldr\ntldr\ntldr" C:\ntldr & attrib C:\ntldr +s +h +r
                        4⤵
                          PID:2492
                          • C:\Windows\SysWOW64\attrib.exe
                            attrib C:\ntldr +s +h +r
                            5⤵
                            • Sets file to hidden
                            • Views/modifies file attributes
                            PID:2628

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\Microchip\Microchip\Uninstall.exe

                    Filesize

                    139KB

                    MD5

                    865ceb342a822845ae20332d6cfdf6aa

                    SHA1

                    a500757954a2d0e542c7b39bbc421742c219520d

                    SHA256

                    b6dd788e3fd04a83ef5835189c26dde4f8a99a81b44ab4c2ba730933cf8e83bd

                    SHA512

                    00a8f79f41b1fd8d469155319e1c9f7903d6723b53706ea219ae1b0516e1af532440d33756409c714003336992ad2ef5ebe7602dd878ec22a26d1a5a43f92f03

                  • C:\Windows\SysWOW64\ntldr\MSVCR71.dll

                    Filesize

                    340KB

                    MD5

                    86f1895ae8c5e8b17d99ece768a70732

                    SHA1

                    d5502a1d00787d68f548ddeebbde1eca5e2b38ca

                    SHA256

                    8094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe

                    SHA512

                    3b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da

                  • C:\Windows\SysWOW64\ntldr\PYTHON25.DLL

                    Filesize

                    1.4MB

                    MD5

                    2184186bccb8efb96d7937a3ce941fb1

                    SHA1

                    7d712bf03cdcf3c896800c7f0ebc0b4549a4241d

                    SHA256

                    f4d4cadec6c957ac5f0674818c615ef265d8ab615b6eed92e1cfb19c18d31a09

                    SHA512

                    ae23d31e3b5c3275c332d851610c4d3a4c2e7deae38c12b3aa0192eca032f5bba6f229606ee9aa72562af84ccc8876245636be63e4b5534a9c4348008a3259fd

                  • C:\Windows\SysWOW64\ntldr\library.zip

                    Filesize

                    697KB

                    MD5

                    e916ec0eed4151e5032932dd8c936019

                    SHA1

                    b0a88455422b9464ff52ec21b46b4e11ce883b94

                    SHA256

                    44a7f696cf694790f74c2504563f88fd0b34f032ad36092cd5386775644d5c9c

                    SHA512

                    e00bf5bf8be40547edb4cb967e3acea3f2052683b0fce62b15ce8597e3690a35594e52a6d728b1d5f9d4e42dd38d0791b72f55e7c491191dde7c53f23b6b4b5a

                  • C:\Windows\SysWOW64\ntldr\ntldr\ntldr

                    Filesize

                    244KB

                    MD5

                    05265c7fc6e3d7fb619431126f686034

                    SHA1

                    b4261ebfd2236e5d032e0af7f0d423b375d960cc

                    SHA256

                    680feafa67645a33104ef85d68b5f3914288a9263353884135f9656f2fd44823

                    SHA512

                    5e0e815c28a217162c63081d74f8f9cb490e2ed734b21dbc05579949d74fe9d09f702ea5b8761f09ff3067a07a5f208d4e47b03df390bf9d3f1e72e69f5c7ddb

                  • \Windows\SysWOW64\1.exe

                    Filesize

                    185KB

                    MD5

                    bef840968d6ff6f2754a8509fc6ce51f

                    SHA1

                    6367786c504ef3710c2e6239db669bfead79d42f

                    SHA256

                    62e86f9fc8818e3a0efaea2b7970730e094633df4055f1cfa61c269ae30764b8

                    SHA512

                    39cfa8e18b9f1cb9d11148dc695658fd5407ecbde27f3b0aee07eb0b8b8e5a5987a85182d46c30dac57705b262b6cecd7341cf198a515405328e90e1e066ff6b

                  • \Windows\SysWOW64\2.exe

                    Filesize

                    101KB

                    MD5

                    a2667bd36a0f42ce854f0ac2d3eb2ba3

                    SHA1

                    8090a0264ec11e0234c6410d24bf8093b8f91b0d

                    SHA256

                    af170aae7d7af56be028b53bbdaff80371182d9d78bb86f62adb6b8640d767ba

                    SHA512

                    cb85875625e6e9db2f946680ebfa280087d53f671f6f428d23f9c43d960c7f305efc0ebdffeb885e989ff04a5a6afe9adcc8f0135f0cc833bebbc317501e76d7

                  • \Windows\SysWOW64\3.exe

                    Filesize

                    1.4MB

                    MD5

                    26bf74b7c38ade9642c468961bdd4215

                    SHA1

                    9114d22c3853eab07f4202edb886428ce5c84ba9

                    SHA256

                    46b125b11adb761bb021146df810a01d7d3a9a3f95f130ded2b9c92a66d7f916

                    SHA512

                    e0e74feefa92ec3a05176a8ca0fdff680a388d627dda6ae51a1ba703240000dc5de0ee56606f33b2ab40ba920c3f2bafd62b03dd08b0bf9242a80fc99542c9f3

                  • \Windows\SysWOW64\ntldr\microchip.exe

                    Filesize

                    20KB

                    MD5

                    b32825070b5c22eeab8465ed5e20d5cb

                    SHA1

                    3287631708e655476d1202110c45331084e4fec4

                    SHA256

                    c7a18f8a39886bcbc2d33baa0d2f1a5ed33eba02c900211f57743330a58d3361

                    SHA512

                    07f25f9b8816e5d04c313f2a3a3e63cade06455983ae028ad54a845ebfc3721ec0de49d1803a8b8d9572aa45d750b4743a1d57ba2fcf68e01ea34641fac7e885

                  • \Windows\SysWOW64\ntldr\python25.dll

                    Filesize

                    1.4MB

                    MD5

                    b3cb086fe4dce5b3b07e933f079f6ddf

                    SHA1

                    70902558db425af5d5dbb0e9b24484f17ac2d569

                    SHA256

                    9dffebf464f3aa1043110a85fb89d2590785a1cb551556150704526cac3395be

                    SHA512

                    9432f023f5035de69b57ca6c85bd753249ea6f588f970ac83ec4bba2f49f08b554b0135523490ec792dc538e095ea3020d0ebe626c6ca42b02896f1d7a4c4f2e

                  • \Windows\SysWOW64\ntldr\python25.dll

                    Filesize

                    1.4MB

                    MD5

                    162a853d734a4120466df35c2b2cde8b

                    SHA1

                    ceac5424383273d5b9a74bd8ad527eb21caecb08

                    SHA256

                    510a450f5067800c0cfe623f5b52d2ceee82a4bb9e7d747f58b35c651930fae5

                    SHA512

                    324cd19cc534debcdec081d301c747e89e7177c99ed19719ae579f1a4dd98d5023b5907c6a9e3b871c4b9be864d3726c5ec910fc17862087e37dc55e0c0a1977

                  • memory/1284-20-0x0000000003300000-0x000000000332D000-memory.dmp

                    Filesize

                    180KB

                  • memory/1284-5-0x0000000003300000-0x000000000333B000-memory.dmp

                    Filesize

                    236KB

                  • memory/2300-98-0x0000000000D60000-0x0000000000D9B000-memory.dmp

                    Filesize

                    236KB

                  • memory/2532-25-0x0000000000400000-0x000000000042D000-memory.dmp

                    Filesize

                    180KB

                  • memory/2532-24-0x0000000000400000-0x000000000042D000-memory.dmp

                    Filesize

                    180KB

                  • memory/2672-79-0x0000000000400000-0x0000000000422000-memory.dmp

                    Filesize

                    136KB