Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
be838d8a3798aa2c819bc732169c4fda.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be838d8a3798aa2c819bc732169c4fda.exe
Resource
win10v2004-20240226-en
General
-
Target
be838d8a3798aa2c819bc732169c4fda.exe
-
Size
1.7MB
-
MD5
be838d8a3798aa2c819bc732169c4fda
-
SHA1
6947bbafb56885590e82c777b048e57313c1d71d
-
SHA256
645377175c395442380c5127c969b233e7e419b34699338b35ac12019e9a4d9e
-
SHA512
bc8091ca319aa4058d37864a757ca108b44ff18da04ddf3dacce6ac3bf943454201aed7047491f4546340fa74456c3a27ce0adf2b60d771606597923d327d41c
-
SSDEEP
49152:ZdfNsO2VaBicRmu1sJhAb547NSOzAv62Szj4:yWgFiqSOzAv62K4
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2628 attrib.exe 1276 attrib.exe -
Executes dropped EXE 5 IoCs
pid Process 2300 1.exe 2532 2.exe 2672 3.exe 2892 microchip.exe 1208 microchip.exe -
Loads dropped DLL 27 IoCs
pid Process 1284 be838d8a3798aa2c819bc732169c4fda.exe 1284 be838d8a3798aa2c819bc732169c4fda.exe 1284 be838d8a3798aa2c819bc732169c4fda.exe 1284 be838d8a3798aa2c819bc732169c4fda.exe 1284 be838d8a3798aa2c819bc732169c4fda.exe 2728 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe 2672 3.exe 2672 3.exe 2672 3.exe 2728 WerFault.exe 2672 3.exe 2672 3.exe 2672 3.exe 2672 3.exe 2892 microchip.exe 1208 microchip.exe 1208 microchip.exe 1208 microchip.exe 1208 microchip.exe 2892 microchip.exe 2892 microchip.exe 2892 microchip.exe 2892 microchip.exe 1208 microchip.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Intel = "C:\\WINDOWS\\System32\\cmd.exe" microchip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Intel = "C:\\WINDOWS\\System32\\cmd.exe" microchip.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Intel = "C:\\WINDOWS\\System32\\cmd.exe" microchip.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Intel = "C:\\WINDOWS\\System32\\cmd.exe" microchip.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "MICROCHIP SAY NO TE FREGUE POR COMPLETO LA PC POR BUENA GENTE" microchip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "MICROCHIP SAY USA UN MEJOR ANTIVIRUS LA SGTE QUE ENTRE AQUI TE QUEMO LA PC!!!" microchip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "MICROCHIP SAY NO TE FREGUE POR COMPLETO LA PC POR BUENA GENTE" microchip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "MICROCHIP SAY USA UN MEJOR ANTIVIRUS LA SGTE QUE ENTRE AQUI TE QUEMO LA PC!!!" microchip.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntldr\python25.dll 3.exe File opened for modification C:\Windows\SysWOW64\ntldr\microchip.exe 3.exe File created C:\Windows\SysWOW64\ntldr\python25.dll 3.exe File created C:\Windows\SysWOW64\ntldr\unicodedata.pyd 3.exe File opened for modification C:\Windows\SysWOW64\ntldr\unicodedata.pyd 3.exe File opened for modification C:\Windows\SysWOW64\1.exe be838d8a3798aa2c819bc732169c4fda.exe File created C:\Windows\SysWOW64\ntldr\bz2.pyd 3.exe File opened for modification C:\Windows\SysWOW64\ntldr\bz2.pyd 3.exe File created C:\Windows\SysWOW64\ntldr\library.zip 3.exe File created C:\Windows\SysWOW64\ntldr\MSVCR71.dll 3.exe File created C:\Windows\SysWOW64\ntldr\ntldr\ntldr 3.exe File opened for modification C:\Windows\SysWOW64\ntldr\ntldr\ntldr 3.exe File opened for modification C:\Windows\SysWOW64\2.exe be838d8a3798aa2c819bc732169c4fda.exe File opened for modification C:\Windows\SysWOW64\ntldr\library.zip 3.exe File created C:\Windows\SysWOW64\ntldr\microchip.exe 3.exe File opened for modification C:\Windows\SysWOW64\ntldr\MSVCR71.dll 3.exe File created C:\Windows\SysWOW64\ntldr\w9xpopen.exe 3.exe File opened for modification C:\Windows\SysWOW64\ntldr\w9xpopen.exe 3.exe File opened for modification C:\Windows\SysWOW64\3.exe be838d8a3798aa2c819bc732169c4fda.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microchip\Microchip\Uninstall.exe 3.exe File opened for modification C:\Program Files (x86)\Microchip\Microchip\Uninstall.exe 3.exe File created C:\Program Files (x86)\Microchip\Microchip\Uninstall.ini 3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2728 2300 WerFault.exe 28 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "INFECTADO POR MICROCHIP" microchip.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "INFECTADO POR MICROCHIP" microchip.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2892 microchip.exe Token: SeBackupPrivilege 2892 microchip.exe Token: SeRestorePrivilege 1208 microchip.exe Token: SeBackupPrivilege 1208 microchip.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1284 be838d8a3798aa2c819bc732169c4fda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2300 1284 be838d8a3798aa2c819bc732169c4fda.exe 28 PID 1284 wrote to memory of 2300 1284 be838d8a3798aa2c819bc732169c4fda.exe 28 PID 1284 wrote to memory of 2300 1284 be838d8a3798aa2c819bc732169c4fda.exe 28 PID 1284 wrote to memory of 2300 1284 be838d8a3798aa2c819bc732169c4fda.exe 28 PID 1284 wrote to memory of 2532 1284 be838d8a3798aa2c819bc732169c4fda.exe 29 PID 1284 wrote to memory of 2532 1284 be838d8a3798aa2c819bc732169c4fda.exe 29 PID 1284 wrote to memory of 2532 1284 be838d8a3798aa2c819bc732169c4fda.exe 29 PID 1284 wrote to memory of 2532 1284 be838d8a3798aa2c819bc732169c4fda.exe 29 PID 2300 wrote to memory of 2728 2300 1.exe 30 PID 2300 wrote to memory of 2728 2300 1.exe 30 PID 2300 wrote to memory of 2728 2300 1.exe 30 PID 2300 wrote to memory of 2728 2300 1.exe 30 PID 1284 wrote to memory of 2672 1284 be838d8a3798aa2c819bc732169c4fda.exe 31 PID 1284 wrote to memory of 2672 1284 be838d8a3798aa2c819bc732169c4fda.exe 31 PID 1284 wrote to memory of 2672 1284 be838d8a3798aa2c819bc732169c4fda.exe 31 PID 1284 wrote to memory of 2672 1284 be838d8a3798aa2c819bc732169c4fda.exe 31 PID 1284 wrote to memory of 2672 1284 be838d8a3798aa2c819bc732169c4fda.exe 31 PID 1284 wrote to memory of 2672 1284 be838d8a3798aa2c819bc732169c4fda.exe 31 PID 1284 wrote to memory of 2672 1284 be838d8a3798aa2c819bc732169c4fda.exe 31 PID 2672 wrote to memory of 2892 2672 3.exe 32 PID 2672 wrote to memory of 2892 2672 3.exe 32 PID 2672 wrote to memory of 2892 2672 3.exe 32 PID 2672 wrote to memory of 2892 2672 3.exe 32 PID 2672 wrote to memory of 2892 2672 3.exe 32 PID 2672 wrote to memory of 2892 2672 3.exe 32 PID 2672 wrote to memory of 2892 2672 3.exe 32 PID 2672 wrote to memory of 1208 2672 3.exe 34 PID 2672 wrote to memory of 1208 2672 3.exe 34 PID 2672 wrote to memory of 1208 2672 3.exe 34 PID 2672 wrote to memory of 1208 2672 3.exe 34 PID 2672 wrote to memory of 1208 2672 3.exe 34 PID 2672 wrote to memory of 1208 2672 3.exe 34 PID 2672 wrote to memory of 1208 2672 3.exe 34 PID 2892 wrote to memory of 1684 2892 microchip.exe 36 PID 2892 wrote to memory of 1684 2892 microchip.exe 36 PID 2892 wrote to memory of 1684 2892 microchip.exe 36 PID 2892 wrote to memory of 1684 2892 microchip.exe 36 PID 2892 wrote to memory of 1684 2892 microchip.exe 36 PID 2892 wrote to memory of 1684 2892 microchip.exe 36 PID 2892 wrote to memory of 1684 2892 microchip.exe 36 PID 1208 wrote to memory of 940 1208 microchip.exe 37 PID 1208 wrote to memory of 940 1208 microchip.exe 37 PID 1208 wrote to memory of 940 1208 microchip.exe 37 PID 1208 wrote to memory of 940 1208 microchip.exe 37 PID 1208 wrote to memory of 940 1208 microchip.exe 37 PID 1208 wrote to memory of 940 1208 microchip.exe 37 PID 1208 wrote to memory of 940 1208 microchip.exe 37 PID 1208 wrote to memory of 904 1208 microchip.exe 38 PID 1208 wrote to memory of 904 1208 microchip.exe 38 PID 1208 wrote to memory of 904 1208 microchip.exe 38 PID 1208 wrote to memory of 904 1208 microchip.exe 38 PID 1208 wrote to memory of 904 1208 microchip.exe 38 PID 1208 wrote to memory of 904 1208 microchip.exe 38 PID 1208 wrote to memory of 904 1208 microchip.exe 38 PID 2892 wrote to memory of 1608 2892 microchip.exe 39 PID 2892 wrote to memory of 1608 2892 microchip.exe 39 PID 2892 wrote to memory of 1608 2892 microchip.exe 39 PID 2892 wrote to memory of 1608 2892 microchip.exe 39 PID 2892 wrote to memory of 1608 2892 microchip.exe 39 PID 2892 wrote to memory of 1608 2892 microchip.exe 39 PID 2892 wrote to memory of 1608 2892 microchip.exe 39 PID 1208 wrote to memory of 1628 1208 microchip.exe 40 PID 1208 wrote to memory of 1628 1208 microchip.exe 40 PID 1208 wrote to memory of 1628 1208 microchip.exe 40 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2628 attrib.exe 1276 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be838d8a3798aa2c819bc732169c4fda.exe"C:\Users\Admin\AppData\Local\Temp\be838d8a3798aa2c819bc732169c4fda.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\1.exe"C:\Windows\system32\1.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 1563⤵
- Loads dropped DLL
- Program crash
PID:2728
-
-
-
C:\Windows\SysWOW64\2.exe"C:\Windows\system32\2.exe"2⤵
- Executes dropped EXE
PID:2532
-
-
C:\Windows\SysWOW64\3.exe"C:\Windows\system32\3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\ntldr\microchip.exe"C:\Windows\system32\ntldr\microchip.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies WinLogon
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del /F /Q /A R S H C:\ntldr4⤵PID:1684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del /F /S /Q "%USERPROFILE%\Mis Documentos\*.*"4⤵PID:1608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del /F /S /Q "%USERPROFILE%\Escritorio\*.*"4⤵PID:2484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy "%Windir%\System32\ntldr\ntldr\ntldr" C:\ntldr & attrib C:\ntldr +s +h +r4⤵PID:2624
-
C:\Windows\SysWOW64\attrib.exeattrib C:\ntldr +s +h +r5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1276
-
-
-
-
C:\Windows\SysWOW64\ntldr\microchip.exe"C:\Windows\system32\ntldr\microchip.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies WinLogon
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del /F /Q /A R S H C:\ntldr4⤵PID:940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del /F /S /Q "%USERPROFILE%\Mis Documentos\*.*"4⤵PID:904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del /F /S /Q "%USERPROFILE%\Escritorio\*.*"4⤵PID:1628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy "%Windir%\System32\ntldr\ntldr\ntldr" C:\ntldr & attrib C:\ntldr +s +h +r4⤵PID:2492
-
C:\Windows\SysWOW64\attrib.exeattrib C:\ntldr +s +h +r5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5865ceb342a822845ae20332d6cfdf6aa
SHA1a500757954a2d0e542c7b39bbc421742c219520d
SHA256b6dd788e3fd04a83ef5835189c26dde4f8a99a81b44ab4c2ba730933cf8e83bd
SHA51200a8f79f41b1fd8d469155319e1c9f7903d6723b53706ea219ae1b0516e1af532440d33756409c714003336992ad2ef5ebe7602dd878ec22a26d1a5a43f92f03
-
Filesize
340KB
MD586f1895ae8c5e8b17d99ece768a70732
SHA1d5502a1d00787d68f548ddeebbde1eca5e2b38ca
SHA2568094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe
SHA5123b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da
-
Filesize
1.4MB
MD52184186bccb8efb96d7937a3ce941fb1
SHA17d712bf03cdcf3c896800c7f0ebc0b4549a4241d
SHA256f4d4cadec6c957ac5f0674818c615ef265d8ab615b6eed92e1cfb19c18d31a09
SHA512ae23d31e3b5c3275c332d851610c4d3a4c2e7deae38c12b3aa0192eca032f5bba6f229606ee9aa72562af84ccc8876245636be63e4b5534a9c4348008a3259fd
-
Filesize
697KB
MD5e916ec0eed4151e5032932dd8c936019
SHA1b0a88455422b9464ff52ec21b46b4e11ce883b94
SHA25644a7f696cf694790f74c2504563f88fd0b34f032ad36092cd5386775644d5c9c
SHA512e00bf5bf8be40547edb4cb967e3acea3f2052683b0fce62b15ce8597e3690a35594e52a6d728b1d5f9d4e42dd38d0791b72f55e7c491191dde7c53f23b6b4b5a
-
Filesize
244KB
MD505265c7fc6e3d7fb619431126f686034
SHA1b4261ebfd2236e5d032e0af7f0d423b375d960cc
SHA256680feafa67645a33104ef85d68b5f3914288a9263353884135f9656f2fd44823
SHA5125e0e815c28a217162c63081d74f8f9cb490e2ed734b21dbc05579949d74fe9d09f702ea5b8761f09ff3067a07a5f208d4e47b03df390bf9d3f1e72e69f5c7ddb
-
Filesize
185KB
MD5bef840968d6ff6f2754a8509fc6ce51f
SHA16367786c504ef3710c2e6239db669bfead79d42f
SHA25662e86f9fc8818e3a0efaea2b7970730e094633df4055f1cfa61c269ae30764b8
SHA51239cfa8e18b9f1cb9d11148dc695658fd5407ecbde27f3b0aee07eb0b8b8e5a5987a85182d46c30dac57705b262b6cecd7341cf198a515405328e90e1e066ff6b
-
Filesize
101KB
MD5a2667bd36a0f42ce854f0ac2d3eb2ba3
SHA18090a0264ec11e0234c6410d24bf8093b8f91b0d
SHA256af170aae7d7af56be028b53bbdaff80371182d9d78bb86f62adb6b8640d767ba
SHA512cb85875625e6e9db2f946680ebfa280087d53f671f6f428d23f9c43d960c7f305efc0ebdffeb885e989ff04a5a6afe9adcc8f0135f0cc833bebbc317501e76d7
-
Filesize
1.4MB
MD526bf74b7c38ade9642c468961bdd4215
SHA19114d22c3853eab07f4202edb886428ce5c84ba9
SHA25646b125b11adb761bb021146df810a01d7d3a9a3f95f130ded2b9c92a66d7f916
SHA512e0e74feefa92ec3a05176a8ca0fdff680a388d627dda6ae51a1ba703240000dc5de0ee56606f33b2ab40ba920c3f2bafd62b03dd08b0bf9242a80fc99542c9f3
-
Filesize
20KB
MD5b32825070b5c22eeab8465ed5e20d5cb
SHA13287631708e655476d1202110c45331084e4fec4
SHA256c7a18f8a39886bcbc2d33baa0d2f1a5ed33eba02c900211f57743330a58d3361
SHA51207f25f9b8816e5d04c313f2a3a3e63cade06455983ae028ad54a845ebfc3721ec0de49d1803a8b8d9572aa45d750b4743a1d57ba2fcf68e01ea34641fac7e885
-
Filesize
1.4MB
MD5b3cb086fe4dce5b3b07e933f079f6ddf
SHA170902558db425af5d5dbb0e9b24484f17ac2d569
SHA2569dffebf464f3aa1043110a85fb89d2590785a1cb551556150704526cac3395be
SHA5129432f023f5035de69b57ca6c85bd753249ea6f588f970ac83ec4bba2f49f08b554b0135523490ec792dc538e095ea3020d0ebe626c6ca42b02896f1d7a4c4f2e
-
Filesize
1.4MB
MD5162a853d734a4120466df35c2b2cde8b
SHA1ceac5424383273d5b9a74bd8ad527eb21caecb08
SHA256510a450f5067800c0cfe623f5b52d2ceee82a4bb9e7d747f58b35c651930fae5
SHA512324cd19cc534debcdec081d301c747e89e7177c99ed19719ae579f1a4dd98d5023b5907c6a9e3b871c4b9be864d3726c5ec910fc17862087e37dc55e0c0a1977