Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe
Resource
win10v2004-20240226-en
General
-
Target
991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe
-
Size
144KB
-
MD5
6297d37be19fa2d9875c1a6e3180cfdb
-
SHA1
e8cc9b46495e24009b35e53b318f6bab473eb3c1
-
SHA256
991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740
-
SHA512
1869f60db34181f63047e4c41d38806d3eca0fe84e6231881159576dd5d29f38a7b0b5dbf7b8a17e795fcc57207099af5392439ae544634673d702b8568a04dc
-
SSDEEP
3072:l5SVkkgUgXC7AdYzrV+Dljy/32ubwZ/qJ:SUFCkdYzrVolu/J0Z/
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral1/memory/2680-438-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2680-443-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2680-1080-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/548-1084-0x0000000000400000-0x000000000040B000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
pid Process 3032 WindowsService.exe 548 WindowsService.exe 2332 WindowsService.exe -
Loads dropped DLL 5 IoCs
pid Process 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe -
resource yara_rule behavioral1/memory/2680-438-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2680-443-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2680-1080-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/548-1084-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\SystemWindows\\WindowsService.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3028 set thread context of 2680 3028 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 28 PID 3032 set thread context of 548 3032 WindowsService.exe 33 PID 3032 set thread context of 2332 3032 WindowsService.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe Token: SeDebugPrivilege 548 WindowsService.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3028 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 3032 WindowsService.exe 548 WindowsService.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2680 3028 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 28 PID 3028 wrote to memory of 2680 3028 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 28 PID 3028 wrote to memory of 2680 3028 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 28 PID 3028 wrote to memory of 2680 3028 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 28 PID 3028 wrote to memory of 2680 3028 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 28 PID 3028 wrote to memory of 2680 3028 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 28 PID 3028 wrote to memory of 2680 3028 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 28 PID 3028 wrote to memory of 2680 3028 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 28 PID 2680 wrote to memory of 2456 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 29 PID 2680 wrote to memory of 2456 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 29 PID 2680 wrote to memory of 2456 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 29 PID 2680 wrote to memory of 2456 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 29 PID 2456 wrote to memory of 2328 2456 cmd.exe 31 PID 2456 wrote to memory of 2328 2456 cmd.exe 31 PID 2456 wrote to memory of 2328 2456 cmd.exe 31 PID 2456 wrote to memory of 2328 2456 cmd.exe 31 PID 2680 wrote to memory of 3032 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 32 PID 2680 wrote to memory of 3032 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 32 PID 2680 wrote to memory of 3032 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 32 PID 2680 wrote to memory of 3032 2680 991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe 32 PID 3032 wrote to memory of 548 3032 WindowsService.exe 33 PID 3032 wrote to memory of 548 3032 WindowsService.exe 33 PID 3032 wrote to memory of 548 3032 WindowsService.exe 33 PID 3032 wrote to memory of 548 3032 WindowsService.exe 33 PID 3032 wrote to memory of 548 3032 WindowsService.exe 33 PID 3032 wrote to memory of 548 3032 WindowsService.exe 33 PID 3032 wrote to memory of 548 3032 WindowsService.exe 33 PID 3032 wrote to memory of 548 3032 WindowsService.exe 33 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34 PID 3032 wrote to memory of 2332 3032 WindowsService.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe"C:\Users\Admin\AppData\Local\Temp\991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe"C:\Users\Admin\AppData\Local\Temp\991a981068b0d7e68c714468ca240342bb5d64306a6340c5420537fa5604e740.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NHMIJ.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe" /f4⤵
- Adds Run key to start application
PID:2328
-
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:548
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
PID:2332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5f6a90c20834f271a907a4e2bc28184c2
SHA136c9d1602b74f622346fbb22693597d7889df48d
SHA25673f29cd953eee40cea4de67842556ffd96efe8094a6a9b70f33a35df2582febd
SHA51239cabae19fe1faa37455e4bd242c868be60d6252b07f01224b3f7501c3cf734e503300b840d83381a452707cab6df2f95f920655884be56d4024676b26943804
-
Filesize
144KB
MD553e7b09b3c0be7ec682e3f09bd70e369
SHA10f7440184915f157ad7b50dcf8037ab3e048cc7f
SHA256409773e4ed27722a51e9471a3ae50e99277d3ba9125c3027c153a3050e82495c
SHA5129cdbd551e2cdcbe17839247f86d2e18a6257553e3aa48cb61683e2910926ab4fba7194d7c0bc9a2dcadb36854eafbd71640a6689c836a4e4080c8600b38e7dfc