Overview
overview
10Static
static
7Dominator.zip
windows7-x64
1Dominator.zip
windows10-2004-x64
1Dominator/...ol.exe
windows7-x64
10Dominator/...ol.exe
windows10-2004-x64
out.exe
windows7-x64
out.exe
windows10-2004-x64
Dominator/...64.exe
windows7-x64
7Dominator/...64.exe
windows10-2004-x64
7Dominator/...or.exe
windows7-x64
1Dominator/...or.exe
windows10-2004-x64
8Dominator/setup.bat
windows7-x64
10Dominator/setup.bat
windows10-2004-x64
10Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 18:18
Behavioral task
behavioral1
Sample
Dominator.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Dominator.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Dominator/DCONT/dControl.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Dominator/DCONT/dControl.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Dominator/VCRUNTIME/VC_redist.x64.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Dominator/VCRUNTIME/VC_redist.x64.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Dominator/dominator.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Dominator/dominator.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Dominator/setup.bat
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
Dominator/setup.bat
Resource
win10v2004-20240226-en
General
-
Target
Dominator/setup.bat
-
Size
1KB
-
MD5
79b066c8b719dee74dc5b74fec87808c
-
SHA1
497109077a04f04a39f1ab1c62095b7a0b9a0d8b
-
SHA256
af724b5016ba21fdd43078319a481cd97244fd33d08189d1971945036fcf4e7c
-
SHA512
34cb0b4eb82018c22889658d33df44aab32cd114c17cf3125cc71e2f7668956ff8f7a8b6a5688ecec496df6b91f72fe10b7c66fc8c39c947ecb1897f4dd56a17
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 2672 bcdedit.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1320 2156 cmd.exe 29 PID 2156 wrote to memory of 1320 2156 cmd.exe 29 PID 2156 wrote to memory of 1320 2156 cmd.exe 29 PID 1320 wrote to memory of 2824 1320 net.exe 30 PID 1320 wrote to memory of 2824 1320 net.exe 30 PID 1320 wrote to memory of 2824 1320 net.exe 30 PID 2156 wrote to memory of 2608 2156 cmd.exe 31 PID 2156 wrote to memory of 2608 2156 cmd.exe 31 PID 2156 wrote to memory of 2608 2156 cmd.exe 31 PID 2156 wrote to memory of 2120 2156 cmd.exe 32 PID 2156 wrote to memory of 2120 2156 cmd.exe 32 PID 2156 wrote to memory of 2120 2156 cmd.exe 32 PID 2156 wrote to memory of 2368 2156 cmd.exe 33 PID 2156 wrote to memory of 2368 2156 cmd.exe 33 PID 2156 wrote to memory of 2368 2156 cmd.exe 33 PID 2156 wrote to memory of 3036 2156 cmd.exe 34 PID 2156 wrote to memory of 3036 2156 cmd.exe 34 PID 2156 wrote to memory of 3036 2156 cmd.exe 34 PID 2156 wrote to memory of 3052 2156 cmd.exe 35 PID 2156 wrote to memory of 3052 2156 cmd.exe 35 PID 2156 wrote to memory of 3052 2156 cmd.exe 35 PID 2156 wrote to memory of 2520 2156 cmd.exe 36 PID 2156 wrote to memory of 2520 2156 cmd.exe 36 PID 2156 wrote to memory of 2520 2156 cmd.exe 36 PID 2156 wrote to memory of 2544 2156 cmd.exe 37 PID 2156 wrote to memory of 2544 2156 cmd.exe 37 PID 2156 wrote to memory of 2544 2156 cmd.exe 37 PID 2156 wrote to memory of 2224 2156 cmd.exe 38 PID 2156 wrote to memory of 2224 2156 cmd.exe 38 PID 2156 wrote to memory of 2224 2156 cmd.exe 38 PID 2156 wrote to memory of 2672 2156 cmd.exe 39 PID 2156 wrote to memory of 2672 2156 cmd.exe 39 PID 2156 wrote to memory of 2672 2156 cmd.exe 39
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Dominator\setup.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:2824
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 3 /f2⤵PID:2608
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f2⤵PID:2120
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\CI\Config" /v VulnerableDriverBlocklistEnable /t REG_DWORD /d 0 /f2⤵PID:2368
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard" /v "EnableVirtualizationBasedSecurity" /t REG_DWORD /d 0 /f2⤵PID:3036
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" /v "Enabled" /t REG_DWORD /d 0 /f2⤵PID:3052
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t "REG_SZ" /d "Off" /f2⤵PID:2520
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Edge\SmartScreenEnabled" /v "" /t "REG_DWORD" /d 0 /f2⤵PID:2544
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t "REG_DWORD" /d 0 /f2⤵
- UAC bypass
PID:2224
-
-
C:\Windows\system32\bcdedit.exebcdedit /set hypervisorlaunchtype off2⤵
- Modifies boot configuration data using bcdedit
PID:2672
-