Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
d3d4a5e352ca9a305869985b29c8ae9c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3d4a5e352ca9a305869985b29c8ae9c.exe
Resource
win10v2004-20240226-en
General
-
Target
d3d4a5e352ca9a305869985b29c8ae9c.exe
-
Size
456KB
-
MD5
d3d4a5e352ca9a305869985b29c8ae9c
-
SHA1
e6a10118e625382062ddefe47a0cdb8c29f44918
-
SHA256
42c9607f6336c880104a8e3e0b7ae046bf3d3547a904309e825c9f9bf01621b8
-
SHA512
5ff327bb312e4ac18fb23b641215bb3006398af7bcae9280d7743c4c5cec1542d87f046b10a1ea1fb15fc378697cda235c61a70c39a0f42d820b016796c8cfd4
-
SSDEEP
6144:lsHE8LiVlRm/2/0aRrsqvZqYB4Vl7LXPw6YFCTHJnm7fhhmjPGy6OKGF:yNGVlRmDadv0TV9Lfw3F0pmuaq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Windows Live\\Push.exe" d3d4a5e352ca9a305869985b29c8ae9c.exe -
Executes dropped EXE 2 IoCs
pid Process 2196 Push.exe 2500 Push.exe -
Loads dropped DLL 2 IoCs
pid Process 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe -
resource yara_rule behavioral1/memory/2516-4-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2516-6-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2516-10-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2516-12-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2516-13-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2516-15-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2516-16-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2516-28-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-43-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-44-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-46-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-45-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-48-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-49-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-50-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-51-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-52-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-53-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-54-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-55-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-57-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-58-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-59-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-60-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-61-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-62-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-63-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-64-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-65-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-66-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-67-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/2500-68-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Apple Update = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Windows Live\\Push.exe" d3d4a5e352ca9a305869985b29c8ae9c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Apple Update = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Windows Live\\Push.exe" Push.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2244 set thread context of 2516 2244 d3d4a5e352ca9a305869985b29c8ae9c.exe 28 PID 2196 set thread context of 2500 2196 Push.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2500 Push.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeSecurityPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeTakeOwnershipPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeLoadDriverPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeSystemProfilePrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeSystemtimePrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeProfSingleProcessPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeIncBasePriorityPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeCreatePagefilePrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeBackupPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeRestorePrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeShutdownPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeDebugPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeSystemEnvironmentPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeChangeNotifyPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeRemoteShutdownPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeUndockPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeManageVolumePrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeImpersonatePrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeCreateGlobalPrivilege 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: 33 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: 34 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: 35 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe Token: SeIncreaseQuotaPrivilege 2500 Push.exe Token: SeSecurityPrivilege 2500 Push.exe Token: SeTakeOwnershipPrivilege 2500 Push.exe Token: SeLoadDriverPrivilege 2500 Push.exe Token: SeSystemProfilePrivilege 2500 Push.exe Token: SeSystemtimePrivilege 2500 Push.exe Token: SeProfSingleProcessPrivilege 2500 Push.exe Token: SeIncBasePriorityPrivilege 2500 Push.exe Token: SeCreatePagefilePrivilege 2500 Push.exe Token: SeBackupPrivilege 2500 Push.exe Token: SeRestorePrivilege 2500 Push.exe Token: SeShutdownPrivilege 2500 Push.exe Token: SeDebugPrivilege 2500 Push.exe Token: SeSystemEnvironmentPrivilege 2500 Push.exe Token: SeChangeNotifyPrivilege 2500 Push.exe Token: SeRemoteShutdownPrivilege 2500 Push.exe Token: SeUndockPrivilege 2500 Push.exe Token: SeManageVolumePrivilege 2500 Push.exe Token: SeImpersonatePrivilege 2500 Push.exe Token: SeCreateGlobalPrivilege 2500 Push.exe Token: 33 2500 Push.exe Token: 34 2500 Push.exe Token: 35 2500 Push.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2244 d3d4a5e352ca9a305869985b29c8ae9c.exe 2196 Push.exe 2500 Push.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2516 2244 d3d4a5e352ca9a305869985b29c8ae9c.exe 28 PID 2244 wrote to memory of 2516 2244 d3d4a5e352ca9a305869985b29c8ae9c.exe 28 PID 2244 wrote to memory of 2516 2244 d3d4a5e352ca9a305869985b29c8ae9c.exe 28 PID 2244 wrote to memory of 2516 2244 d3d4a5e352ca9a305869985b29c8ae9c.exe 28 PID 2244 wrote to memory of 2516 2244 d3d4a5e352ca9a305869985b29c8ae9c.exe 28 PID 2244 wrote to memory of 2516 2244 d3d4a5e352ca9a305869985b29c8ae9c.exe 28 PID 2244 wrote to memory of 2516 2244 d3d4a5e352ca9a305869985b29c8ae9c.exe 28 PID 2244 wrote to memory of 2516 2244 d3d4a5e352ca9a305869985b29c8ae9c.exe 28 PID 2516 wrote to memory of 2196 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe 29 PID 2516 wrote to memory of 2196 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe 29 PID 2516 wrote to memory of 2196 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe 29 PID 2516 wrote to memory of 2196 2516 d3d4a5e352ca9a305869985b29c8ae9c.exe 29 PID 2196 wrote to memory of 2500 2196 Push.exe 30 PID 2196 wrote to memory of 2500 2196 Push.exe 30 PID 2196 wrote to memory of 2500 2196 Push.exe 30 PID 2196 wrote to memory of 2500 2196 Push.exe 30 PID 2196 wrote to memory of 2500 2196 Push.exe 30 PID 2196 wrote to memory of 2500 2196 Push.exe 30 PID 2196 wrote to memory of 2500 2196 Push.exe 30 PID 2196 wrote to memory of 2500 2196 Push.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3d4a5e352ca9a305869985b29c8ae9c.exe"C:\Users\Admin\AppData\Local\Temp\d3d4a5e352ca9a305869985b29c8ae9c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\d3d4a5e352ca9a305869985b29c8ae9c.exeC:\Users\Admin\AppData\Local\Temp\d3d4a5e352ca9a305869985b29c8ae9c.exe2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Live\Push.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Live\Push.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Live\Push.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Live\Push.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD5d3d4a5e352ca9a305869985b29c8ae9c
SHA1e6a10118e625382062ddefe47a0cdb8c29f44918
SHA25642c9607f6336c880104a8e3e0b7ae046bf3d3547a904309e825c9f9bf01621b8
SHA5125ff327bb312e4ac18fb23b641215bb3006398af7bcae9280d7743c4c5cec1542d87f046b10a1ea1fb15fc378697cda235c61a70c39a0f42d820b016796c8cfd4