Resubmissions
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 18:31
Behavioral task
behavioral1
Sample
Injector.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Injector.exe
Resource
win10v2004-20231215-en
General
-
Target
Injector.exe
-
Size
461KB
-
MD5
74e9c2da84432615f4562f724c8b792a
-
SHA1
f10ba74f0a8bdb74335a94ee377979a6b6204c84
-
SHA256
95b45baa28467be3ca303f48f696990d3491aa9d24ee888d221d5170f7bf5a23
-
SHA512
12990370f2ae48b2a3e6ad624704b3feffb7c71e44f08037e84f8ce1e75b0faf8a46facd90c4aa5ee576c063dbbbe1e39e8ad36fcd783741dc2f84fa52c39d33
-
SSDEEP
12288:wu/osQMgL96w0SVvV6fcaubLH31O2lxvdJGtKcctrJnSvLhTt:wur9gkEPGcHHX1OSr/cYtns
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\regedit.exe Injector.exe -
Executes dropped EXE 1 IoCs
pid Process 208 regedit.exe -
resource yara_rule behavioral2/memory/1620-0-0x0000000000590000-0x000000000068A000-memory.dmp upx behavioral2/memory/1620-3-0x0000000000590000-0x000000000068A000-memory.dmp upx behavioral2/files/0x0008000000023213-5.dat upx behavioral2/memory/208-6-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-102-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-118-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-119-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-120-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-121-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-122-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-123-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-124-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-125-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-126-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-127-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-128-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-129-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-130-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx behavioral2/memory/208-131-0x0000000000C20000-0x0000000000D1A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\regedit = "\"C:\\Users\\Admin\\AppData\\Roaming\\regedit.exe\"" Injector.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\regedit = "\"C:\\Users\\Admin\\AppData\\Roaming\\regedit.exe\"" Injector.exe -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1620-3-0x0000000000590000-0x000000000068A000-memory.dmp autoit_exe behavioral2/memory/208-102-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-118-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-119-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-120-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-121-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-122-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-123-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-124-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-125-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-126-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-127-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-128-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-129-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-130-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe behavioral2/memory/208-131-0x0000000000C20000-0x0000000000D1A000-memory.dmp autoit_exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4820 timeout.exe -
Runs regedit.exe 1 IoCs
pid Process 208 regedit.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3520 powershell.exe 3520 powershell.exe 2200 powershell.exe 2200 powershell.exe 4576 powershell.exe 4576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3520 powershell.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 4576 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1620 wrote to memory of 676 1620 Injector.exe 85 PID 1620 wrote to memory of 676 1620 Injector.exe 85 PID 1620 wrote to memory of 676 1620 Injector.exe 85 PID 1620 wrote to memory of 544 1620 Injector.exe 86 PID 1620 wrote to memory of 544 1620 Injector.exe 86 PID 1620 wrote to memory of 544 1620 Injector.exe 86 PID 544 wrote to memory of 208 544 cmd.exe 89 PID 544 wrote to memory of 208 544 cmd.exe 89 PID 544 wrote to memory of 208 544 cmd.exe 89 PID 676 wrote to memory of 4820 676 cmd.exe 90 PID 676 wrote to memory of 4820 676 cmd.exe 90 PID 676 wrote to memory of 4820 676 cmd.exe 90 PID 208 wrote to memory of 864 208 regedit.exe 91 PID 208 wrote to memory of 864 208 regedit.exe 91 PID 208 wrote to memory of 864 208 regedit.exe 91 PID 864 wrote to memory of 3520 864 cmd.exe 93 PID 864 wrote to memory of 3520 864 cmd.exe 93 PID 864 wrote to memory of 3520 864 cmd.exe 93 PID 864 wrote to memory of 2200 864 cmd.exe 94 PID 864 wrote to memory of 2200 864 cmd.exe 94 PID 864 wrote to memory of 2200 864 cmd.exe 94 PID 864 wrote to memory of 4576 864 cmd.exe 95 PID 864 wrote to memory of 4576 864 cmd.exe 95 PID 864 wrote to memory of 4576 864 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Injector.exe"C:\Users\Admin\AppData\Local\Temp\Injector.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c timeout 1 & del /F "C:\Users\Admin\AppData\Local\Temp\Injector.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Roaming\regedit.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Roaming\regedit.exeC:\Users\Admin\AppData\Roaming\regedit.exe3⤵
- Executes dropped EXE
- Runs regedit.exe
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5870.tmp.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-MpPreference -DisableRealtimeMonitoring $true5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionExtension "@AppDataDir\regedit.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath ΓÇ£C:\Users\AdminΓÇ¥5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5668e034b9b464ad3fdf096eb770947b2
SHA1b6f838153e3ed5377d0e718aac715044818cd62e
SHA2563d4f894ee61ff3ddf0a0a9ceeef0f0828b970fec06db73992f4992091cda0395
SHA5129f783802cde97601fe7a800c4d20af4d4774d164ba615a4d563ba0e230e4677fff875a55eeabf028298514ba6411a0af116d592c68cfa2385d97ba09fc88d838
-
Filesize
18KB
MD5c72178a395dd1e615f73a0a3309ec977
SHA1c09fc1ff5623b9ebd2161423a8aaba68aca82be0
SHA256cb84abaee0060a40225b91480ff2f1e50009423c2e97250d043796d8ed00aeba
SHA5128753aa7b88653d12c8a9ea1ae7def44d00e3ff271a72a58016dc9296911bc67ef4339c5f2493d95d602f4e66adcfcf95c32dcf58cc9848c70ca9b9d82016124d
-
Filesize
226B
MD5fc2b98850fc0567fbe78cd14800b3f5e
SHA1f8aa83d04ec8d7a64235d37e2be816ac9d78bc9b
SHA2569d1a37cc58a2234ed3ded8b862979f95f2c2526283bc97c25fa92c2cc3e74762
SHA51200d563ecb25d31a45403c4c2bc6f2803d13d494aa070644f6daa844b8600697cc34e79492136e5061518b34b10a3b998a99e0a3036e78b9d86d28e95ee4c69aa
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
461KB
MD574e9c2da84432615f4562f724c8b792a
SHA1f10ba74f0a8bdb74335a94ee377979a6b6204c84
SHA25695b45baa28467be3ca303f48f696990d3491aa9d24ee888d221d5170f7bf5a23
SHA51212990370f2ae48b2a3e6ad624704b3feffb7c71e44f08037e84f8ce1e75b0faf8a46facd90c4aa5ee576c063dbbbe1e39e8ad36fcd783741dc2f84fa52c39d33