Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 17:00
Behavioral task
behavioral1
Sample
ptu621.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ptu621.exe
Resource
win10v2004-20240226-en
General
-
Target
ptu621.exe
-
Size
5.0MB
-
MD5
516e4e61cf92a3d6b17ad2c181c2a939
-
SHA1
3f3f81dea9779a5d9d8478b0386867ccbe17d450
-
SHA256
3cb1389aa245b496d15d20d25fcefa35f35f85744413205e90caa78f0805902c
-
SHA512
143e0372ca5ca9c7197d4de69f595fb5b13d517db424331737274b252f16f4cec7490956d08618fcd823f9a9b42e95a7f0439c01a032568722dc864f2b3df71e
-
SSDEEP
98304:RUxt0mBCcZbMMWl7ZSnSC/Ao4f2uZE+2N3wALB2QviKo8D5yEg9yUPvnoh8dKjn8:uEA7YURz4RZEL3Z2ElcTywrdKj7KNQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ptu621Srv.exepid process 2752 ptu621Srv.exe -
Loads dropped DLL 1 IoCs
Processes:
ptu621.exepid process 2748 ptu621.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\ptu621Srv.exe upx behavioral1/memory/2748-4-0x0000000000400000-0x0000000000CA5000-memory.dmp upx behavioral1/memory/2752-7-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2752-11-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2748-24-0x0000000000400000-0x0000000000CA5000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
ptu621Srv.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\px78F.tmp ptu621Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe ptu621Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe ptu621Srv.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ptu621.exepid process 2748 ptu621.exe -
Suspicious behavior: MapViewOfSection 22 IoCs
Processes:
ptu621.exepid process 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe 2748 ptu621.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ptu621.exedescription pid process Token: SeDebugPrivilege 2748 ptu621.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ptu621.exepid process 2748 ptu621.exe 2748 ptu621.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ptu621.exedescription pid process target process PID 2748 wrote to memory of 2752 2748 ptu621.exe ptu621Srv.exe PID 2748 wrote to memory of 2752 2748 ptu621.exe ptu621Srv.exe PID 2748 wrote to memory of 2752 2748 ptu621.exe ptu621Srv.exe PID 2748 wrote to memory of 2752 2748 ptu621.exe ptu621Srv.exe PID 2748 wrote to memory of 388 2748 ptu621.exe wininit.exe PID 2748 wrote to memory of 388 2748 ptu621.exe wininit.exe PID 2748 wrote to memory of 388 2748 ptu621.exe wininit.exe PID 2748 wrote to memory of 388 2748 ptu621.exe wininit.exe PID 2748 wrote to memory of 388 2748 ptu621.exe wininit.exe PID 2748 wrote to memory of 388 2748 ptu621.exe wininit.exe PID 2748 wrote to memory of 400 2748 ptu621.exe csrss.exe PID 2748 wrote to memory of 400 2748 ptu621.exe csrss.exe PID 2748 wrote to memory of 400 2748 ptu621.exe csrss.exe PID 2748 wrote to memory of 400 2748 ptu621.exe csrss.exe PID 2748 wrote to memory of 400 2748 ptu621.exe csrss.exe PID 2748 wrote to memory of 400 2748 ptu621.exe csrss.exe PID 2748 wrote to memory of 436 2748 ptu621.exe winlogon.exe PID 2748 wrote to memory of 436 2748 ptu621.exe winlogon.exe PID 2748 wrote to memory of 436 2748 ptu621.exe winlogon.exe PID 2748 wrote to memory of 436 2748 ptu621.exe winlogon.exe PID 2748 wrote to memory of 436 2748 ptu621.exe winlogon.exe PID 2748 wrote to memory of 436 2748 ptu621.exe winlogon.exe PID 2748 wrote to memory of 480 2748 ptu621.exe services.exe PID 2748 wrote to memory of 480 2748 ptu621.exe services.exe PID 2748 wrote to memory of 480 2748 ptu621.exe services.exe PID 2748 wrote to memory of 480 2748 ptu621.exe services.exe PID 2748 wrote to memory of 480 2748 ptu621.exe services.exe PID 2748 wrote to memory of 480 2748 ptu621.exe services.exe PID 2748 wrote to memory of 496 2748 ptu621.exe lsass.exe PID 2748 wrote to memory of 496 2748 ptu621.exe lsass.exe PID 2748 wrote to memory of 496 2748 ptu621.exe lsass.exe PID 2748 wrote to memory of 496 2748 ptu621.exe lsass.exe PID 2748 wrote to memory of 496 2748 ptu621.exe lsass.exe PID 2748 wrote to memory of 496 2748 ptu621.exe lsass.exe PID 2748 wrote to memory of 504 2748 ptu621.exe lsm.exe PID 2748 wrote to memory of 504 2748 ptu621.exe lsm.exe PID 2748 wrote to memory of 504 2748 ptu621.exe lsm.exe PID 2748 wrote to memory of 504 2748 ptu621.exe lsm.exe PID 2748 wrote to memory of 504 2748 ptu621.exe lsm.exe PID 2748 wrote to memory of 504 2748 ptu621.exe lsm.exe PID 2748 wrote to memory of 600 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 600 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 600 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 600 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 600 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 600 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 676 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 676 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 676 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 676 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 676 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 676 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 752 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 752 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 752 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 752 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 752 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 752 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 824 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 824 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 824 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 824 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 824 2748 ptu621.exe svchost.exe PID 2748 wrote to memory of 824 2748 ptu621.exe svchost.exe
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\ptu621.exe"C:\Users\Admin\AppData\Local\Temp\ptu621.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ptu621Srv.exeC:\Users\Admin\AppData\Local\Temp\ptu621Srv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\ptu621Srv.exeFilesize
74KB
MD5cb458dd109a10f16c430dee34464cd8f
SHA11bc955db0463913cc7d0434c2318c9f2202240e0
SHA25621aa1977c0d7d0404f97515d87d6f26f3f2c2b01d054be6056d119d33d3856e3
SHA5125321f11d92150fdb07f94092fa97fe88bd45714237e4ba245b7f5fbfd4425857fa8d242858d4fd038d77ee7644d276dfb63b7403469ddaf1b53879f391c3f490
-
memory/2748-4-0x0000000000400000-0x0000000000CA5000-memory.dmpFilesize
8.6MB
-
memory/2748-6-0x0000000000250000-0x0000000000283000-memory.dmpFilesize
204KB
-
memory/2748-14-0x00000000775DF000-0x00000000775E0000-memory.dmpFilesize
4KB
-
memory/2748-13-0x00000000775E0000-0x00000000775E1000-memory.dmpFilesize
4KB
-
memory/2748-22-0x0000000010000000-0x0000000010013000-memory.dmpFilesize
76KB
-
memory/2748-23-0x00000000028B0000-0x00000000028B1000-memory.dmpFilesize
4KB
-
memory/2748-24-0x0000000000400000-0x0000000000CA5000-memory.dmpFilesize
8.6MB
-
memory/2748-26-0x0000000000250000-0x0000000000283000-memory.dmpFilesize
204KB
-
memory/2752-7-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2752-12-0x000000007EFA0000-0x000000007EFA9000-memory.dmpFilesize
36KB
-
memory/2752-11-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB