Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 21:05
Behavioral task
behavioral1
Sample
5x/1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5x/1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
5x/2f4b48457d8465347d1d40b040fa246f3b8b657531304238231c8b1e92100e78.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
5x/2f4b48457d8465347d1d40b040fa246f3b8b657531304238231c8b1e92100e78.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
5x/41919a56cab4ed4433a4d7701791111bf3aa58720719530432365d9ddea16845.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
5x/41919a56cab4ed4433a4d7701791111bf3aa58720719530432365d9ddea16845.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
5x/7de86f83f18c6c8ded0d75ab2f84f34ab115dd84d36b7e490e2bd456f77a78ce
Resource
ubuntu1804-amd64-20240418-en
General
-
Target
5x/1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe
-
Size
3.3MB
-
MD5
858f22ea594a6a30a5b42dc6380d1e84
-
SHA1
ad9f83e2698bd5a380afd300225002d7875e08d2
-
SHA256
1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0
-
SHA512
33769894a2e63b0391f97bfcdf7d4df3207ac732434f1a4ee843eb3180cb7a788333d3fc5e0c445a98ed975287bb135dd5aa75ec0154da8876f13da749238182
-
SSDEEP
98304:4ExH12lFKTMMV7l80gN47cxmhZGUIWnGDHlg/Nzir:LxH125fpixZgWnilSk
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\autochk.sys Explorer.EXE File opened for modification C:\Windows\system32\drivers\autochk.sys Explorer.EXE -
resource yara_rule behavioral1/memory/1312-0-0x0000000000200000-0x000000000085C000-memory.dmp upx behavioral1/memory/1312-1-0x0000000000200000-0x000000000085C000-memory.dmp upx behavioral1/files/0x000c0000000136fc-44.dat upx behavioral1/memory/2748-46-0x000007FEF5AF0000-0x000007FEF5F55000-memory.dmp upx behavioral1/memory/2748-47-0x000007FEF5AF0000-0x000007FEF5F55000-memory.dmp upx behavioral1/memory/1212-53-0x000007FEF5AF0000-0x000007FEF5F55000-memory.dmp upx behavioral1/memory/1212-52-0x000007FEF5AF0000-0x000007FEF5F55000-memory.dmp upx behavioral1/memory/1312-67-0x0000000000200000-0x000000000085C000-memory.dmp upx behavioral1/memory/1212-69-0x000007FEF5AF0000-0x000007FEF5F55000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 2524 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\imseo21.ime 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 2748 rundll32.exe 1212 Explorer.EXE -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\PROPSYS.dll 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe File created C:\Windows\Help\DirectX.msc 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe File opened for modification C:\Windows\Help\DirectX.msc 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe File opened for modification C:\Windows\Help\ 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe -
Executes dropped EXE 1 IoCs
pid Process 1212 Explorer.EXE -
Loads dropped DLL 1 IoCs
pid Process 2748 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 rundll32.exe 1212 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 rundll32.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2720 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 28 PID 1312 wrote to memory of 2720 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 28 PID 1312 wrote to memory of 2720 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 28 PID 1312 wrote to memory of 2720 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 28 PID 1312 wrote to memory of 2956 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 30 PID 1312 wrote to memory of 2956 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 30 PID 1312 wrote to memory of 2956 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 30 PID 1312 wrote to memory of 2956 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 30 PID 1312 wrote to memory of 2748 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 32 PID 1312 wrote to memory of 2748 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 32 PID 1312 wrote to memory of 2748 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 32 PID 1312 wrote to memory of 2748 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 32 PID 2748 wrote to memory of 1212 2748 rundll32.exe 21 PID 1312 wrote to memory of 2524 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 33 PID 1312 wrote to memory of 2524 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 33 PID 1312 wrote to memory of 2524 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 33 PID 1312 wrote to memory of 2524 1312 1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Drivers directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\5x\1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe"C:\Users\Admin\AppData\Local\Temp\5x\1ff2743e1b20f9f98e4e02dd5eb9b293e72b6dab769272c194cef11adfbfd5d0.exe"2⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\Cacls.exeC:\Windows\system32\Cacls.exe "C:\Windows\PROPSYS.dll" /E /G everyone:F3⤵PID:2720
-
-
C:\Windows\system32\Cacls.exeC:\Windows\system32\Cacls.exe "C:\Windows\system32\imseo21.ime" /E /G everyone:F3⤵PID:2956
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\Windows\system32\imseo21.ime",ProxyDll3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5x\\51FADBE.bat3⤵
- Deletes itself
PID:2524
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331B
MD505ffc4a6f9508a5711a9ffac7a687128
SHA183d0c3acfc8acd3a867cc3e87aeaf88d0920545c
SHA2567071cbeb156f30559dab5af6db326c7311ce932bebcac8a38a63210b94a31d98
SHA512173a33e62651bee5b7e9fe25a33a35553c84daf012cb160d8bac6e81a6bee7dbb75325d73025bf1c8d691bc208e96c2a2fc62295ee139e72122fbd07d387f4d1
-
Filesize
1.2MB
MD5bac0953ec8677e394194b0d09dc16984
SHA187e88e96e64f37a0165e3f813048a5046cae622d
SHA25612b6c29c990dfcc4b899464f271f691e503dc4060b0c90cee48478e6b6f6cff2
SHA5124829a8ae94fad492873e52e58a8a36d715fb642f620f18f36604765d4fd42cd7505110c063f6145d43d30bd367c5988419d10f00d70e94352958d9192adc7eba
-
Filesize
1.6MB
MD56d0c009eaa7925a99c1e1ab448e4fb23
SHA183fc0adf38ee9803fa545fc2e9989df81b22cc3f
SHA25668357137268cf5bd92362e315f8a3fac91982bbcff167ef64a1c099441973bf8
SHA512dc6fae8d7b9cd2b7cba1219b11541e6cb0f0656bf1e95fc76ffa968845a8a78499e4ca78a1d8786763f1c7bccf5d9babb72e9d03c4e1373dadaa39ad526a5d51