Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 17:31
Behavioral task
behavioral1
Sample
03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe
Resource
win10v2004-20240419-en
General
-
Target
03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe
-
Size
147KB
-
MD5
6ac5cd70e043576b82a313273150f0d9
-
SHA1
2c3b2ed20f1e8e630c61109288bd0ac64b5e0329
-
SHA256
03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1
-
SHA512
c77a84cc5ae2cf246278a736051baa44d1f15496547a2bfbba2cbd65e207b6e17a6b9fb4a221b4ec4286c4d80fa65709854cbd46d14a4548fbcf9fb72d01def5
-
SSDEEP
1536:nzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDpAv5wo3Lk6eEVNAhaxlxxFmwUk:YqJogYkcSNm9V7DpKv3L35Sslxx0wT
Malware Config
Extracted
C:\zpvmjd9JY.README.txt
Signatures
-
Renames multiple (260) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 3000 1E2B.tmp -
Executes dropped EXE 1 IoCs
pid Process 3000 1E2B.tmp -
Loads dropped DLL 1 IoCs
pid Process 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\zpvmjd9JY.bmp" 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\zpvmjd9JY.bmp" 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3000 1E2B.tmp -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\WallpaperStyle = "10" 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zpvmjd9JY\DefaultIcon 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zpvmjd9JY 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\zpvmjd9JY\DefaultIcon\ = "C:\\ProgramData\\zpvmjd9JY.ico" 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zpvmjd9JY 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zpvmjd9JY\ = "zpvmjd9JY" 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp 3000 1E2B.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeDebugPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: 36 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeImpersonatePrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeIncBasePriorityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeIncreaseQuotaPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: 33 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeManageVolumePrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeProfSingleProcessPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeRestorePrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSystemProfilePrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeTakeOwnershipPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeShutdownPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeDebugPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeBackupPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe Token: SeSecurityPrivilege 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2028 wrote to memory of 3000 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 30 PID 2028 wrote to memory of 3000 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 30 PID 2028 wrote to memory of 3000 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 30 PID 2028 wrote to memory of 3000 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 30 PID 2028 wrote to memory of 3000 2028 03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe 30 PID 3000 wrote to memory of 2708 3000 1E2B.tmp 31 PID 3000 wrote to memory of 2708 3000 1E2B.tmp 31 PID 3000 wrote to memory of 2708 3000 1E2B.tmp 31 PID 3000 wrote to memory of 2708 3000 1E2B.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe"C:\Users\Admin\AppData\Local\Temp\03db266db5b96223ef42206d57e30fa58c59e70b1d14c017422f097af1560ad1.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\ProgramData\1E2B.tmp"C:\ProgramData\1E2B.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\1E2B.tmp >> NUL3⤵PID:2708
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD59e5e0e4357ee0a61a99965a960544424
SHA1adfc5b838855cee957388feba13354a80d9c254a
SHA2563f8bc71766c21dfc536747ecf1bcae69a534c5d5d449c2d7bc45fd7b20fb9417
SHA5120cc2d2afdcadd1e795af2f801401c0ab2492360b2f14aa41a67122733fd11b37a7203963f5e2c65d5e6048dc082c5e9e77e3cb78e4e3e717c247d4b8ddf64775
-
C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
Filesize147KB
MD541a237e5da64172e06a6081da7bae0f3
SHA16369e8ba5517a51b5583ead5ac68eb9c09a9d16f
SHA25645faf6dc6626caa509c15cad722ce94d4cdb89993ef051e24455695c1048f958
SHA51204e5f4d0de019a8faaac181228ddad2cdae09fa0444c084d0fc5bc0e8dc25315095e45ba5d7d0cded8d642de4f8321fb4b100099b9926be348c10330f51cb1f4
-
Filesize
1KB
MD58d9bbd37491d444e0509716059455765
SHA16657a9ab03b0fd9494baf2e8115504246480e805
SHA256997a7742cabb2089b77a5f3080293ad99413bd215043df2f749667f29fb9fa40
SHA5123c40e8174f4f7a4d1e7b8238deff3491ffb36e1f2ce5afb0f451e1b7fe9b8bd5e218b877308561f7a2572b2a78d21536d28522289ed8dd6b018171182f34536d
-
Filesize
129B
MD5b76cf776218cca981fe5e190c0d99ed9
SHA147427a18216df04d902e6efd5044d586b6517b77
SHA25635b74fbdf48a6b1d89950f8d542350501d8f9b8e957b079ad4d04ceb17762a07
SHA5120bfa1c334dfddf49f0df1904b2fe5963cbeb4f20ee1d100081fb4e863596cce6abc0c6c6a3473c2f4f56456538c04dd690fe27bdf4a2ee394bdfac209afe6719
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf