Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 06:17

General

  • Target

    3fa4c62861f73439e7c877b096a64a5e3fe6057fd07b7a508252b6bceeb04944.exe

  • Size

    10.9MB

  • MD5

    72da4685f7f560a497f7fb644f3a52f7

  • SHA1

    3a6e283df58dfd19d6e6328fb1d55214bfd3f363

  • SHA256

    3fa4c62861f73439e7c877b096a64a5e3fe6057fd07b7a508252b6bceeb04944

  • SHA512

    8e0c486d3371400276a71e1199f68cfb58fe96f14a798894ab3ea5460bcb9a41399aec9af12347b7a357d408524143a47dd7a48611ae60377b3812dbb728bf9e

  • SSDEEP

    196608:fozA+9CZKfpCZGhOqhI8HuAUZdzO2Z5zrPzivICK0LowY66ZQyZgw7:fp+9dAIMqhI8fUG2Hz7mvICK0LoP66Zl

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 23 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 21 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fa4c62861f73439e7c877b096a64a5e3fe6057fd07b7a508252b6bceeb04944.exe
    "C:\Users\Admin\AppData\Local\Temp\3fa4c62861f73439e7c877b096a64a5e3fe6057fd07b7a508252b6bceeb04944.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c netsh advfirewall firewall add rule name="winrdlv3" dir=in action=allow program="C:\Windows\system32\winrdlv3.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\SysWOW64\netsh.exe
        netsh advfirewall firewall add rule name="winrdlv3" dir=in action=allow program="C:\Windows\system32\winrdlv3.exe"
        3⤵
        • Modifies Windows Firewall
        PID:2228
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c netsh advfirewall firewall add rule name="winrdlv3" dir=out action=allow program="C:\Windows\system32\winrdlv3.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\SysWOW64\netsh.exe
        netsh advfirewall firewall add rule name="winrdlv3" dir=out action=allow program="C:\Windows\system32\winrdlv3.exe"
        3⤵
        • Modifies Windows Firewall
        PID:2072
    • C:\Program Files (x86)\Common Files\System\systecv3.exe
      "C:\Program Files (x86)\Common Files\System\systecv3.exe" SW_HIDE
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:792
    • C:\Program Files (x86)\Common Files\System\winrdgv3.exe
      "C:\Program Files (x86)\Common Files\System\winrdgv3.exe" SW_HIDE
      2⤵
      • Executes dropped EXE
      PID:1496
    • C:\Windows\SysWOW64\winrdlv3.exe
      "C:\Windows\system32\winrdlv3.exe" SW_HIDE
      2⤵
      • Executes dropped EXE
      PID:2260
  • C:\Program Files (x86)\Common Files\System\winrdgv3.exe
    "C:\Program Files (x86)\Common Files\System\winrdgv3.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\SysWow64\winrdlv3.exe
      C:\Windows\SysWow64\winrdlv3.exe winwdgv3.dll,RunMonitor32
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Windows\SysWow64\winrdlv3.exe
        C:\Windows\SysWow64\winrdlv3.exe winoav3.dll,RunAgent32
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates connected drives
        • Writes to the Master Boot Record (MBR)
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:764
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /s trmenushl64.dll
          4⤵
            PID:2972

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Privilege Escalation

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Defense Evasion

    Impair Defenses

    1
    T1562

    Disable or Modify System Firewall

    1
    T1562.004

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    2
    T1120

    System Information Discovery

    3
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\System\systecv3.exe
      Filesize

      2.3MB

      MD5

      b9e0a7cbd7fdb4d179172dbdd453495a

      SHA1

      7f1b18a2bee7defa6db4900982fd3311aabed50d

      SHA256

      cb72b724c5f57e83cc5bc215dd522c566e0ea695b9e3d167eed9be3f18d273ce

      SHA512

      720985495b67e87f6ecf62268d7dc8fecdb7c06cf9606ce1a12ce4ea741dd3d46a759420e02ec54bc6e96e49d37a2e19ac307093b1228c01914c8e632a8d373c

    • C:\Windows\SysWOW64\Ocular\OAgent.ini
      Filesize

      7KB

      MD5

      eaf9ddec9e92277b04267ed338024723

      SHA1

      5e20a503bae8967988fa339822361d9132a7cf65

      SHA256

      cd10b17c7677023fe2ecf462509859de5e8b5cfe830ba71396c6639499a11583

      SHA512

      2302424c6082ebf0d95b1fb1db0fd3eb92c6010669ba7acbf855105fe953e1bccfc966cdfc19fa581b98c7e109eb7c4ae6e7d0061d14593889f7245bca9250c2

    • C:\Windows\SysWOW64\Ocular\OAgent.ini
      Filesize

      7KB

      MD5

      5239bc5e5f376a51423a6de8e51f8e1c

      SHA1

      289aa0bf2e173f5617e954df4b72a1754456b49b

      SHA256

      d1011bfa513d0aba1038f06bd784c6d7a0f20a2bc801e8f6cb2669206521ebe8

      SHA512

      392101b53d7f7e6a0555771004a1341ca35ab50f608b66bf40953850e36a5923e68bf47e35a803fac8a2d1fe6835004d592babfe4f2e9f98c8ccc095d49cb2e1

    • C:\Windows\SysWOW64\Ocular\OAgent.ini
      Filesize

      7KB

      MD5

      38a545d5c11fece9314b82a2528cab61

      SHA1

      c9371b52653ac7bd62ad701bcf7a2fd823774423

      SHA256

      c46d3e307d59eec52d46cca1d9edfcc1a11ead89613b6993e3c29b71e7c54433

      SHA512

      086374453c317290fd651e8e2d737a041b1a74f8b7e8a822eb47dacfcf412d42aab159a4f706a06bc68c67770bd30e1ebec3fd38af87b881c4a34c49d4ac1fb6

    • C:\Windows\SysWOW64\Ocular\OAgent.ini
      Filesize

      7KB

      MD5

      bb69cb028e395439341e588826688bd5

      SHA1

      dfbb5d0e9a861b8223bcd5d41e300878acca2490

      SHA256

      33a98e019d586a4f0fc071041293db84ad93741d1f39ec3790c827785697060c

      SHA512

      2234e99d7d23e0afd9d2e94e501679dfc1212a6aaca3f94175dcfebefc56edd611fde47ece7cbe223674cec2e468de5245d213c9611488af508c99663bff7611

    • C:\Windows\SysWOW64\Ocular\OPolicy.ini
      Filesize

      7KB

      MD5

      7283fb584d9bb9ca700796c2b3bc9165

      SHA1

      ed1d72488146f29eaaea26eeb1baa335d3abd25a

      SHA256

      c1ba97b0f123fa5a774b85b84161e649dde404fcb119bef040575b7fa46185e6

      SHA512

      a16b90640567aee9a23ff167415e567f1f4d378069889c5d6ceedbd8afcb8acb6c350c2aa603328ca07eb52d1971d88569d17588987b37053e688729f244f655

    • C:\Windows\SysWOW64\Ocular\OPolicy.ini
      Filesize

      7KB

      MD5

      e3e926962b0ac5627e917820702076a5

      SHA1

      8d1b90b5ad74cdf50761dc6feb8e5eacf8198ecc

      SHA256

      650b2b8035a1e6a76f2f41a554c6c8e85a216465d9d8b3343ff9f665debc402d

      SHA512

      5fe052b80db86c6209de6fef820ad66b89f658f38eca9c70abd2273aaa5ea8019bf4d268b3bfb4ad755e5a2a516f4ede750384d8569ebf859882abf913c918e5

    • C:\Windows\SysWOW64\winrdlv3.exe
      Filesize

      57KB

      MD5

      0cbeb75d3090054817ea4df0773afe35

      SHA1

      58c543a84dc18e21d86ad2c011d8ac726867fb78

      SHA256

      453e2290939078c070e46896b2d991f31d295bbc1c63059b10f3c24cad7c4822

      SHA512

      f3ab9f393da18df2cfc22020627e72ae9e7c7b47db088aaf0fa773028c96d0e7e3d4127082b59296eecfc9c60d389a43c78ba0a4348b0f6ceb76cc8978ba649c

    • C:\Windows\SysWOW64\winwdgv3.dll
      Filesize

      2.1MB

      MD5

      0aed8f70a00060f8005efa8d1c668b98

      SHA1

      c75fe3d1a2476da55f526d366f73bedbfd56f32a

      SHA256

      326abf1af467670de571252bfd8118b9ea0b8a3babc10df092fffc2da3e11671

      SHA512

      738f9cbd6f693647d8b091d7192db8963e2c4ecb179ce1b5c7a81f56045674694faed7fdf88af5d7e144149d86df167d9adf6460e3905024faf526c08f7dc787

    • C:\Windows\SysWow64\Ocular\AgentTask\AgentTaskList.dat
      Filesize

      32B

      MD5

      c65f746d55d47f9713a4b1756c441838

      SHA1

      1161f92d203b43c2c1949cbeebc1dc4d1962eb29

      SHA256

      b87182c052c2bd44f743b22cad39b8c18ca16d166734eae7a1af1a75caa2e148

      SHA512

      a14025e1c15586d14ab99bef82f340b605992513724cc05f47d6d693e3b088a63c483054dc953dcc5ddf6a0ce5e7ad5391abd448dbc8c227dfeb70e9be61d341

    • C:\Windows\SysWow64\Ocular\OAgent.ini
      Filesize

      7KB

      MD5

      060a95870c44f2f006d4230cb631647b

      SHA1

      4717872a694141655512617614e9dffd0c0c671f

      SHA256

      30834e63dfef0fba60ac08c3d4d6a2f51526c7a57f06d7e7633d45acf55def08

      SHA512

      009586ebbe1615cd143e9f7c4a11b3854d5c9f3451a98fc9be4bc41deffa05d190294a9eb6bddf5df936247eb1cd1a972769c9b5faacbed12724e298badfd3b9

    • C:\Windows\SysWow64\Ocular\OPolicy.ini
      Filesize

      7KB

      MD5

      92b241f1481f7308fec1d8cf8ee1a06d

      SHA1

      0ad29126c63d1692f7608289475a2ba3f986b7e3

      SHA256

      a86c106a60bf075debe285a6d3cb17523ca9b0c8a5609ff5ec5c32908d8617ff

      SHA512

      8d9d98d56d96aca2002c301e25833871447a6f860f2558f144b5fa747d059e6502bcd383ba4bf24cea42503043c1a5c58a65c89e703f10725f3a837cbe8bbea6

    • C:\Windows\SysWow64\Ocular\msagentclass.dat
      Filesize

      56B

      MD5

      1ed50f90f5d6ae13c1eb365e7ddd174c

      SHA1

      21372ee1cfc925d3926e7ba16bfd032c9a440194

      SHA256

      49ca672d8cf488a80d71508d078484554b8da1deffd78dafd0a15cc9041524c6

      SHA512

      a79cc841614aa3d7f18fa1a9d5d205be3aa59e2005ebcb0146aa3139d631acd685f76d949b21e1457d8937e56f7d46c507d3d3548b9aec2d5de2f7b3b5efcd4c

    • C:\Windows\SysWow64\Ocular\msmailboxcalss.dat
      Filesize

      68B

      MD5

      b2a694142b2b98f1c5b41f6d28d02ce6

      SHA1

      547ce4e42bbe81a358d6866a1a5b194ee2d5720e

      SHA256

      21f56710a7667c48fd5993a2b42aeee519527bfd36075ba0a11dfc0bec583f0e

      SHA512

      6cdb6417ba0ad61aa13fe9e27e33bbb4ea29da37969459a9ef5ed054c2822139dda1e7c2f00fba5d43683ddc7603546fa610e813c9f76dc34067d3cce7a14e9c

    • C:\Windows\SysWow64\Ocular\msmailboxidentify.dat
      Filesize

      56B

      MD5

      bf777b127ee66875e2b08174b00bbc07

      SHA1

      02ef38eb3fad07cc2e795e33dae9ad44cc1de976

      SHA256

      35c1ab113184120707b157d06e26ae834a48914ea0e313ea74efdebc7ba2e059

      SHA512

      5f03fb5d7d8a3286452dc9d71e0f8369835c172c2179ca94fc81dddeeb9f17f4404aeb2ea3c483809111cbe3f8741ad2c513a239e303b09f46e0230ec926db07

    • C:\Windows\SysWow64\Ocular\msmidtierserverclass3.dat
      Filesize

      132B

      MD5

      802914edc8dec4d5414de5bb98601d40

      SHA1

      13fe97de7e7593781a472d95324303e34eab552b

      SHA256

      01b4788cf9af339f50345c428bc0f850ad3902610df4ef31fff80b5e4b899947

      SHA512

      64486f3c23652c9a251c49a01f6c2794b5f27a0a2e10069bd4cd3172d8b7cee0c49bf98300152d8338facb025c4c771a85f3cd920f7375b6b7d7e27fd4f3adcf

    • C:\Windows\SysWow64\Ocular\msodhash3.dat
      Filesize

      6KB

      MD5

      9939bdd951897c8a48769f2e18be5397

      SHA1

      d3a9640400bf4175c2d560fb450fa6b723775636

      SHA256

      e7243c8ab50e2d1174030638045ab50e6ec9d2e9537d72cf3e76b6e0b3348fc1

      SHA512

      4e94c57a276f2feb5e74e1b6f376085de88a6b0cbfdbf77634e1c85ebf514473b150e677a60b9ff3621d9fc21ba3fcd2ad90c91b633a2dff13cb1933ca80a059

    • C:\Windows\SysWow64\Ocular\msusersystemservercfgclass2.dat
      Filesize

      40B

      MD5

      b4c5a731de7aafc9a8dece224e0db819

      SHA1

      190077d8d59260ec8362b8ef35c6b697dc8ed400

      SHA256

      c4b9f8c964f351f470cfb1734631489c055af13bb8b2df5cc477f2531b476d37

      SHA512

      120a7c2f964c2228c3546aa5e2a25862530e373812b99613b3d7ab763a267ba8dc49f108eeafc7b5246c6eb70b2099078345b8411e01e6450b47900e6981ef98

    • C:\Windows\SysWow64\bakrdgv3.sys
      Filesize

      1.7MB

      MD5

      97ac3ef2e098c4cb7dd6ec1d14dc28f1

      SHA1

      3e78e87eefe45f8403e46d94713b6667aee6d9c9

      SHA256

      a3d817490804a951bac1c7b1ea6f48aed75baec7e3b4e31be4fbd1fe82860bb1

      SHA512

      693e90da2581306a1f9bb117142429301c7dc28a8caf623c4dfc21f735c53c4502e2b58a5ebdbd8c568dfd3393d1687428f1934f4c28b4fc715eb8f856ac02cd

    • C:\Windows\bakoav3.sys
      Filesize

      13.7MB

      MD5

      3ae42cb8a028c5be3f57575342bbb56d

      SHA1

      2939396b9069d4b46febc047b13ce2c30de7e886

      SHA256

      0e0efb65f52f8ae90f1227aafddb1bd23803229497fc82c5c458c8d6eb83a609

      SHA512

      f4e5c0ff991fc907049171f8bc0ac763462e081b411547a3b24f7d57b51a73fb2c3d0a8daf5cccb0ddd8970ed5c81baf3a2c8e5b22eb3ccdc672a1e1aa01ae24

    • C:\Windows\system32\winwdgv364.dll
      Filesize

      1.3MB

      MD5

      889482a07ba13fc6e194a63d275a850a

      SHA1

      16a164fded3352abb63722a5c74750cdc438f99a

      SHA256

      799d176813c3d0f5a01fd482576aeab6a63e5024f3392e7974f5e437c3d7e3a0

      SHA512

      e5cb9cf49120ed20b07faceefccef24da4335f28f49d9ae7bfafccbc9a239c4039e9ce5f5d13b49d0be475b3913311d08b7d70a1a2df0c974d4c5a5f7bec507a

    • C:\Windows\win.ini
      Filesize

      1KB

      MD5

      91c92ac90e74a5dc2d3edd6579870f16

      SHA1

      720064d5eb301f2154ecb9cb9318ba91034b067a

      SHA256

      3357fd467ef2d825eafd2f2d20508bf8f6c16eb0c1dacbb9ae6e528607098f78

      SHA512

      79d153389988c7693e5c5a9cf311f12c6c69dc7d77f4b9dc25fda8ad214ee8148ea6e721604d136d1f2ff10828d8f78c317a7b0e2ce2a0d44b55aa3f2e0a6aa8

    • C:\Windows\win.ini
      Filesize

      1KB

      MD5

      d987b8ee310dc369bd69b46a64cf6ddd

      SHA1

      8ba4ce89b73fa20726895d13c078ed7bd46485d2

      SHA256

      5a5d8fe37ac74c37c22e3a3b256f2c30d2f0361df26d0b3b93757ad6cb74d5f0

      SHA512

      7c13e0884d538d885e5bafa435f2dea78d72d2db203c6a2292e8539279b50d3661830f27dfdf008c736499378f43c3a97382ad79a6afc5c38ff0f3291cd860fa

    • C:\Windows\win.ini
      Filesize

      1KB

      MD5

      eb8c51ac7de1e34b227aa1cfa0b2b4f4

      SHA1

      08ecd3f4988ed7310647cc4f8fb0c7ab26911e2c

      SHA256

      b7943d4226e1b06b7fe32c641d1d3cf027db3d197d7fa00fe9dfe4068798a2bf

      SHA512

      a5c416173961c1e09bc5cdda68f89024536c19e663f5914788f34d59f033daa618e58311b257d0faef72e31975cb0c21a417b497ea60d5be8297cc93b2d98994

    • \Users\Admin\AppData\Local\Temp\nst1BBC.tmp\System.dll
      Filesize

      12KB

      MD5

      6e55a6e7c3fdbd244042eb15cb1ec739

      SHA1

      070ea80e2192abc42f358d47b276990b5fa285a9

      SHA256

      acf90ab6f4edc687e94aaf604d05e16e6cfb5e35873783b50c66f307a35c6506

      SHA512

      2d504b74da38edc967e3859733a2a9cacd885db82f0ca69bfb66872e882707314c54238344d45945dc98bae85772aceef71a741787922d640627d3c8ae8f1c35

    • \Users\Admin\AppData\Local\Temp\nst1BBC.tmp\nsExec.dll
      Filesize

      7KB

      MD5

      ec9c99216ef11cdd85965e78bc797d2c

      SHA1

      1d5f93fbf4f8aab8164b109e9e1768e7b80ad88c

      SHA256

      c1b7c3ef8b77a5bb335dc9ec9c3546b249014dde43aa2a9ed719b4d5933741df

      SHA512

      35ff522c4efb3875fce0d6dce438f5225e5f27b414e7c16df88031e90b528c057fe10b4bbf755445c0500c3521e0797f562690aa7209f588169164bbfaceaba1

    • \Users\Admin\AppData\Local\Temp\nst1BBC.tmp\nsProcess.dll
      Filesize

      4KB

      MD5

      88d3e48d1c1a051c702d47046ade7b4c

      SHA1

      8fc805a8b7900b6ba895d1b809a9f3ad4c730d23

      SHA256

      51da07da18a5486b11e0d51ebff77a3f2fcbb4d66b5665d212cc6bda480c4257

      SHA512

      83299dd948b40b4e2c226256d018716dbacfa739d8e882131c7f4c028c0913bc4ed9d770deb252931f3d4890f8f385bd43dcf2a5bfe5b922ec35f4b3144247a7

    • memory/2128-253-0x0000000002E00000-0x0000000003C2C000-memory.dmp
      Filesize

      14.2MB