Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe
Resource
win10v2004-20240426-en
General
-
Target
47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe
-
Size
32KB
-
MD5
f5fca1b178af87bd48c7ea9e3f2c957b
-
SHA1
7a58fc9a14a7c4c0abaa8d9bae5d69e74a19762d
-
SHA256
47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399
-
SHA512
6ce8ee0ce49e2058aee2c0557e8ab6c1250dcefc4e8b4e451a07fb990a01051f8e0a5fb468f1d9b61b523ac481eaba11e501e2e5b45b2775a1be4428bca7cb37
-
SSDEEP
384:wnlkJzAQeFTaSO1CoRWQDwyErOfeYVTDj95Ssz95:wnlRbFm5AoR3XVTDj955z95
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ifconfig.me 4 ifconfig.me -
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 352 net.exe 2724 net.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2624 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2636 systeminfo.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1864 wmic.exe Token: SeSecurityPrivilege 1864 wmic.exe Token: SeTakeOwnershipPrivilege 1864 wmic.exe Token: SeLoadDriverPrivilege 1864 wmic.exe Token: SeSystemProfilePrivilege 1864 wmic.exe Token: SeSystemtimePrivilege 1864 wmic.exe Token: SeProfSingleProcessPrivilege 1864 wmic.exe Token: SeIncBasePriorityPrivilege 1864 wmic.exe Token: SeCreatePagefilePrivilege 1864 wmic.exe Token: SeBackupPrivilege 1864 wmic.exe Token: SeRestorePrivilege 1864 wmic.exe Token: SeShutdownPrivilege 1864 wmic.exe Token: SeDebugPrivilege 1864 wmic.exe Token: SeSystemEnvironmentPrivilege 1864 wmic.exe Token: SeRemoteShutdownPrivilege 1864 wmic.exe Token: SeUndockPrivilege 1864 wmic.exe Token: SeManageVolumePrivilege 1864 wmic.exe Token: 33 1864 wmic.exe Token: 34 1864 wmic.exe Token: 35 1864 wmic.exe Token: SeIncreaseQuotaPrivilege 1864 wmic.exe Token: SeSecurityPrivilege 1864 wmic.exe Token: SeTakeOwnershipPrivilege 1864 wmic.exe Token: SeLoadDriverPrivilege 1864 wmic.exe Token: SeSystemProfilePrivilege 1864 wmic.exe Token: SeSystemtimePrivilege 1864 wmic.exe Token: SeProfSingleProcessPrivilege 1864 wmic.exe Token: SeIncBasePriorityPrivilege 1864 wmic.exe Token: SeCreatePagefilePrivilege 1864 wmic.exe Token: SeBackupPrivilege 1864 wmic.exe Token: SeRestorePrivilege 1864 wmic.exe Token: SeShutdownPrivilege 1864 wmic.exe Token: SeDebugPrivilege 1864 wmic.exe Token: SeSystemEnvironmentPrivilege 1864 wmic.exe Token: SeRemoteShutdownPrivilege 1864 wmic.exe Token: SeUndockPrivilege 1864 wmic.exe Token: SeManageVolumePrivilege 1864 wmic.exe Token: 33 1864 wmic.exe Token: 34 1864 wmic.exe Token: 35 1864 wmic.exe Token: SeIncreaseQuotaPrivilege 1248 WMIC.exe Token: SeSecurityPrivilege 1248 WMIC.exe Token: SeTakeOwnershipPrivilege 1248 WMIC.exe Token: SeLoadDriverPrivilege 1248 WMIC.exe Token: SeSystemProfilePrivilege 1248 WMIC.exe Token: SeSystemtimePrivilege 1248 WMIC.exe Token: SeProfSingleProcessPrivilege 1248 WMIC.exe Token: SeIncBasePriorityPrivilege 1248 WMIC.exe Token: SeCreatePagefilePrivilege 1248 WMIC.exe Token: SeBackupPrivilege 1248 WMIC.exe Token: SeRestorePrivilege 1248 WMIC.exe Token: SeShutdownPrivilege 1248 WMIC.exe Token: SeDebugPrivilege 1248 WMIC.exe Token: SeSystemEnvironmentPrivilege 1248 WMIC.exe Token: SeRemoteShutdownPrivilege 1248 WMIC.exe Token: SeUndockPrivilege 1248 WMIC.exe Token: SeManageVolumePrivilege 1248 WMIC.exe Token: 33 1248 WMIC.exe Token: 34 1248 WMIC.exe Token: 35 1248 WMIC.exe Token: SeIncreaseQuotaPrivilege 1248 WMIC.exe Token: SeSecurityPrivilege 1248 WMIC.exe Token: SeTakeOwnershipPrivilege 1248 WMIC.exe Token: SeLoadDriverPrivilege 1248 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2268 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 28 PID 3012 wrote to memory of 2268 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 28 PID 3012 wrote to memory of 2268 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 28 PID 2268 wrote to memory of 2624 2268 cmd.exe 30 PID 2268 wrote to memory of 2624 2268 cmd.exe 30 PID 2268 wrote to memory of 2624 2268 cmd.exe 30 PID 3012 wrote to memory of 2760 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 31 PID 3012 wrote to memory of 2760 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 31 PID 3012 wrote to memory of 2760 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 31 PID 2760 wrote to memory of 2636 2760 cmd.exe 33 PID 2760 wrote to memory of 2636 2760 cmd.exe 33 PID 2760 wrote to memory of 2636 2760 cmd.exe 33 PID 3012 wrote to memory of 2480 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 36 PID 3012 wrote to memory of 2480 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 36 PID 3012 wrote to memory of 2480 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 36 PID 2480 wrote to memory of 2508 2480 cmd.exe 38 PID 2480 wrote to memory of 2508 2480 cmd.exe 38 PID 2480 wrote to memory of 2508 2480 cmd.exe 38 PID 3012 wrote to memory of 2556 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 39 PID 3012 wrote to memory of 2556 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 39 PID 3012 wrote to memory of 2556 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 39 PID 2556 wrote to memory of 2536 2556 cmd.exe 41 PID 2556 wrote to memory of 2536 2556 cmd.exe 41 PID 2556 wrote to memory of 2536 2556 cmd.exe 41 PID 3012 wrote to memory of 1972 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 42 PID 3012 wrote to memory of 1972 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 42 PID 3012 wrote to memory of 1972 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 42 PID 1972 wrote to memory of 352 1972 cmd.exe 44 PID 1972 wrote to memory of 352 1972 cmd.exe 44 PID 1972 wrote to memory of 352 1972 cmd.exe 44 PID 3012 wrote to memory of 2820 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 46 PID 3012 wrote to memory of 2820 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 46 PID 3012 wrote to memory of 2820 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 46 PID 2820 wrote to memory of 2724 2820 cmd.exe 48 PID 2820 wrote to memory of 2724 2820 cmd.exe 48 PID 2820 wrote to memory of 2724 2820 cmd.exe 48 PID 3012 wrote to memory of 1856 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 49 PID 3012 wrote to memory of 1856 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 49 PID 3012 wrote to memory of 1856 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 49 PID 1856 wrote to memory of 640 1856 cmd.exe 51 PID 1856 wrote to memory of 640 1856 cmd.exe 51 PID 1856 wrote to memory of 640 1856 cmd.exe 51 PID 640 wrote to memory of 1584 640 net.exe 52 PID 640 wrote to memory of 1584 640 net.exe 52 PID 640 wrote to memory of 1584 640 net.exe 52 PID 3012 wrote to memory of 1864 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 53 PID 3012 wrote to memory of 1864 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 53 PID 3012 wrote to memory of 1864 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 53 PID 3012 wrote to memory of 1792 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 55 PID 3012 wrote to memory of 1792 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 55 PID 3012 wrote to memory of 1792 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 55 PID 1792 wrote to memory of 1472 1792 cmd.exe 57 PID 1792 wrote to memory of 1472 1792 cmd.exe 57 PID 1792 wrote to memory of 1472 1792 cmd.exe 57 PID 1472 wrote to memory of 236 1472 net.exe 58 PID 1472 wrote to memory of 236 1472 net.exe 58 PID 1472 wrote to memory of 236 1472 net.exe 58 PID 3012 wrote to memory of 2452 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 59 PID 3012 wrote to memory of 2452 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 59 PID 3012 wrote to memory of 2452 3012 47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe 59 PID 2452 wrote to memory of 1248 2452 cmd.exe 61 PID 2452 wrote to memory of 1248 2452 cmd.exe 61 PID 2452 wrote to memory of 1248 2452 cmd.exe 61 PID 2452 wrote to memory of 1268 2452 cmd.exe 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe"C:\Users\Admin\AppData\Local\Temp\47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe"1⤵
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\System32\cmd.exe/c ipconfig /all2⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2624
-
-
-
C:\Windows\System32\cmd.exe/c systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2636
-
-
-
C:\Windows\System32\cmd.exe/c nltest /domain_trusts2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\nltest.exenltest /domain_trusts3⤵PID:2508
-
-
-
C:\Windows\System32\cmd.exe/c nltest /domain_trusts /all_trusts2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\system32\nltest.exenltest /domain_trusts /all_trusts3⤵PID:2536
-
-
-
C:\Windows\System32\cmd.exe/c net view /all /domain2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\net.exenet view /all /domain3⤵
- Discovers systems in the same network
PID:352
-
-
-
C:\Windows\System32\cmd.exe/c net view /all2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\net.exenet view /all3⤵
- Discovers systems in the same network
PID:2724
-
-
-
C:\Windows\System32\cmd.exe/c net group "Domain Admins" /domain2⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\net.exenet group "Domain Admins" /domain3⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group "Domain Admins" /domain4⤵PID:1584
-
-
-
-
C:\Windows\System32\wbem\wmic.exe/Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\System32\cmd.exe/c net config workstation2⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\net.exenet config workstation3⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 config workstation4⤵PID:236
-
-
-
-
C:\Windows\System32\cmd.exe/c wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName || echo No Antivirus installed2⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\System32\Wbem\WMIC.exewmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\system32\findstr.exefindstr /V /B /C:displayName3⤵PID:1268
-
-
-
C:\Windows\System32\cmd.exe/c whoami /groups2⤵PID:2180
-
C:\Windows\system32\whoami.exewhoami /groups3⤵PID:2040
-
-