Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe
Resource
win7-20240220-en
General
-
Target
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe
-
Size
192KB
-
MD5
5ef571b6a4f2ff6300f3a3b50bfd0632
-
SHA1
9360645cf56f7b512046a2734fdc845bedbe6742
-
SHA256
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b
-
SHA512
b553c9637b09cd7e11984e5e532a412601ba149ad0af5168be54273dbb9750fa43133e9c71264de9cae423f55394b7ad7051f067928e957f003726c8cad16a58
-
SSDEEP
3072:5Mvj+eIAbeWsy7hy/049Vem7l2fySg7+ehmIHELhxVy/5/YoayJ8gCy6IKxzQy:+vj2AbeWsy204rLlKlk+HIqhxVyhweAg
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
xinputlogs.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat xinputlogs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 19 IoCs
Processes:
xinputlogs.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{30D50AEC-DD7D-4392-ACA3-54FA2CB9F4B9}\WpadDecisionReason = "1" xinputlogs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-d9-37-fd-29-2d xinputlogs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-d9-37-fd-29-2d\WpadDetectedUrl xinputlogs.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{30D50AEC-DD7D-4392-ACA3-54FA2CB9F4B9}\WpadNetworkName = "Network 3" xinputlogs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections xinputlogs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad xinputlogs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f012c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 xinputlogs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-d9-37-fd-29-2d\WpadDecisionReason = "1" xinputlogs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-d9-37-fd-29-2d\WpadDecision = "0" xinputlogs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{30D50AEC-DD7D-4392-ACA3-54FA2CB9F4B9} xinputlogs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{30D50AEC-DD7D-4392-ACA3-54FA2CB9F4B9}\WpadDecisionTime = 6014ceb842a9da01 xinputlogs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{30D50AEC-DD7D-4392-ACA3-54FA2CB9F4B9}\WpadDecision = "0" xinputlogs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings xinputlogs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 xinputlogs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings xinputlogs.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" xinputlogs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 xinputlogs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{30D50AEC-DD7D-4392-ACA3-54FA2CB9F4B9}\9a-d9-37-fd-29-2d xinputlogs.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-d9-37-fd-29-2d\WpadDecisionTime = 6014ceb842a9da01 xinputlogs.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exexinputlogs.exexinputlogs.exepid process 2208 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 2480 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 2612 xinputlogs.exe 2968 xinputlogs.exe 2968 xinputlogs.exe 2968 xinputlogs.exe 2968 xinputlogs.exe 2968 xinputlogs.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exepid process 2480 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exexinputlogs.exedescription pid process target process PID 2208 wrote to memory of 2480 2208 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe PID 2208 wrote to memory of 2480 2208 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe PID 2208 wrote to memory of 2480 2208 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe PID 2208 wrote to memory of 2480 2208 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe PID 2612 wrote to memory of 2968 2612 xinputlogs.exe xinputlogs.exe PID 2612 wrote to memory of 2968 2612 xinputlogs.exe xinputlogs.exe PID 2612 wrote to memory of 2968 2612 xinputlogs.exe xinputlogs.exe PID 2612 wrote to memory of 2968 2612 xinputlogs.exe xinputlogs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe"C:\Users\Admin\AppData\Local\Temp\90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe"C:\Users\Admin\AppData\Local\Temp\90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2480
-
C:\Windows\SysWOW64\xinputlogs.exe"C:\Windows\SysWOW64\xinputlogs.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\xinputlogs.exe"C:\Windows\SysWOW64\xinputlogs.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2968