Analysis

  • max time kernel
    45s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:32

General

  • Target

    DoctorWeb.exe

  • Size

    7.8MB

  • MD5

    1c33f964fbf5b3642d02e4b20ba6f2ac

  • SHA1

    dcec14364a4548ce394906487a37f98bb1d12198

  • SHA256

    10a45dc010df96cbd65bfd8a59e906ca5f98dd6f7541cf02bdfc17df8384bb8f

  • SHA512

    ea3268a85ff2dfe7c94c6eb670f4aa3a13ec3019cf47bbcfa7e31eaa48dea0c8ee7dd0ebd020785942063e8acee7e2df62cd0c1eadf46a0208ebea29e146462b

  • SSDEEP

    98304:Jqx1gyR0CwX6T036KJt6Oe2NhqCZao4+Axhy4V7FLEMUH82Z3dFRsFVsKtOep1eT:6WhwInbrIh17FFWZnR0VsAHndDNc7T

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DoctorWeb.exe
    "C:\Users\Admin\AppData\Local\Temp\DoctorWeb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\start_dobrota.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mbr.exe
        mbr.exe
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        PID:2752
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\sound.vbs"
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:2500
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\erroricons.exe
        erroricons.exe
        3⤵
        • Executes dropped EXE
        PID:3032
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\INVERS.exe
        INVERS.exe
        3⤵
        • Executes dropped EXE
        PID:804
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\crazywarningicons.exe
        crazywarningicons.exe
        3⤵
        • Executes dropped EXE
        PID:2856
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\crazyinvers.exe
        crazyinvers.exe
        3⤵
        • Executes dropped EXE
        PID:2964
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\erroriconscursor.exe
        erroriconscursor.exe
        3⤵
        • Executes dropped EXE
        PID:2992
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\toonel.exe
        toonel.exe
        3⤵
        • Executes dropped EXE
        PID:2948
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\messages2.vbs"
        3⤵
          PID:320
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\messages.vbs"
          3⤵
            PID:2340
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:652
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef68b9758,0x7fef68b9768,0x7fef68b9778
          2⤵
            PID:2292
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1232,i,17079864762845164534,1507773066751278274,131072 /prefetch:2
            2⤵
              PID:1000
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1232,i,17079864762845164534,1507773066751278274,131072 /prefetch:8
              2⤵
                PID:1332
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1232,i,17079864762845164534,1507773066751278274,131072 /prefetch:8
                2⤵
                  PID:2356
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1232,i,17079864762845164534,1507773066751278274,131072 /prefetch:1
                  2⤵
                    PID:2248
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1232,i,17079864762845164534,1507773066751278274,131072 /prefetch:1
                    2⤵
                      PID:2288
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1468 --field-trial-handle=1232,i,17079864762845164534,1507773066751278274,131072 /prefetch:2
                      2⤵
                        PID:2492
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3168 --field-trial-handle=1232,i,17079864762845164534,1507773066751278274,131072 /prefetch:1
                        2⤵
                          PID:2016
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3380 --field-trial-handle=1232,i,17079864762845164534,1507773066751278274,131072 /prefetch:8
                          2⤵
                            PID:896
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3532 --field-trial-handle=1232,i,17079864762845164534,1507773066751278274,131072 /prefetch:8
                            2⤵
                              PID:2436
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 --field-trial-handle=1232,i,17079864762845164534,1507773066751278274,131072 /prefetch:8
                              2⤵
                                PID:2836
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:2272

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                Filesize

                                16B

                                MD5

                                aefd77f47fb84fae5ea194496b44c67a

                                SHA1

                                dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                SHA256

                                4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                SHA512

                                b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                285e0d944cfe4440a831333f33f734cd

                                SHA1

                                49e40b11576bb57a31f048c7ec5fdc7b0b5ccca4

                                SHA256

                                4a700723c532b16520d9fbc23424b17bf51d746af36a520cb1a907982c8be908

                                SHA512

                                3ef6a15131e3c7671dfbc682e620539e717f8c769799e5b3dd9b1d765b44022fa8a9fd5800e86fafac34b0e734c3fec282b55715093eb73437dda8d3f5eef865

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                1d875b304c636404f785fd3ba9544ff5

                                SHA1

                                689658330dcee815144370d73772e4213f44c3bd

                                SHA256

                                e9bf889d79aceedab0c2c6ca92ac765dcb22d646294d632363f74289ba340c1f

                                SHA512

                                17cbd774d772a62eb1b3cbc69e854c4adfe2e85bf593e067566ebdc17fd3311daadb9c90113bf9f0898a05140fc3993b730ebc75f7cb118dd553ada8a625fdf2

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                Filesize

                                16B

                                MD5

                                18e723571b00fb1694a3bad6c78e4054

                                SHA1

                                afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                SHA256

                                8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                SHA512

                                43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\INVERS.exe

                                Filesize

                                2.3MB

                                MD5

                                5134f289dbf4abae370e3f36b637b73e

                                SHA1

                                c78d3f2d00dc47da0112a74df665c7a84a8e32c3

                                SHA256

                                e69c9383b5d9fe4e069ddee15797c52e9116f883ad3b1717d2519621ab2751b2

                                SHA512

                                0bf61a04b93b1ba5b8a0e2d9a1c333cc4605350a4c797cc9f5f78fec698d6f4fd62d329513ed406e76a06aa6af0f00d206da723e5a33315ce8de7f68f2002cb5

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\crazyinvers.exe

                                Filesize

                                2.3MB

                                MD5

                                a44458813e819777013eb3e644d74362

                                SHA1

                                2dd0616ca78e22464cf0cf68ef7915358a16f9ee

                                SHA256

                                47f0e9a90d45b193e81d3e60b7a43e5a4550a07a3dd1f7c98110fde12265d999

                                SHA512

                                1a4723a36f55cf696f33a7927571bda403e81ced32fda85c7cf25c8458897fb187e46bf5f80c26542725a9a7e5aa0e961fd3f3b110ae8f54b3b96b3e5dfc8215

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\crazywarningicons.exe

                                Filesize

                                1.2MB

                                MD5

                                e21bb4749a8b1b6fc26a7bcf57781836

                                SHA1

                                89cb0bd80d691ca650ad01551be3acefa2256ebd

                                SHA256

                                0ecbb8099ed1d9a1673165d3c4c9bbde88dd9678540a98b99434ff23b9e6d82c

                                SHA512

                                b0ccf421e415f94b6f0497dd041a8e7693d01d72cd577eca771d2049516f7a0c8c7221da642e5c38d5bc95a2335279d36f956314bda442b99a2d244bcc73b47b

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dobrota.mp3

                                Filesize

                                6.6MB

                                MD5

                                fad2e8c2a096f4593a03a771bbe99458

                                SHA1

                                88af47f279b9ea008901a6a242466f40f44e8a5c

                                SHA256

                                a40dd9aedae52766593bce06a9a68d47fcf8d430f254ce5e50b0c55587d46213

                                SHA512

                                7b607d2927bfb5d2ae3da7ad40fc842f6c1cd12cbc8814a043950d65f50d8084aaa8a544fe51312e68bde9434b138c5c8df50568650658ed0600f447a4a32441

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\erroricons.exe

                                Filesize

                                316KB

                                MD5

                                7f31508d95be3fe50e4e9aa646e86a12

                                SHA1

                                c61b439d6e17d630728f48c09b36af2647940748

                                SHA256

                                994efdb644ca1acb029dfd8d8eeba440e1cb74d93841b17f21165b9900730b15

                                SHA512

                                2e2b01e84a3476b47a9c703b71ce31887e4a4fa9340780f0cbbd20601be621bf00b9619df8bec0e81b2825550150c477c5071d921104a4c6265ef2d5a9e77eda

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\erroriconscursor.exe

                                Filesize

                                316KB

                                MD5

                                135eeb256e92d261066cfd3ffd31fb3e

                                SHA1

                                5c275ffd2ab1359249bae8c91bebcab19a185e91

                                SHA256

                                f0fe346146c30129ed6f507906c973f1a54c7d8dd8821c97e9b6edc42545699d

                                SHA512

                                a3792f92b116851023620d862cac6d2b5542de41390b6b8d223074db94193f0ee6dfcc9d6588ea3e77173f73c7fdfc5f9a1e1044c597636fe275d9ff4b76a12b

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mbr.exe

                                Filesize

                                47KB

                                MD5

                                8562ed46d745dceb3cc268693ca25c83

                                SHA1

                                309067f0c9703084654495a47e67f7a40824700d

                                SHA256

                                ea5d21e6598d52b30e9d055bc406c6227bbadb5c493addb27b32fb16a6dcae8c

                                SHA512

                                52f23e70f7ea6eab1a50a4008e563d787732f7361dfe10c48f39dae42bce023c90449c9a903733fab13c49b50f8c4fa7d4864ab26c69326aab0149c765fd677b

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\messages.vbs

                                Filesize

                                37B

                                MD5

                                35fbf9bf29760b9e120b37900b3c1343

                                SHA1

                                8a231c37ee13e72f27a38411668fde6fef3ff5bc

                                SHA256

                                e1cdab59df6508013e8b91c71043c8ecfe81b94a037706147ed19adf992539e6

                                SHA512

                                d1c12b6690c6b90dda5ad3e226e30adc848b3c324f929dec373ab6c7606fbcab716c49c4446efadf14036583924f8f094491bfe8bef380fd877c00cf9feaacc6

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\messages2.vbs

                                Filesize

                                37B

                                MD5

                                63954d8930e517637c254f9da0749e7a

                                SHA1

                                27f6a13c0e9530166d62b4586c3d2bda5cb5064c

                                SHA256

                                bffa14678b8c39c2fbfa54b76fbac5f750aebc8dc2954da10a55b7f1f90f351c

                                SHA512

                                dd5df6b8a64523fedb5aaced7d864013d12e6930015d8fd2267b11cffe76741c3a7907814a832ff7589476a51d16e8ab0fc566f4ac0784f6a599070080c7008d

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sound.vbs

                                Filesize

                                216B

                                MD5

                                c36c15e1f99e1c0d093b9b089b1073c5

                                SHA1

                                47a237639f83d8de0c2034831ff3e12a3bad7408

                                SHA256

                                3d6123cae8ac645d9c9d33b0dada869a7fdd5117a2bf0f9080e4e30fe5bed736

                                SHA512

                                4283b45c6483e2ed6e9741f5937bb7851e101fb4710bd687a73a77b5abcb820d2480deaee50c8e87a7f225cee2430836da75d201838e9d989e91f3c0c0c60d1f

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start_dobrota.bat

                                Filesize

                                220B

                                MD5

                                99ee6716bf6dd074e52a923e74f9fa70

                                SHA1

                                42494346592ca59d2d895ec77d37d83ce2dbed1a

                                SHA256

                                d51fd681ba6346842afe2f9cb7ae117cb667986af0c67e28664124173b183740

                                SHA512

                                2179380ec9630dbce4f7637f4e6fe8164d61cb41c2d43be98d97a7116aa5d7a181a8bdb4ed3f3d147aaec9dd2152dd9a23e94e3a67c2bd7f12e4b205826b6732

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\toonel.exe

                                Filesize

                                317KB

                                MD5

                                a84257e64cfbd9f6c0a574af416bc0d1

                                SHA1

                                245649583806d63abb1b2dc1947feccc8ce4a4bc

                                SHA256

                                fe7ff85b95ec06ce0f3cb49fdfa4d36de1f08669d36d381794aaf597510afad7

                                SHA512

                                6fc85ee0f8c75a25193fc4883a734704a8190253348c158b9cef4b918cffee5c8997c5248ec2bc793f66978e8cb4c5233d300d112f1d7750bc660698414865c2

                              • \??\pipe\crashpad_652_GJBKEDPCWZBJMRYV

                                MD5

                                d41d8cd98f00b204e9800998ecf8427e

                                SHA1

                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                SHA256

                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                SHA512

                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                              • memory/804-149-0x0000000000400000-0x0000000000582000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/2752-50-0x0000000000400000-0x0000000000412000-memory.dmp

                                Filesize

                                72KB

                              • memory/2856-150-0x0000000000400000-0x0000000000541000-memory.dmp

                                Filesize

                                1.3MB

                              • memory/2892-143-0x00000000033C0000-0x00000000034C0000-memory.dmp

                                Filesize

                                1024KB

                              • memory/2948-153-0x0000000000400000-0x0000000000454000-memory.dmp

                                Filesize

                                336KB

                              • memory/2964-151-0x0000000000400000-0x0000000000582000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/2992-152-0x0000000000400000-0x0000000000454000-memory.dmp

                                Filesize

                                336KB

                              • memory/3032-148-0x0000000000400000-0x0000000000454000-memory.dmp

                                Filesize

                                336KB