Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe
Resource
win10v2004-20240508-en
General
-
Target
810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe
-
Size
248KB
-
MD5
d1f07c905d2c43bbcdea50865ba1d339
-
SHA1
293af802fa872d5dda872543fbf86a77a0f14a64
-
SHA256
810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2
-
SHA512
acce0cf5d358f1f2f9bf1cbebae71072db07e2138fdad146acf332c8d711ea35e883d09981b121870c80e89aa127a0ebe259a04d017c538bbee938bbb4675fa8
-
SSDEEP
6144:GaLo6CHVhucTtjFg8UAD000332HjL8kwrniR3vDGObbV:GWo6UugFg8Ps32DLgIT5
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
bitsfmon.exe~D4A.tmpRegicont.exepid process 2380 bitsfmon.exe 2292 ~D4A.tmp 2616 Regicont.exe -
Loads dropped DLL 3 IoCs
Processes:
810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exebitsfmon.exepid process 2956 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe 2956 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe 2380 bitsfmon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Regidctr = "C:\\Users\\Admin\\AppData\\Roaming\\ciphpugc\\bitsfmon.exe" 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe -
Drops file in System32 directory 1 IoCs
Processes:
810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exedescription ioc process File created C:\Windows\SysWOW64\Regicont.exe 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2060 2956 WerFault.exe 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bitsfmon.exeExplorer.EXERegicont.exepid process 2380 bitsfmon.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE 2616 Regicont.exe 1380 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bitsfmon.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2380 bitsfmon.exe Token: SeShutdownPrivilege 1380 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exebitsfmon.exe~D4A.tmpdescription pid process target process PID 2956 wrote to memory of 2380 2956 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe bitsfmon.exe PID 2956 wrote to memory of 2380 2956 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe bitsfmon.exe PID 2956 wrote to memory of 2380 2956 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe bitsfmon.exe PID 2956 wrote to memory of 2380 2956 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe bitsfmon.exe PID 2380 wrote to memory of 2292 2380 bitsfmon.exe ~D4A.tmp PID 2380 wrote to memory of 2292 2380 bitsfmon.exe ~D4A.tmp PID 2380 wrote to memory of 2292 2380 bitsfmon.exe ~D4A.tmp PID 2380 wrote to memory of 2292 2380 bitsfmon.exe ~D4A.tmp PID 2292 wrote to memory of 1380 2292 ~D4A.tmp Explorer.EXE PID 2956 wrote to memory of 2060 2956 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe WerFault.exe PID 2956 wrote to memory of 2060 2956 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe WerFault.exe PID 2956 wrote to memory of 2060 2956 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe WerFault.exe PID 2956 wrote to memory of 2060 2956 810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe WerFault.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe"C:\Users\Admin\AppData\Local\Temp\810028a166226b95b0ec8c31176f243560151aa526096da183f291dee26350b2.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\ciphpugc\bitsfmon.exe"C:\Users\Admin\AppData\Roaming\ciphpugc"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\~D4A.tmp1380 254472 2380 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 2523⤵
- Program crash
-
C:\Windows\SysWOW64\Regicont.exeC:\Windows\SysWOW64\Regicont.exe -s1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\~D4A.tmpFilesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
\Users\Admin\AppData\Roaming\ciphpugc\bitsfmon.exeFilesize
248KB
MD51d4b5dd3323b80ed9f00b07978ed5e8b
SHA1f4b1da0957c6b77afa42d1e47c94ce925747e92e
SHA25685c17e4a4e9f1bea1b065d9d09679d7da5ae808ff8fa7bdb2281d45cc09588e5
SHA512deab752fc5ad926d2abcb3128ecfe73fc39b4331734725fd82e9eec747caea36b21ae0d31de29ab3b300a9ff2d2e7457ef1847800d24a4446dd1d76ec07ae41b
-
memory/1380-27-0x0000000002AC0000-0x0000000002ACD000-memory.dmpFilesize
52KB
-
memory/1380-25-0x00000000025C0000-0x00000000025C6000-memory.dmpFilesize
24KB
-
memory/1380-22-0x0000000002470000-0x00000000024BE000-memory.dmpFilesize
312KB
-
memory/1380-20-0x0000000002470000-0x00000000024BE000-memory.dmpFilesize
312KB
-
memory/1380-21-0x0000000002470000-0x00000000024BE000-memory.dmpFilesize
312KB
-
memory/2380-15-0x0000000000180000-0x00000000001C8000-memory.dmpFilesize
288KB
-
memory/2380-16-0x0000000000210000-0x0000000000216000-memory.dmpFilesize
24KB
-
memory/2380-30-0x0000000001310000-0x0000000001352000-memory.dmpFilesize
264KB
-
memory/2616-32-0x0000000000140000-0x0000000000188000-memory.dmpFilesize
288KB
-
memory/2616-35-0x0000000000190000-0x0000000000196000-memory.dmpFilesize
24KB
-
memory/2616-36-0x0000000000080000-0x0000000000086000-memory.dmpFilesize
24KB
-
memory/2616-34-0x0000000000080000-0x0000000000086000-memory.dmpFilesize
24KB
-
memory/2616-33-0x0000000001250000-0x0000000001292000-memory.dmpFilesize
264KB
-
memory/2616-39-0x0000000000140000-0x0000000000188000-memory.dmpFilesize
288KB
-
memory/2616-40-0x0000000000080000-0x0000000000086000-memory.dmpFilesize
24KB
-
memory/2956-0-0x0000000000C20000-0x0000000000C62000-memory.dmpFilesize
264KB
-
memory/2956-11-0x0000000000B90000-0x0000000000BD2000-memory.dmpFilesize
264KB
-
memory/2956-1-0x0000000000300000-0x0000000000348000-memory.dmpFilesize
288KB
-
memory/2956-6-0x0000000000B90000-0x0000000000BD2000-memory.dmpFilesize
264KB
-
memory/2956-37-0x0000000000300000-0x0000000000348000-memory.dmpFilesize
288KB
-
memory/2956-38-0x0000000000B90000-0x0000000000BD2000-memory.dmpFilesize
264KB