Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:07
Behavioral task
behavioral1
Sample
9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe
Resource
win10v2004-20240508-en
General
-
Target
9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe
-
Size
222KB
-
MD5
9e1ec0ca9b461128a5c0f043edc9c003
-
SHA1
0795139ad49e433c8e326a1741328505301759e9
-
SHA256
9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa
-
SHA512
d7dac235f3d8defc96480463f0d2d2566067d81ca27e92089c583ccf96cc36caeb55d5d0630dc423ed6770cb6847ec6635692b3426e9417a96e1197a316dca42
-
SSDEEP
6144:C9npsuf052Nxy/f6E8MAUlKCEcg33wH9DnEPAFeEx:C9nSu0bWcdxn
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 7 IoCs
Processes:
resource yara_rule behavioral1/memory/2256-0-0x0000000000400000-0x0000000000439000-memory.dmp UPX \Users\Admin\AppData\Roaming\Microsoft\bin\dwm32.exe UPX behavioral1/memory/2256-28-0x00000000037C0000-0x00000000037F9000-memory.dmp UPX behavioral1/memory/2256-36-0x0000000000400000-0x0000000000439000-memory.dmp UPX behavioral1/memory/2628-38-0x0000000000400000-0x0000000000439000-memory.dmp UPX behavioral1/memory/2628-39-0x0000000000400000-0x0000000000439000-memory.dmp UPX behavioral1/memory/2732-45-0x0000000000400000-0x0000000000439000-memory.dmp UPX -
Executes dropped EXE 2 IoCs
Processes:
dwm32.exedwm32.exepid process 2732 dwm32.exe 2628 dwm32.exe -
Loads dropped DLL 3 IoCs
Processes:
9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exepid process 2256 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe 2256 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe 2256 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe -
Processes:
resource yara_rule behavioral1/memory/2256-0-0x0000000000400000-0x0000000000439000-memory.dmp upx \Users\Admin\AppData\Roaming\Microsoft\bin\dwm32.exe upx behavioral1/memory/2256-28-0x00000000037C0000-0x00000000037F9000-memory.dmp upx behavioral1/memory/2256-27-0x00000000037C0000-0x00000000037D0000-memory.dmp upx behavioral1/memory/2256-36-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2628-38-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2628-39-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2732-45-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
Processes:
9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas\command 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\DefaultIcon\ = "%1" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\shell\runas\command\ = "\"%1\" %*" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\DefaultIcon\ = "%1" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open\command 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\ = "Application" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\shell 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\DefaultIcon 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\Content-Type = "application/x-msdownload" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\shell\open\command\IsolatedCommand = "\"%1\" %*" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\ = "psdrv" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\bin\\dwm32.exe\" /START \"%1\" %*" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\shell\runas\command 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\shell\runas\command\IsolatedCommand = "\"%1\" %*" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\bin\\dwm32.exe\" /START \"%1\" %*" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\shell\open 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\shell\runas 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\DefaultIcon 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\psdrv\shell\open\command 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dwm32.exedescription pid process Token: SeIncBasePriorityPrivilege 2732 dwm32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
dwm32.exepid process 2732 dwm32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exedwm32.exedescription pid process target process PID 2256 wrote to memory of 2732 2256 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe dwm32.exe PID 2256 wrote to memory of 2732 2256 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe dwm32.exe PID 2256 wrote to memory of 2732 2256 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe dwm32.exe PID 2256 wrote to memory of 2732 2256 9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe dwm32.exe PID 2732 wrote to memory of 2628 2732 dwm32.exe dwm32.exe PID 2732 wrote to memory of 2628 2732 dwm32.exe dwm32.exe PID 2732 wrote to memory of 2628 2732 dwm32.exe dwm32.exe PID 2732 wrote to memory of 2628 2732 dwm32.exe dwm32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe"C:\Users\Admin\AppData\Local\Temp\9f5c5d4097f49d5c861c5fcd99e48470819145eec064932f1d2f16448dedcdfa.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\Microsoft\bin\dwm32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\bin\dwm32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\bin\dwm32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Roaming\Microsoft\bin\dwm32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\bin\dwm32.exe"3⤵
- Executes dropped EXE
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD52632109bc42d1c5a7d5acfa805f8cca6
SHA1885761d1890e907066bee2c8750b1e38ce1aac27
SHA2562945bd473ca1347157be3a648a672a6a0b1be43626a562ba416aef7d8d4f3b82
SHA5123ec4678c9ac4dca2c659873e38832e1a167e106464975803059b8a46ac4e98ad4bc72c20566f516e6c3d4bc469ff26577335912c5c27439ad4f66d2ff4d9a00e