Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 10:39
Behavioral task
behavioral1
Sample
4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
Resource
win10v2004-20240426-en
General
-
Target
4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
-
Size
2.7MB
-
MD5
7a09c18527253aef3889cd14d036f4dc
-
SHA1
e751c0c5bded024beed87e9ecca48b993aa86132
-
SHA256
4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af
-
SHA512
18c60ceb54997b39a57e64de2d4f8d665307a4656f5b197cb996fa9bcd0ad74d4731090ff9d567f09818e706c8bec2abc242c3a49a908642e9fde1a586862f3c
-
SSDEEP
49152:CWBj/cjFA0c4mB5jR8MXfS1gjxk6MGQI3fScAi4G0P8teFMFccZ:McSMeg2/S14x/FMOI
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,C:\\Windows\\CleanTemp.exe" CleanTemp.exe -
Executes dropped EXE 5 IoCs
pid Process 2580 sg.tmp 2492 CleanTemp64.exe 2372 CleanTemp64.exe 2568 sg.tmp 1340 CleanTemp.exe -
Loads dropped DLL 4 IoCs
pid Process 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 2492 CleanTemp64.exe 2492 CleanTemp64.exe -
resource yara_rule behavioral1/memory/2888-0-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral1/memory/3060-7-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral1/memory/3060-10-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral1/files/0x0007000000015d88-27.dat upx behavioral1/memory/2492-31-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral1/memory/2372-41-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral1/memory/2372-44-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral1/files/0x0007000000015cb9-63.dat upx behavioral1/memory/2492-65-0x0000000000400000-0x0000000000573000-memory.dmp upx behavioral1/memory/2888-66-0x0000000000400000-0x0000000000573000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CleanTemp.exe sg.tmp File opened for modification C:\Windows\CleanTemp.exe sg.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main CleanTemp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.2345.com/?knetboy365" CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main CleanTemp.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?knetboy365" CleanTemp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.2345.com/?knetboy365" CleanTemp.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTML\shell\open\command CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTML\shell\open CleanTemp.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTML\shell\open\command\ = "C:\\Program Files\\Opera\\launcher.exe http://www.2345.com/?knetboy365" CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTTP\shell\open\command CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTTP\shell\open CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTTP\shell CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTTPS CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTTPS\shell\open CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTML CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTML\shell CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTTP CleanTemp.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTTP\shell\open\command\ = "C:\\Program Files\\Opera\\launcher.exe http://www.2345.com/?knetboy365" CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTTPS\shell\open\command CleanTemp.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTTPS\shell CleanTemp.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Opera.HTTPS\shell\open\command\ = "C:\\Program Files\\Opera\\launcher.exe https://www.2345.com/?knetboy365" CleanTemp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2492 CleanTemp64.exe 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeBackupPrivilege 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeRestorePrivilege 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: 33 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeCreateGlobalPrivilege 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: 33 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: 33 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeBackupPrivilege 3060 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeRestorePrivilege 3060 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: 33 3060 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 3060 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: 33 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeRestorePrivilege 2580 sg.tmp Token: 35 2580 sg.tmp Token: SeSecurityPrivilege 2580 sg.tmp Token: SeSecurityPrivilege 2580 sg.tmp Token: 33 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeIncBasePriorityPrivilege 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe Token: SeBackupPrivilege 2492 CleanTemp64.exe Token: SeRestorePrivilege 2492 CleanTemp64.exe Token: 33 2492 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 2492 CleanTemp64.exe Token: SeCreateGlobalPrivilege 2492 CleanTemp64.exe Token: 33 2492 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 2492 CleanTemp64.exe Token: 33 2492 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 2492 CleanTemp64.exe Token: SeBackupPrivilege 2372 CleanTemp64.exe Token: SeRestorePrivilege 2372 CleanTemp64.exe Token: 33 2372 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 2372 CleanTemp64.exe Token: 33 2492 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 2492 CleanTemp64.exe Token: SeRestorePrivilege 2568 sg.tmp Token: 35 2568 sg.tmp Token: SeSecurityPrivilege 2568 sg.tmp Token: SeSecurityPrivilege 2568 sg.tmp Token: 33 2492 CleanTemp64.exe Token: SeIncBasePriorityPrivilege 2492 CleanTemp64.exe Token: SeDebugPrivilege 2492 CleanTemp64.exe Token: SeDebugPrivilege 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2888 wrote to memory of 3040 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 28 PID 2888 wrote to memory of 3040 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 28 PID 2888 wrote to memory of 3040 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 28 PID 2888 wrote to memory of 3040 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 28 PID 2888 wrote to memory of 3060 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 30 PID 2888 wrote to memory of 3060 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 30 PID 2888 wrote to memory of 3060 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 30 PID 2888 wrote to memory of 3060 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 30 PID 2888 wrote to memory of 2580 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 31 PID 2888 wrote to memory of 2580 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 31 PID 2888 wrote to memory of 2580 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 31 PID 2888 wrote to memory of 2580 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 31 PID 2888 wrote to memory of 2492 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 33 PID 2888 wrote to memory of 2492 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 33 PID 2888 wrote to memory of 2492 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 33 PID 2888 wrote to memory of 2492 2888 4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe 33 PID 2492 wrote to memory of 2460 2492 CleanTemp64.exe 34 PID 2492 wrote to memory of 2460 2492 CleanTemp64.exe 34 PID 2492 wrote to memory of 2460 2492 CleanTemp64.exe 34 PID 2492 wrote to memory of 2460 2492 CleanTemp64.exe 34 PID 2492 wrote to memory of 2372 2492 CleanTemp64.exe 36 PID 2492 wrote to memory of 2372 2492 CleanTemp64.exe 36 PID 2492 wrote to memory of 2372 2492 CleanTemp64.exe 36 PID 2492 wrote to memory of 2372 2492 CleanTemp64.exe 36 PID 2492 wrote to memory of 2568 2492 CleanTemp64.exe 37 PID 2492 wrote to memory of 2568 2492 CleanTemp64.exe 37 PID 2492 wrote to memory of 2568 2492 CleanTemp64.exe 37 PID 2492 wrote to memory of 2568 2492 CleanTemp64.exe 37 PID 2492 wrote to memory of 1340 2492 CleanTemp64.exe 39 PID 2492 wrote to memory of 1340 2492 CleanTemp64.exe 39 PID 2492 wrote to memory of 1340 2492 CleanTemp64.exe 39 PID 2492 wrote to memory of 1340 2492 CleanTemp64.exe 39 PID 1340 wrote to memory of 1864 1340 CleanTemp.exe 40 PID 1340 wrote to memory of 1864 1340 CleanTemp.exe 40 PID 1340 wrote to memory of 1864 1340 CleanTemp.exe 40 PID 1340 wrote to memory of 1552 1340 CleanTemp.exe 42 PID 1340 wrote to memory of 1552 1340 CleanTemp.exe 42 PID 1340 wrote to memory of 1552 1340 CleanTemp.exe 42 PID 1340 wrote to memory of 2440 1340 CleanTemp.exe 44 PID 1340 wrote to memory of 2440 1340 CleanTemp.exe 44 PID 1340 wrote to memory of 2440 1340 CleanTemp.exe 44 PID 1340 wrote to memory of 2680 1340 CleanTemp.exe 46 PID 1340 wrote to memory of 2680 1340 CleanTemp.exe 46 PID 1340 wrote to memory of 2680 1340 CleanTemp.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe"C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\cmd.execmd.exe /c set2⤵PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exePECMD**pecmd-cmd* PUTF -dd -skipb=992256 -len=1794721 "C:\Users\Admin\AppData\Local\Temp\~5292991173600089339.tmp",,C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\~3720215328816290936~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~5292991173600089339.tmp" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\CleanTemp"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe"C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\system32\cmd.execmd.exe /c set3⤵PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exePECMD**pecmd-cmd* PUTF -dd -skipb=992256 -len=323825 "C:\Users\Admin\AppData\Local\Temp\~3682341367909827186.tmp",,C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\~1596585646439773763~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~3682341367909827186.tmp" -y -aos -o"C:\Windows"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\CleanTemp.exe"C:\Windows\CleanTemp.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Temp"4⤵PID:1864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Temp"4⤵PID:1552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files"4⤵PID:2440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Microsoft\Windows\Temporary Internet Files"4⤵PID:2680
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5db451afc8f2dea22e0d49bd076bb304a
SHA1ffabf0a1748c583457da493e61baab486e970ae1
SHA2566afce61f2ba18cee2a5ce204d10c006f5f50b497c3b54616cbe8762077c54400
SHA5120b6be6143dbf1d859c6b61f2564166aa6a2a7b471e039c85614d010fae3c4d3903acf0749e709ee4bc05bd4dca47f683453691238fd41218492655cb6513b8a1
-
Filesize
316KB
MD5aff3a05583a5e932acb381963ae9a8eb
SHA1b98ae67d2fea845f676448417fe99feea91949bf
SHA2563a92e844169baea0a76a62f04b7e261f00ea7ac99bcc4ac1373dfd032bc19fef
SHA512f976b12317e9097a54f19b6b2a264bddc60c55936f97ed5baed9965e580f9a07d62a5a47b696b5f73432d6de10e6d272d5e496e5e45cbc0c1820cb9c73d8b867
-
Filesize
1.7MB
MD5cf29f292833a8ea8d29e7af680ea39c3
SHA1a52dd7ab84b58a6057d29b7636f9804fbef7122d
SHA256499c8cd9377e1d02d173102dfca53258a27bc79420d1e0b78e3a92a1079780b7
SHA512da6a0567658c7917b9680120b3209ba363a05d0e9f7f324990556b86c36d9b20fd925446854957989f6632030a80db76f00bd2b517e7a94dbfaa202d340f9811
-
Filesize
337KB
MD52aea8c280c0a0ffd00ee7feb3c041c3f
SHA11d1c5e4a3b027fa91bb13dfdca555d193bb30439
SHA2563aedd982d3efee614853797ee7befd31d5d3fe1f3e816bc7bbe467201f62ab9b
SHA512062ef76f035f3a628de82392761cada616d8d4f5c605b4d69fb9f34bb07dfbc75967da919e33d2f97cc89fc5aed0c2fbb7618c377e9d98c5effea25cecf16d39
-
Filesize
1.3MB
MD5381dcd0f69d0262cac902f14b2761e10
SHA130c05bdaef2b05a24b20aea8d24308ee8e0c323a
SHA2565f51505242592d9d8c0d2419f96c3cdf56676f01f06333ea8bed54a4f9b2728b
SHA512426156e60533b6af3104ff429179fbb6279729922dd9f3198d1220157b56ea2f6627d1dc3506fed5f9176c7186862c468745c9d56f8174570c6af991e3aeacba
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516