Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
f3870c7bccef24b6ab81dc2b9fb02cddb4f342d90e6741f7c6c172d50632262e.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f3870c7bccef24b6ab81dc2b9fb02cddb4f342d90e6741f7c6c172d50632262e.dll
Resource
win10v2004-20240508-en
General
-
Target
f3870c7bccef24b6ab81dc2b9fb02cddb4f342d90e6741f7c6c172d50632262e.dll
-
Size
536KB
-
MD5
dbed1c7f019b05f4903e705ba5df5e68
-
SHA1
38ea40f461e50bdc259dbaeec1f1706ed9e32c9d
-
SHA256
f3870c7bccef24b6ab81dc2b9fb02cddb4f342d90e6741f7c6c172d50632262e
-
SHA512
44e8b4e967c58cb071ecef0114c1e78397c3f32991450bfd8065a7d6201e0a9f621b642bb72ffb6c81ff300705a1bf44792a16bc9a2a68194b9b88d466d30769
-
SSDEEP
6144:Ci05kH9OyU2uv5SRf/FWgFgtBgqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:trHGPv5Smpt6DmUWuVZkxikdXcq
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1080 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aknlhzir = "\"C:\\Users\\Admin\\AppData\\Roaming\\2XKOf79\\wbengine.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\8094\notepad.exe cmd.exe File created C:\Windows\system32\8094\notepad.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\eBVm.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell\open Process not Found Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2352 regsvr32.exe 2352 regsvr32.exe 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found 1080 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1080 wrote to memory of 1940 1080 Process not Found 29 PID 1080 wrote to memory of 1940 1080 Process not Found 29 PID 1080 wrote to memory of 1940 1080 Process not Found 29 PID 1080 wrote to memory of 2636 1080 Process not Found 30 PID 1080 wrote to memory of 2636 1080 Process not Found 30 PID 1080 wrote to memory of 2636 1080 Process not Found 30 PID 1080 wrote to memory of 3004 1080 Process not Found 32 PID 1080 wrote to memory of 3004 1080 Process not Found 32 PID 1080 wrote to memory of 3004 1080 Process not Found 32 PID 3004 wrote to memory of 404 3004 cmd.exe 34 PID 3004 wrote to memory of 404 3004 cmd.exe 34 PID 3004 wrote to memory of 404 3004 cmd.exe 34 PID 1080 wrote to memory of 2796 1080 Process not Found 35 PID 1080 wrote to memory of 2796 1080 Process not Found 35 PID 1080 wrote to memory of 2796 1080 Process not Found 35 PID 1080 wrote to memory of 2828 1080 Process not Found 36 PID 1080 wrote to memory of 2828 1080 Process not Found 36 PID 1080 wrote to memory of 2828 1080 Process not Found 36 PID 1080 wrote to memory of 2844 1080 Process not Found 37 PID 1080 wrote to memory of 2844 1080 Process not Found 37 PID 1080 wrote to memory of 2844 1080 Process not Found 37 PID 1080 wrote to memory of 2972 1080 Process not Found 38 PID 1080 wrote to memory of 2972 1080 Process not Found 38 PID 1080 wrote to memory of 2972 1080 Process not Found 38 PID 1080 wrote to memory of 3000 1080 Process not Found 40 PID 1080 wrote to memory of 3000 1080 Process not Found 40 PID 1080 wrote to memory of 3000 1080 Process not Found 40 PID 3000 wrote to memory of 2808 3000 eventvwr.exe 41 PID 3000 wrote to memory of 2808 3000 eventvwr.exe 41 PID 3000 wrote to memory of 2808 3000 eventvwr.exe 41 PID 2808 wrote to memory of 2760 2808 cmd.exe 43 PID 2808 wrote to memory of 2760 2808 cmd.exe 43 PID 2808 wrote to memory of 2760 2808 cmd.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f3870c7bccef24b6ab81dc2b9fb02cddb4f342d90e6741f7c6c172d50632262e.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵PID:1940
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\uuzYT.cmd1⤵PID:2636
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{af200ed5-1aeb-7147-dc8f-85fa319e0b86}"1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{af200ed5-1aeb-7147-dc8f-85fa319e0b86}"2⤵PID:404
-
-
C:\Windows\system32\TapiUnattend.exeC:\Windows\system32\TapiUnattend.exe1⤵PID:2796
-
C:\Windows\system32\TSTheme.exeC:\Windows\system32\TSTheme.exe1⤵PID:2828
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵PID:2844
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\bPu0.cmd1⤵
- Drops file in System32 directory
PID:2972
-
C:\Windows\System32\eventvwr.exe"C:\Windows\System32\eventvwr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\eBVm.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Cnmwowrqih" /SC minute /MO 60 /TR "C:\Windows\system32\8094\notepad.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD506446b1e6bb00a4f2aca5a1223c4ed71
SHA12b19dc3311ce69ece4c049af1705b163c3f7bca4
SHA2562361f27e0e2da2546dd77e5543e4859f58da5672ed94516f18f9209353f011ec
SHA5124927c9c856338486673f9d2733ee11d25a3a585869ae922458f87dd1d73d9652d7b54caab75ea5f2850ad87d471ad5391a77616b3634a3207169635a9ba73cc2
-
Filesize
193B
MD56638072e132122bc3662ba0bd56f2994
SHA1012185c86423e331f36ca2f27413110edad586c8
SHA256a74206120f19afcf87d780c7b11d16f4b67f8a349c48158e85eb537b1dd269ed
SHA512fd530f1a5198412e439ff1794c2bae18913c7a40ece54e4e15a1a0b8cf3eb412914d636a63e4af7487b05a43f9ea0054891639ac8758f85c9305c44779ae83b8
-
Filesize
128B
MD5cfa88d067ea20bbae68116ebde654fa1
SHA1e004b1895b01e9cd109c221818a57f252805ed28
SHA256d43f35368a42ded06430de006b23698c0f70389b8e1a13f46bb589fea6b1a074
SHA5126ec975b406e459f4b6fd63d2023aadaf9992e8ba9a815ef68d6cb46656843032a81d6ffa3ee4a3eec4d1f89de535b31b9d4d8f4fb7e5f2e5c80ac0c4c4cce30b
-
Filesize
540KB
MD56f12002048cefed04cb0783f67347696
SHA1d4b182ef938fe8ec65e43c8b5bc1607d5dfb23dc
SHA2564ca44160eb35ea1354f739d56e916897fd9ea7aa7733334a34b9879b57bc5d3a
SHA512a4a20f916c7f02716b79dba6aad87e76fef82aec53de64ef05bd739cdddd8706a21348ae09711826adfe1d99866ece8b96dd79aa49e50bc3ca63e9d9834b2789
-
Filesize
236B
MD5529e7772f87288447dc788d7aed99205
SHA14572aa4280284df3ac1a6c5f4d5773fcc1945ad7
SHA256d2cf8e623004b19f618fdf7bddc883fac63c135bc80d156f1baf771a3c2104d0
SHA51220ed24810eef52b6629702999aba2228eb6121aa326c5094483c4a24740bbde2cf87ceb6095b8225e58f27e8e5a85c439d964d11dca77a951b341df2d6e0bd81
-
Filesize
1.4MB
MD578f4e7f5c56cb9716238eb57da4b6a75
SHA198b0b9db6ec5961dbb274eff433a8bc21f7e557b
SHA25646a4e78ce5f2a4b26f4e9c3ff04a99d9b727a82ac2e390a82a1611c3f6e0c9af
SHA5121a24ea71624dbbca188ee3b4812e09bc42e7d38ceac02b69940d7693475c792685a23141c8faa85a87ab6aace3f951c1a81facb610d757ac6df37cf2aa65ccd2
-
Filesize
890B
MD5275889cbea64e2792a47240f96cf6ff0
SHA1c12e9c0a0371bc746c8c6cbaa509748fe3d3cf49
SHA256bd75b7117adee476625c83ebda9f2baaddd8a75412e3c6a852fa3f50ca974611
SHA512f4b6038881e2cbce5f3bb40a618df45faef987f74325c76603d4f7489cb8853782a5112dd7bfdc10cc560f21b6ec7e9192bd1b7b286e79250dd0919c5ca15d6c