Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
89a291ea12e10912f1779ad52be30e590e90451d2d13d0ad009952803a17f6d2.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89a291ea12e10912f1779ad52be30e590e90451d2d13d0ad009952803a17f6d2.dll
Resource
win10v2004-20240508-en
General
-
Target
89a291ea12e10912f1779ad52be30e590e90451d2d13d0ad009952803a17f6d2.dll
-
Size
792KB
-
MD5
c881d9ca9d58c88d30bd2b0a4ee56195
-
SHA1
3e1b3618235357913e904918ae053e9b9b43500d
-
SHA256
89a291ea12e10912f1779ad52be30e590e90451d2d13d0ad009952803a17f6d2
-
SHA512
b6747178aedbf1e8e4a9bd169508d7a10ccd5407ece83f24c355ceb619f597dceb270aac62fd8264e3f0fdca06e40763b6f553e6affa2c2b2ae2ac997cb0aad2
-
SSDEEP
6144:Si05kH9OyU2uv5SRf/FWgFgtTgqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:9rHGPv5SmptEDmUWuVZkxikdXcq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iphtcfjrejti = "\"C:\\Users\\Admin\\AppData\\Roaming\\7GMXSn\\RecoveryDrive.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\7805\mstsc.exe cmd.exe File created C:\Windows\system32\7805\mstsc.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2960 schtasks.exe -
Modifies registry class 13 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\Qny.cmd" Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command\DelegateExecute Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\ms-settings\shell Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2752 rundll32.exe 2752 rundll32.exe 2752 rundll32.exe 2752 rundll32.exe 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found 3488 Process not Found -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found Token: SeShutdownPrivilege 3488 Process not Found Token: SeCreatePagefilePrivilege 3488 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3488 Process not Found 3488 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3488 Process not Found -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3488 wrote to memory of 4044 3488 Process not Found 93 PID 3488 wrote to memory of 4044 3488 Process not Found 93 PID 3488 wrote to memory of 5004 3488 Process not Found 94 PID 3488 wrote to memory of 5004 3488 Process not Found 94 PID 3488 wrote to memory of 3764 3488 Process not Found 95 PID 3488 wrote to memory of 3764 3488 Process not Found 95 PID 3488 wrote to memory of 5068 3488 Process not Found 96 PID 3488 wrote to memory of 5068 3488 Process not Found 96 PID 3488 wrote to memory of 4860 3488 Process not Found 98 PID 3488 wrote to memory of 4860 3488 Process not Found 98 PID 4860 wrote to memory of 3560 4860 cmd.exe 100 PID 4860 wrote to memory of 3560 4860 cmd.exe 100 PID 3488 wrote to memory of 1896 3488 Process not Found 101 PID 3488 wrote to memory of 1896 3488 Process not Found 101 PID 3488 wrote to memory of 548 3488 Process not Found 102 PID 3488 wrote to memory of 548 3488 Process not Found 102 PID 3488 wrote to memory of 3364 3488 Process not Found 103 PID 3488 wrote to memory of 3364 3488 Process not Found 103 PID 3488 wrote to memory of 3228 3488 Process not Found 105 PID 3488 wrote to memory of 3228 3488 Process not Found 105 PID 3228 wrote to memory of 4488 3228 fodhelper.exe 107 PID 3228 wrote to memory of 4488 3228 fodhelper.exe 107 PID 4488 wrote to memory of 2960 4488 cmd.exe 109 PID 4488 wrote to memory of 2960 4488 cmd.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89a291ea12e10912f1779ad52be30e590e90451d2d13d0ad009952803a17f6d2.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
C:\Windows\system32\CloudExperienceHostBroker.exeC:\Windows\system32\CloudExperienceHostBroker.exe1⤵PID:4044
-
C:\Windows\system32\dllhst3g.exeC:\Windows\system32\dllhst3g.exe1⤵PID:5004
-
C:\Windows\system32\RecoveryDrive.exeC:\Windows\system32\RecoveryDrive.exe1⤵PID:3764
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\tJES.cmd1⤵PID:5068
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{3a9698a7-8b59-5789-8186-33aeee771cee}"1⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{3a9698a7-8b59-5789-8186-33aeee771cee}"2⤵PID:3560
-
-
C:\Windows\system32\pospaymentsworker.exeC:\Windows\system32\pospaymentsworker.exe1⤵PID:1896
-
C:\Windows\system32\mstsc.exeC:\Windows\system32\mstsc.exe1⤵PID:548
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\fXrX.cmd1⤵
- Drops file in System32 directory
PID:3364
-
C:\Windows\System32\fodhelper.exe"C:\Windows\System32\fodhelper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\Qny.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Niazd" /SC minute /MO 60 /TR "C:\Windows\system32\7805\mstsc.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:2960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121B
MD511f0d20f2a9aefbc7e5fe1f338ec824d
SHA1fd309a6dbc1b926256913c49009e3231f7caf173
SHA256a7f635cbebd896c13201c3445376763c1cfb613a7b84371b99b6ea4770abaced
SHA512bd3537045775cab23bc1baa953b27fe22685963baff974fce400a7dd423f28bbbc32911df91df5809540f17933737a0ce9748e38c5b13f53481ea62e33e148f3
-
Filesize
796KB
MD536d1495a46309c5b1dada8c2e1d3fbf8
SHA1355bce52818b58a17644ff088040ec11c2cfdfb6
SHA2565f1a636c6d6288b36b35aa83f22a288409354a2629780acd61d4dcdfd4d857ee
SHA51279487021580c8bc2c6befbb4b122e2778d62a21d70662b78b369b5b95c3708712b037fef0a20d61f54851a38fdf6f050abd68d82ebc2eea5f85b8fe27990cd57
-
Filesize
191B
MD527162674260aa3f7fdaccd8aff6bfc38
SHA103ebdeda3e53971be9f6aa500785bca2d4e24958
SHA256864fd7b1d913298ded024097527c0550243bd07529e8cc9f31555686de701c6e
SHA5127d61b27d050d6b3a4c27784616e40cac142f263c54583e11dc0eb4bb9d3a57c0cb1cbfaee4b6fe881dd0463b09381aac81b01bd834e1ff37b52309403bc3b292
-
Filesize
239B
MD53b5e81d097e9a2cb7b80535f7cf30e85
SHA1045d7b542448d226aa47281b9d4d22ec99e43c55
SHA2568683f6e1bd05b27375d7d428d8a2fe8113a93f7b0a65bacbc2c69169a9abecb6
SHA512713605fd4c226627b8ead51af1ff97586be9718bf315cfc7fba5440b577bf9943dc97d8fd82ebb3e62679ced0a4b24527746877bfcaef3c3a65cd87b0743ae37
-
Filesize
796KB
MD589785f7fa83471c69fc9f18a8f2aaa70
SHA10dc6341b3a59c6e37e9b73ab8626ed8b6de8a95c
SHA2566d736fb8e816db82504286c7d17847be5666586bea7bff4f47664fe60116b599
SHA5121655c7ad2271b5a2a3b93186abfefa872f73647ab932ca267ee60f8ca87175bb7ae9f82bb6e73811d4444b199099a7ff26c7205a7947c7f0cec54d8c5606ab69
-
Filesize
911KB
MD5b9b3dc6f2eb89e41ff27400952602c74
SHA124ae07e0db3ace0809d08bbd039db3a9d533e81b
SHA256630518cb2e4636f889d12c98fb2e6be4e579c5eeb86f88695d3f7fff3f5515c4
SHA5127906954b881f1051a0c7f098e096bc28eddcc48643b8bf3134dd57b8c18d8beba4f9a0ac5d348de2f9b8ea607c3e9cb0e61d91e4f3ba1fefb02839f928e3e3fe
-
Filesize
938B
MD5309b1607ebf13bec6ffcdc9fcdcdbbb7
SHA161cf554f95153f70a0255f70d1c18aa3e8a306a1
SHA256eeebaad8480f2fc8774040f376e0a5d9c3782551fa2060010bea6ebeebc8e71a
SHA5124a3dc99f81d462289e633bdc72c6353ad2aafb012075850a8c51be18c9f37bdd83f8b80212008d0ec7aa1dbd159e826f79b2ad27f4a0c0ebb96d682f7c822d09