Analysis

  • max time kernel
    151s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 04:47

General

  • Target

    f4775d5940150df404131bed0f0dfa135805defa67302c6bf446ed3055bd940f.exe

  • Size

    8.2MB

  • MD5

    12709d6a2c5978d51846af191ac31738

  • SHA1

    8138730f33c7c44bab8ae478dc33f7b30edbaa60

  • SHA256

    f4775d5940150df404131bed0f0dfa135805defa67302c6bf446ed3055bd940f

  • SHA512

    0e8e41f400256f6f38b2271d0968a78968828564687d8adf98f323a2a9b87d7b4ab7fdf4d90602aa79314d012233b5648f43bf67f09f3622824114a66506346b

  • SSDEEP

    196608:y+tPHwBW3gYrtIXgWfJqOFdv5Wr/lDuvsivd7uA0yPi9x0rgG9Vba8cTfqVVoV9J:y8HqXBf4JZKka7WyiCWLq0N/

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 20 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4775d5940150df404131bed0f0dfa135805defa67302c6bf446ed3055bd940f.exe
    "C:\Users\Admin\AppData\Local\Temp\f4775d5940150df404131bed0f0dfa135805defa67302c6bf446ed3055bd940f.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • \??\c:\users\admin\appdata\local\temp\f4775d5940150df404131bed0f0dfa135805defa67302c6bf446ed3055bd940f.exe 
      c:\users\admin\appdata\local\temp\f4775d5940150df404131bed0f0dfa135805defa67302c6bf446ed3055bd940f.exe 
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Windows\system32\cmd.exe
        cmd.exe /c bcdedit.exe > "C:\Users\Admin\AppData\Local\Temp\usb9F2C.tmp"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Windows\system32\bcdedit.exe
          bcdedit.exe
          4⤵
            PID:2960
        • C:\Windows\system32\bcdedit.exe
          bcdedit.exe /set testsigning on
          3⤵
          • Modifies boot configuration data using bcdedit
          PID:2344
        • C:\Windows\SysWOW64\msiexec.exe
          msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\QualcommWindowsDriverInstaller.msi" REBOOTNEEDED=1
          3⤵
          • Enumerates connected drives
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2584
      • C:\Windows\Resources\Themes\icsys.icn.exe
        C:\Windows\Resources\Themes\icsys.icn.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:828
        • \??\c:\windows\resources\themes\explorer.exe
          c:\windows\resources\themes\explorer.exe
          3⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:1292
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe SE
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            PID:2300
            • \??\c:\windows\resources\svchost.exe
              c:\windows\resources\svchost.exe
              5⤵
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              PID:320
              • \??\c:\windows\resources\spoolsv.exe
                c:\windows\resources\spoolsv.exe PR
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2844
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:49 /f
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1300
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:50 /f
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1556
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:51 /f
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2332
          • C:\Windows\Explorer.exe
            C:\Windows\Explorer.exe
            4⤵
              PID:2136
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding B1BA5F1527A570175732B651F8E9D9F3 C
          2⤵
          • Loads dropped DLL
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{4188ACA5-E65A-4E5B-9F95-A41147F332C3}
            3⤵
            • Executes dropped EXE
            PID:2412
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6741F594-8EF4-4EEE-8E0F-C5ECA45A3FB1}
            3⤵
            • Executes dropped EXE
            PID:2516
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1034372C-DAC2-4A13-B446-E8105F4A2D86}
            3⤵
            • Executes dropped EXE
            PID:2936
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9866A2FB-607F-44A1-A871-0F466DC5EF81}
            3⤵
            • Executes dropped EXE
            PID:948
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B0691198-E632-45E8-8AD8-6DD606AFE8FA}
            3⤵
            • Executes dropped EXE
            PID:920
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{41CB839E-1C47-41E1-BBAD-A11828E7120A}
            3⤵
            • Executes dropped EXE
            PID:2672
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C5E5D6BB-613B-4551-987C-DF7AFE823C6F}
            3⤵
            • Executes dropped EXE
            PID:2884
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0B6582AC-7357-4247-A2BF-FD97C59AAE13}
            3⤵
            • Executes dropped EXE
            PID:1788
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0A8BBBCD-0890-4A4D-A492-15A0E30C854F}
            3⤵
            • Executes dropped EXE
            PID:1832
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F8999679-41D6-49DC-AA7C-C4DC1869E790}
            3⤵
            • Executes dropped EXE
            PID:2424
          • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe
            C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{334228D1-65AF-4FB9-9B4F-0A6A2F7858E3}
            3⤵
            • Executes dropped EXE
            PID:2384

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\MSIA718.tmp

        Filesize

        1.3MB

        MD5

        f8d473c8b3462675be9ce9f98b8b3d6f

        SHA1

        d5b76d31d534a0c223fa01511d944218c4f6af6f

        SHA256

        2cbe8b514547da632f32f41e6ab14612c32c34f487330bc4e6ea53454b50a55c

        SHA512

        cb5b8ed674a296554423b4c568f4a16e0a8bee6529925e1e4276bbf79976d64c1fe50c8bcc5cea5366fa4bf6898fd8b59435200e98a50340a6e1cf8095818c50

      • C:\Users\Admin\AppData\Local\Temp\QualcommWindowsDriverInstaller.msi

        Filesize

        6.6MB

        MD5

        81cd67ba3a17801105670379d9105dca

        SHA1

        b1fefdfdb4981bae8f014e09a2dfe796b779de17

        SHA256

        cdaf03bb4c995b89f0397ff57f6332aab96093681215d4915dcf3a1627687158

        SHA512

        b84a1770b5757d56ae650482ced65601ae56023cc08dad6906e098c65da40d1003170404afb3461e18f03df679ca53537abceef156e16f0cc5680ded567326ff

      • C:\Users\Admin\AppData\Local\Temp\usb9F2C.tmp

        Filesize

        1KB

        MD5

        450c1aaf7744e4125870a52fa6429c22

        SHA1

        df9f7d6c906c5954119545d88fcae9a1929322a0

        SHA256

        2135c5cf4928156e82f83e1a12b03542d32b374ed51356d7a83ebf6811074863

        SHA512

        83954950f1cc93dbac5414490e5853c7efc38e2e8f3d8501fb8fd2a2aa3991fbf9107216467189612902f85ec0c42552181f8401cfefaf946420855fefeac037

      • C:\Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISBEW64.exe

        Filesize

        146KB

        MD5

        c3b2acc07bb0610405fc786e3432bef9

        SHA1

        333d5f2b55bd00ad4311ba104af7db984f953924

        SHA256

        9acc6cb5d01a4e4dbc92c8774c6999fab5f0e49f097e83098ba740842f5a2894

        SHA512

        2438e5dd11c8322101d9dc2d0f89ed0b1fc3cb5a65f644a1cf07f4c5a7f353c648e715fb910e09a444b623b3384eecd628e312608bcec63aa3b0107630df32bd

      • C:\Windows\Resources\Themes\explorer.exe

        Filesize

        135KB

        MD5

        98605e8a1bd69949a95562164aae9c16

        SHA1

        0cebb708ad273be7e8c6824fd42b9968fc47338f

        SHA256

        5a5deaa33d9e24384c9d7437d72064b952d21b667ed7c8e6e34d742f3f3b3282

        SHA512

        ba0830bf547f71aa3c67c895af6fa088729a5f8a92bf8f81e280b311ce77f2b92030dac2f42b29b2437abcff35620aaa579fa604d149f6e793798515d1d9cb0f

      • \Users\Admin\AppData\Local\Temp\f4775d5940150df404131bed0f0dfa135805defa67302c6bf446ed3055bd940f.exe 

        Filesize

        8.1MB

        MD5

        6099dff4878f020abb85a520235941d5

        SHA1

        aa9956c9756a42abb2e35b6bbbb7cafe4efaa74c

        SHA256

        a8567a50adfb307cdc979a8627045d33b42c18350e50191f7052241e7bdafc8e

        SHA512

        e2e2956eb9fc181a439f93f3ee7b2c63a665903a571a1687ad40cd731d3167f3b12e4937a4a3a1267cd1d51f2b6c0ab377fc48a0f519ee30d0db18a4f764b697

      • \Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\ISRT.dll

        Filesize

        260KB

        MD5

        a93f625ef42b54c2b0f4d38201e67606

        SHA1

        cbfebc1f736ccfc65562ede79a5ae1a8afb116a1

        SHA256

        e91a865c3d60d9d0bce5d5a0a2f551c5e032d5bc13bc40f85091ce46d38064e0

        SHA512

        805f0d535022de3d03aa191239fd90c54f2f6745bf02e0ce9cbe59ea34eecac7f9ebb600864c7cbcad5d011fa61bdb5b65889136617edc44178f87bd3970b198

      • \Users\Admin\AppData\Local\Temp\{29E0939C-D0C1-4E94-8375-40339BC24AC3}\_isres_0x0409.dll

        Filesize

        540KB

        MD5

        d6bbf7ff6984213c7f1f0f8f07c51e6a

        SHA1

        cfe933fc3b634f7333adec7ec124c14e9d19ac21

        SHA256

        6366e18a8cbf609c9573f341004e5c2725c23a12973affa90ee7bcc7934ae1b2

        SHA512

        a1364c96848f54b241c8e92ed1887ca599255c8046e31af11cd4b0b23d97c00243808dff9086a536c0084d6815223685283844a9e27f2c20c4d3b85a794a9e9d

      • \Windows\Resources\Themes\icsys.icn.exe

        Filesize

        135KB

        MD5

        a41692d5d80086e9a668f9ae50a506fb

        SHA1

        ab59f7c1862f99bd0a225e2c98fabf5c34745ec5

        SHA256

        703c40e078c648529622b1706119870e48fe0a9b5bd51cf30e0ffbeb13bf4cc2

        SHA512

        787f928576901fc59c901fa0ebf7b28fcadee40e1fa4a8a49d00d1e71b10603b83aee21457c3939be99e0660d8ef87d721386c2498f38c4289d19bbc0145ea23

      • \Windows\Resources\spoolsv.exe

        Filesize

        135KB

        MD5

        b52c11727e41d2ce2a33d2ea650d8346

        SHA1

        0a94b551497d6c7f5ba33c9e726feb7e7fadc654

        SHA256

        9bd0accfa6f0bcd44f9580532fc54526b0afc8fddde2956fafc1634226e386f5

        SHA512

        ecda92ef233b692defef7a33034d805534b435d0d4e18bd51a75e9fd1fb1422be8baa79bbde07e395e14d2b1d99730e67a948b12d8c88dfc580f94ce43246cab

      • \Windows\Resources\svchost.exe

        Filesize

        135KB

        MD5

        660e4f4b1f1ed00c5fe1f40da376cd38

        SHA1

        43892bd669fdd327f11424ed327a04a1b51999e1

        SHA256

        3d138baa2ed35ae8d3fe9350d3580a9b00d2e66d04904f340c242f5b51ea5d1a

        SHA512

        073ed282ae36ce178f5169f4c5d7afb1880ba9358f485e2b6723fb8e9db777a3b1a60e457b242a5eb503e04be222092f203661974515f44ae620918d1831b239

      • memory/320-104-0x0000000000370000-0x000000000038F000-memory.dmp

        Filesize

        124KB

      • memory/828-111-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/1292-86-0x00000000003B0000-0x00000000003CF000-memory.dmp

        Filesize

        124KB

      • memory/1916-64-0x0000000000380000-0x000000000039F000-memory.dmp

        Filesize

        124KB

      • memory/1916-0-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/1916-110-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2300-109-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2812-46-0x0000000002EE0000-0x0000000002F69000-memory.dmp

        Filesize

        548KB

      • memory/2812-43-0x0000000002C90000-0x0000000002D37000-memory.dmp

        Filesize

        668KB

      • memory/2812-19-0x0000000010000000-0x00000000101B5000-memory.dmp

        Filesize

        1.7MB

      • memory/2812-113-0x0000000002C90000-0x0000000002D37000-memory.dmp

        Filesize

        668KB

      • memory/2812-112-0x0000000010000000-0x00000000101B5000-memory.dmp

        Filesize

        1.7MB

      • memory/2844-108-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB