Analysis
-
max time kernel
48s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 03:09
Behavioral task
behavioral1
Sample
3862431768357d168771fb7b82de20d0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3862431768357d168771fb7b82de20d0N.exe
Resource
win10v2004-20240704-en
General
-
Target
3862431768357d168771fb7b82de20d0N.exe
-
Size
33KB
-
MD5
3862431768357d168771fb7b82de20d0
-
SHA1
4b83ed7efdbe7281b7ab827d8baa613a266ecfe3
-
SHA256
3dd0058415627fd8931b04605dc1e53ea610950aa7b8716e711cac0f53a198ea
-
SHA512
ee1c48ff9e0e5986b16139b09f0141ab85814570bfe447273ede0ecf1c421bce5b717aa13e07aef8486f4b4630928d3f641ee14a4ee2bf3a497e6de3db4606a7
-
SSDEEP
768:UEzNbLcQ9qQuVriDMuyuruTD0qB77777J77c77c77c7nOT0BcfqSxi:l3h9qQA6hZunrB77777J77c77c77c7Oi
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Windows\\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}.\\ýþ®ý©Ö¢²ß.exe\"" 3862431768357d168771fb7b82de20d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Windows\\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}.\\ýþ®ý©Ö¢²ß.exe\"" øù©ø¤ÑÚ„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Windows\\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}.\\ýþ®ý©Ö¢²ß.exe\"" ýþ®ý©Ö¢²ß.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Active Setup\Installed Components\{C55A56B8-18AB-010A-2501-56B8250118AB} 3862431768357d168771fb7b82de20d0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Active Setup\Installed Components\{C55A56B8-18AB-010A-2501-56B8250118AB}\Direktori = "d[}xŠ\u008f…\u0090˜”}„\u0090\u008f•“\u0090\u008dOœSRfdSQSQNTbfbNRQWZNbSeeNQYQQScTQTQZež" 3862431768357d168771fb7b82de20d0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Active Setup\Installed Components\{C55A56B8-18AB-010A-2501-56B8250118AB}\last-check = "ýþ®ý©Ö¢²ß.exe" 3862431768357d168771fb7b82de20d0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Active Setup\Installed Components\{C55A56B8-18AB-010A-2501-56B8250118AB}\last-check7 = "øù©ø¤Ñ\u009d\u00adÚ\u0090„•\u0090.exe" 3862431768357d168771fb7b82de20d0N.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" øù©ø¤ÑÚ„•.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ýþ®ý©Ö¢²ß.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 3008 øù©ø¤ÑÚ„•.exe 1640 ýþ®ý©Ö¢²ß.exe -
Loads dropped DLL 4 IoCs
pid Process 2320 3862431768357d168771fb7b82de20d0N.exe 2320 3862431768357d168771fb7b82de20d0N.exe 2320 3862431768357d168771fb7b82de20d0N.exe 2320 3862431768357d168771fb7b82de20d0N.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" ýþ®ý©Ö¢²ß.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" øù©ø¤ÑÚ„•.exe -
resource yara_rule behavioral1/memory/2320-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x0007000000016c6a-15.dat upx behavioral1/files/0x0007000000016ab4-21.dat upx behavioral1/memory/1640-26-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2320-31-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2320-14-0x00000000024C0000-0x00000000024E2000-memory.dmp upx behavioral1/memory/1640-33-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-32-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-34-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-35-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-36-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-38-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-37-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-40-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-39-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-42-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-41-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-44-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-43-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-46-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-45-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-48-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-47-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-50-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-49-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-52-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-51-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-53-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-54-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-56-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-55-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-57-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-58-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1640-60-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/3008-59-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\øù©ø¤ÑÚ„•.exe = "C:\\Windows\\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}.\\øù©ø¤Ñ\u009d\u00adÚ\u0090„•\u0090.exe" 3862431768357d168771fb7b82de20d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\øù©ø¤ÑÚ„•.exe = "C:\\Windows\\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}.\\øù©ø¤Ñ\u009d\u00adÚ\u0090„•\u0090.exe" øù©ø¤ÑÚ„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\øù©ø¤ÑÚ„•.exe = "C:\\Windows\\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}.\\øù©ø¤Ñ\u009d\u00adÚ\u0090„•\u0090.exe" ýþ®ý©Ö¢²ß.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\3D Animation.scr øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\SysWOW64\KesenjanganSosial.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\SysWOW64\RakyatKelaparan.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\SysWOW64\IDTemplate.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\SysWOW64\RakyatKelaparan.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\SysWOW64\KesenjanganSosial.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\SysWOW64\IDTemplate.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\SysWOW64\3D Animation.scr ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr øù©ø¤ÑÚ„•.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\ShellNew\KesenjanganSosial.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}\mail-sent 3862431768357d168771fb7b82de20d0N.exe File opened for modification C:\Windows\IDTemplate.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\ShellNew\KesenjanganSosial.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\cmd-brontok.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}\øù©ø¤ÑÚ„•.exe 3862431768357d168771fb7b82de20d0N.exe File opened for modification C:\Windows\ShellNew\IDTemplate.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\RakyatKelaparan.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\ShellNew\3D Animation.scr ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\control.{21EC2020-3AEA-1069-A2DD-08002B30309D} 3862431768357d168771fb7b82de20d0N.exe File opened for modification C:\Windows\RakyatKelaparan.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\3D Animation.scr øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\ShellNew\cmd-brontok.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\ShellNew\cmd-brontok.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}\mail-buffers 3862431768357d168771fb7b82de20d0N.exe File opened for modification C:\Windows\ShellNew\3D Animation.scr øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\3D Animation.scr ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\cmd-brontok.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\KesenjanganSosial.exe øù©ø¤ÑÚ„•.exe File opened for modification C:\Windows\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}\ýþ®ý©Ö¢²ß.exe 3862431768357d168771fb7b82de20d0N.exe File opened for modification C:\Windows\IDTemplate.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\KesenjanganSosial.exe ýþ®ý©Ö¢²ß.exe File opened for modification C:\Windows\ShellNew\IDTemplate.exe ýþ®ý©Ö¢²ß.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile ýþ®ý©Ö¢²ß.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" ýþ®ý©Ö¢²ß.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile øù©ø¤ÑÚ„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" øù©ø¤ÑÚ„•.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2320 3862431768357d168771fb7b82de20d0N.exe 3008 øù©ø¤ÑÚ„•.exe 1640 ýþ®ý©Ö¢²ß.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2320 wrote to memory of 3008 2320 3862431768357d168771fb7b82de20d0N.exe 30 PID 2320 wrote to memory of 3008 2320 3862431768357d168771fb7b82de20d0N.exe 30 PID 2320 wrote to memory of 3008 2320 3862431768357d168771fb7b82de20d0N.exe 30 PID 2320 wrote to memory of 3008 2320 3862431768357d168771fb7b82de20d0N.exe 30 PID 2320 wrote to memory of 1640 2320 3862431768357d168771fb7b82de20d0N.exe 31 PID 2320 wrote to memory of 1640 2320 3862431768357d168771fb7b82de20d0N.exe 31 PID 2320 wrote to memory of 1640 2320 3862431768357d168771fb7b82de20d0N.exe 31 PID 2320 wrote to memory of 1640 2320 3862431768357d168771fb7b82de20d0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3862431768357d168771fb7b82de20d0N.exe"C:\Users\Admin\AppData\Local\Temp\3862431768357d168771fb7b82de20d0N.exe"1⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}\øù©ø¤ÑÚ„•.exeC:\Windows\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}\øù©ø¤ÑÚ„•.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3008
-
-
C:\Windows\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}\ýþ®ý©Ö¢²ß.exeC:\Windows\control.{21EC2020-3AEA-1069-A2DD-08002B30309D}\ýþ®ý©Ö¢²ß.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5f8122a598d45b5306e10bd6c66ec97b3
SHA102278887076de3bc9750c1ffb87110d35a094d46
SHA2562cfc92ee2dbafa9d42127f81ac24afc66a94c8dfd0c3a732e3dc3116369d075d
SHA51205b0a45dc391be2f07fb7f9617bba791a83bee62fea8804e1b92593b1d11d579e9ab4628bb44ac121bf4683d6087a3fcff807737a97a54cdf0e572fdc9435e82
-
Filesize
37KB
MD55b048f6acc54f7472b9163337ec3ec33
SHA19c240d26c38e5b400af41ce9702ba2be128b44d9
SHA256985e7da32f44245b6ec96eb07ceb3960010cf0531574c7c7873e7c852569d24e
SHA5122a2a4213a850b02953a0bc8df5682346a0181d3ffb1aa033d6ae069975ff4e5302393cfec2e90262623676718ed2ee361cb3a630eb3a7d46e505a99ad2a3b3dd