Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe
Resource
win10v2004-20240709-en
General
-
Target
447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe
-
Size
464KB
-
MD5
0177a4997568253427721379a62b7b2c
-
SHA1
af9c25241b672871362318ce7ee825cba77bd25f
-
SHA256
447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3
-
SHA512
cad30a68634a8e736677c97b55d262b50fad5639baaeeabfb8da293d0bacb1f1bee18dd12fe4771e278b4d76213b432ad64ffd4ad5f740112c1d2dc380e28560
-
SSDEEP
12288:+8lc87eqqV5e+wBV6O+WKN+vJ2Htnq2ZzXuOz:+8SqqHeVBxzvJUtFaOz
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3020 autotvol.exe 2916 ~6CA8.tmp 2612 mcbucont.exe -
Loads dropped DLL 3 IoCs
pid Process 2884 447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe 2884 447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe 3020 autotvol.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Systeown = "C:\\Users\\Admin\\AppData\\Roaming\\fltMexer\\autotvol.exe" 447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mcbucont.exe 447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3020 autotvol.exe 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3020 autotvol.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2884 wrote to memory of 3020 2884 447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe 30 PID 2884 wrote to memory of 3020 2884 447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe 30 PID 2884 wrote to memory of 3020 2884 447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe 30 PID 2884 wrote to memory of 3020 2884 447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe 30 PID 3020 wrote to memory of 2916 3020 autotvol.exe 31 PID 3020 wrote to memory of 2916 3020 autotvol.exe 31 PID 3020 wrote to memory of 2916 3020 autotvol.exe 31 PID 3020 wrote to memory of 2916 3020 autotvol.exe 31 PID 2916 wrote to memory of 1192 2916 ~6CA8.tmp 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe"C:\Users\Admin\AppData\Local\Temp\447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Roaming\fltMexer\autotvol.exe"C:\Users\Admin\AppData\Roaming\fltMexer"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\~6CA8.tmp1192 475144 3020 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916
-
-
-
-
C:\Windows\SysWOW64\mcbucont.exeC:\Windows\SysWOW64\mcbucont.exe -s1⤵
- Executes dropped EXE
PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
464KB
MD5004af61c03a355e135e5db5a21845daf
SHA16053c7b3d2ad9793fe0c3a90d6047c9790edb5ae
SHA25692430500404a90e7d2eadea3df267448f60b39971dd1e9e7052953502b91b52f
SHA5124135f3d578d4478bdc87e55b731de0fb7d30de1ac20a4419526f777bae747e3d18c7c65ea88fa2e7f0c22430a786b6dc54b878b71e5fd6440775bb5c2b0eb510