Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 09:32
Behavioral task
behavioral1
Sample
9df086ba1898d2c0c811a5fc2267f2e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9df086ba1898d2c0c811a5fc2267f2e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
9df086ba1898d2c0c811a5fc2267f2e0N.exe
-
Size
685KB
-
MD5
9df086ba1898d2c0c811a5fc2267f2e0
-
SHA1
b8a99b34be6604c2e78ef88e2aee175d802a70d3
-
SHA256
9fd13df8486c02e33997bfa3c8821eb52f77a76d436e63d8e9e5372da641a465
-
SHA512
3367151eb7ae66f41f1a70946cdcf92d146292badf840b7d7c2981d6f1ba6865920f320dfea46adf7418ff84c0c9e2b2a2bad500a137e046e0ec138f01edacb8
-
SSDEEP
12288:7tKe6Zv23YLVFhBsC8iFHs+hsuQXIQVRpVnl3Bg5oiNIr2NOpzuwiKm:v6Zv2ivhBVnFvh5Q44+iisxpzE
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983} 9df086ba1898d2c0c811a5fc2267f2e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msxtv32.exe" 9df086ba1898d2c0c811a5fc2267f2e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msxtv32.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 svchost.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 9df086ba1898d2c0c811a5fc2267f2e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
resource yara_rule behavioral1/memory/2204-0-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x0009000000016ccd-5.dat upx behavioral1/memory/2176-15-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2204-14-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x0009000000016ca5-13.dat upx behavioral1/memory/2176-16-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 9df086ba1898d2c0c811a5fc2267f2e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 9df086ba1898d2c0c811a5fc2267f2e0N.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\vcl32.exe 9df086ba1898d2c0c811a5fc2267f2e0N.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe 9df086ba1898d2c0c811a5fc2267f2e0N.exe File created C:\Windows\SysWOW64\msxtv32.exe 9df086ba1898d2c0c811a5fc2267f2e0N.exe File opened for modification C:\Windows\SysWOW64\msxtv32.exe 9df086ba1898d2c0c811a5fc2267f2e0N.exe File created C:\Windows\SysWOW64\concp32.exe 9df086ba1898d2c0c811a5fc2267f2e0N.exe File opened for modification C:\Windows\SysWOW64\concp32.exe 9df086ba1898d2c0c811a5fc2267f2e0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 9df086ba1898d2c0c811a5fc2267f2e0N.exe File opened for modification C:\Windows\svchost.exe 9df086ba1898d2c0c811a5fc2267f2e0N.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983}\sm = ebb5525fa3bcf9422c8ff945977d6af9 9df086ba1898d2c0c811a5fc2267f2e0N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983}\ax = a0789edac3f5a48ff9f60f78cbf7d398 9df086ba1898d2c0c811a5fc2267f2e0N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983} 9df086ba1898d2c0c811a5fc2267f2e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 9df086ba1898d2c0c811a5fc2267f2e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 9df086ba1898d2c0c811a5fc2267f2e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9E7D63E-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2204 9df086ba1898d2c0c811a5fc2267f2e0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2176 2204 9df086ba1898d2c0c811a5fc2267f2e0N.exe 30 PID 2204 wrote to memory of 2176 2204 9df086ba1898d2c0c811a5fc2267f2e0N.exe 30 PID 2204 wrote to memory of 2176 2204 9df086ba1898d2c0c811a5fc2267f2e0N.exe 30 PID 2204 wrote to memory of 2176 2204 9df086ba1898d2c0c811a5fc2267f2e0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9df086ba1898d2c0c811a5fc2267f2e0N.exe"C:\Users\Admin\AppData\Local\Temp\9df086ba1898d2c0c811a5fc2267f2e0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
686KB
MD5120b1a2b5b82f103204b4c7fae60ca9b
SHA1f23d00b54db74f2850f8532e0210d66968c22e26
SHA25639093a7c24b5eea7d0833b98fed72895be94a54a69ffebff7a0ddbee13ecfb08
SHA5129f9985a8e0b367d4e2528a156b66c28b86d4924d9a5e87dbc9444a428b262293193c5458ac59521f0162976a35c4728e81efa1f0f44eaedc8e2c1866ea368bbc
-
Filesize
688KB
MD5558077bd583739407808ca3ca22d10de
SHA1da674152318367efe3f9e671a3cead6f32f0f915
SHA2569f28f2b61ed9fe6fd4af3338bfa42fe8bb6cd356fa701b21aa435842a47eec6d
SHA512871a6490b33639e270b76b458721f042b1a1f19b9371ab5e4fa57d2729637d80dac7b529dd01aead6fe696650bb95866e5ce229886b3807ecaaa6a12cfd558b7