Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
Build.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Build.exe
Resource
win10v2004-20240709-en
General
-
Target
Build.exe
-
Size
701KB
-
MD5
0efd05c0e785394f55153d5b9c04daf5
-
SHA1
16e820e2f124ce21db4633379c475cff7c7448f3
-
SHA256
8a3c4170a103e1695a2b70379c43266398759b3e02a841a75b08ecfa5716860d
-
SHA512
84e2060eae231df6916273cd13b24f40145d6e2375b3b21ba1e5d685d8bd37c9cdce01c8975548b2db7e4ace15cb53d5b5883d315fa4120fed208f66f1580946
-
SSDEEP
6144:57A/Mm07sENIsRctX5rUvQSNj0LZOWM8yucn:5U/MbirU1Nj0LZOd8yus
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 2956 2220 Build.exe 32 -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings explorer.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2276 2220 Build.exe 30 PID 2220 wrote to memory of 2276 2220 Build.exe 30 PID 2220 wrote to memory of 2276 2220 Build.exe 30 PID 2220 wrote to memory of 2276 2220 Build.exe 30 PID 2276 wrote to memory of 2108 2276 explorer.exe 31 PID 2276 wrote to memory of 2108 2276 explorer.exe 31 PID 2276 wrote to memory of 2108 2276 explorer.exe 31 PID 2220 wrote to memory of 2956 2220 Build.exe 32 PID 2220 wrote to memory of 2956 2220 Build.exe 32 PID 2220 wrote to memory of 2956 2220 Build.exe 32 PID 2220 wrote to memory of 2956 2220 Build.exe 32 PID 2220 wrote to memory of 2956 2220 Build.exe 32 PID 2220 wrote to memory of 2956 2220 Build.exe 32 PID 2220 wrote to memory of 2956 2220 Build.exe 32 PID 2220 wrote to memory of 2956 2220 Build.exe 32 PID 2220 wrote to memory of 2956 2220 Build.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Build.exe"C:\Users\Admin\AppData\Local\Temp\Build.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Build.exe"C:\Users\Admin\AppData\Local\Temp\Build.exe"2⤵PID:2956
-