Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 21:28

General

  • Target

    Spoof Instructions/Toolz/PrivaZerPortable/PrivaZerPortable.exe

  • Size

    318KB

  • MD5

    bcd6161b343dc8720e162a767f43cef3

  • SHA1

    b9e93c755a04407b14998cc3a3c0daa6b01bb3eb

  • SHA256

    ea0a403721dabdf04450c835667facc68a5434989263bea3701de6c9eb784a4d

  • SHA512

    7cf62ce9eca4405c75f6e8db0b025bc7075fdb52e95e74e27c6910c9ee3c738ae457b0eadfa5f60f3378b651f6a3cf7fe12a8c261fc9822da782606eb4b3e4bb

  • SSDEEP

    6144:wEUX9TD12SFJs/Sqh9gfvVSYi7oVG8mmJdn6:wEQBs/SqhW8YwP

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Spoof Instructions\Toolz\PrivaZerPortable\PrivaZerPortable.exe
    "C:\Users\Admin\AppData\Local\Temp\Spoof Instructions\Toolz\PrivaZerPortable\PrivaZerPortable.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\Spoof Instructions\Toolz\PrivaZerPortable\App\PrivaZer\PrivaZer.exe
      "C:\Users\Admin\AppData\Local\Temp\Spoof Instructions\Toolz\PrivaZerPortable\App\PrivaZer\PrivaZer.exe"
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2788
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Windows\system32\SearchProtocolHost.exe
      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1880
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 0 508 512 520 65536 516
      2⤵
      • Modifies data under HKEY_USERS
      PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

    Filesize

    1024KB

    MD5

    017ace9bd07611b1a4728ce71fce9777

    SHA1

    7f13c6af85be9e54d1dff99576e0a071083a0f90

    SHA256

    ff97c5548e7471cf5df397e9a69504e2abc66ff5c7d702e9cc99341e5c63edf7

    SHA512

    d4d79bce57e06fa6d44b985d306d6d3e718aff83b88991f6624d4905f97698fe8b56515cb9f356fc3dc648c9a0f1e7f4e99f92b84feabb6d2f104439f6cfe8ed

  • C:\Users\Admin\AppData\Local\Temp\PrivaZerPortableTemp\000\PrivaZer.default.ini

    Filesize

    28KB

    MD5

    41307bb0634da41c6f7a3af2e2bda5dd

    SHA1

    34e3aa27f85502009da8a21955d9060873986128

    SHA256

    7094fb1eb7fb766c2667d25ab86e61181df44d621f6a633ae0c74aeacfa3285d

    SHA512

    4d63db1505a165c605be6e6320926c1afc9c3ef5a0b0d3f4f7b25f33d49a095f8f003c86a545c0c22ea4a89016da89043e3ed4a7abffb285866d8e212e41c9e1

  • C:\Users\Admin\AppData\Local\Temp\PrivaZerPortableTemp\000\data.ini

    Filesize

    33B

    MD5

    b2ec006c3e67b6bd9129fe5e5fbe7b27

    SHA1

    43ad64edcb9e6cb1f2aa597ce5ff44d1b2e178c4

    SHA256

    2d7bcda4007dc91377a9856cde2afc8dde9431514c46317f9235d2847e9249ab

    SHA512

    62e8776de89c07f99911f4de5d4b17cf1342d45693311e49d62195bb01b1d1b2731a0c0fc7f50caa9e5379d013d286292eb54e46d0a00a6b1bc16d828d60edc0

  • C:\Users\Admin\AppData\Local\Temp\PrivaZerPortableTemp\000\data.ini

    Filesize

    140B

    MD5

    56d8dc890dacb6adcbd4c3afd348c276

    SHA1

    e4217b69c54fd73d3cda21193c4c143dbf28c652

    SHA256

    38379e07709c9aa128a17bc71505715f19727587e962a97f921dd911a262ea66

    SHA512

    c6b6541454e642e93aaf69461d9e5e84bb0b780a0baa10ed9d5804349a8d002345ff5cb775c929647f07572e3eadb5467579e988b4d41bc01e6547ac3732b2ad

  • C:\Users\Admin\AppData\Local\Temp\nsyDEDC.tmp\launcher.ini

    Filesize

    628B

    MD5

    e68f2ad31f23af7aa2143d8c3a2b35fa

    SHA1

    945584d2b702882f18609f709a92256935903684

    SHA256

    9d707e1933f7bea73456eb24c8b8d1e69a37bfabd5c701667f5f0267a71b2699

    SHA512

    3f0c4cfe2388a2656df2ff1b5257d87cd7c258dcd3994ec201b5646192adbba3c7890122237a1f4aba40cba95bebe60ec0a99fef53f0fcdec5ebee16bbac024b

  • \Users\Admin\AppData\Local\Temp\nsyDEDC.tmp\System.dll

    Filesize

    11KB

    MD5

    bf712f32249029466fa86756f5546950

    SHA1

    75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

    SHA256

    7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

    SHA512

    13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

  • \Users\Admin\AppData\Local\Temp\nsyDEDC.tmp\newtextreplace.dll

    Filesize

    11KB

    MD5

    b5358341df2cb171876a5f201e31a834

    SHA1

    df34750ea5504274be5ff8ddd306b49e302d04f9

    SHA256

    156b9b583399faf13c4d46b89339fb0f7f38dc847ac2d7872178d8e3998b9734

    SHA512

    821dc42e24fa2d44a1d4d16b26c3da2688dac0fa44a266e38da2aff706c91440d83a87abc74131930e6c38a44a0c5e627db2d045375fde147e0edd3276f4b014

  • memory/2308-129-0x00000000014F0000-0x00000000014F1000-memory.dmp

    Filesize

    4KB

  • memory/2308-198-0x0000000005480000-0x0000000005488000-memory.dmp

    Filesize

    32KB

  • memory/2308-120-0x0000000002F00000-0x0000000002F08000-memory.dmp

    Filesize

    32KB

  • memory/2308-121-0x0000000001540000-0x0000000001541000-memory.dmp

    Filesize

    4KB

  • memory/2308-127-0x0000000001540000-0x0000000001548000-memory.dmp

    Filesize

    32KB

  • memory/2308-78-0x0000000001AE0000-0x0000000001AF0000-memory.dmp

    Filesize

    64KB

  • memory/2308-138-0x0000000002F10000-0x0000000002F18000-memory.dmp

    Filesize

    32KB

  • memory/2308-249-0x0000000003D20000-0x0000000003D21000-memory.dmp

    Filesize

    4KB

  • memory/2308-191-0x00000000036F0000-0x00000000036F8000-memory.dmp

    Filesize

    32KB

  • memory/2308-94-0x0000000001BE0000-0x0000000001BF0000-memory.dmp

    Filesize

    64KB

  • memory/2308-202-0x0000000005610000-0x0000000005611000-memory.dmp

    Filesize

    4KB

  • memory/2308-208-0x0000000005610000-0x0000000005618000-memory.dmp

    Filesize

    32KB

  • memory/2308-248-0x00000000045C0000-0x00000000045C8000-memory.dmp

    Filesize

    32KB

  • memory/2308-214-0x00000000045F0000-0x00000000045F8000-memory.dmp

    Filesize

    32KB

  • memory/2308-215-0x00000000045E0000-0x00000000045E1000-memory.dmp

    Filesize

    4KB

  • memory/2308-224-0x0000000004600000-0x0000000004608000-memory.dmp

    Filesize

    32KB

  • memory/2788-218-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2788-209-0x0000000000400000-0x0000000001BE7000-memory.dmp

    Filesize

    23.9MB

  • memory/2788-60-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB