Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
d6b4d656a00fd7aae69fb558bb5dba30N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d6b4d656a00fd7aae69fb558bb5dba30N.exe
Resource
win10v2004-20240802-en
General
-
Target
d6b4d656a00fd7aae69fb558bb5dba30N.exe
-
Size
80KB
-
MD5
d6b4d656a00fd7aae69fb558bb5dba30
-
SHA1
587b128fa375a51082e249dd8ab6d7a64c59eecd
-
SHA256
ba4e9f1436254a4e3ee987d63fff0d137dc939d8575f1d5a2f7be7d8d3d86258
-
SHA512
35434db98d31164b4fdc7867798d75e4ca4b2546ede0b06350d65ab07c82f7290691889644d3cdb5c35114467a349378ff4a81bfa6f856d1e068618ecdb964f9
-
SSDEEP
768:eLxqBt1sJw5pVNUP1/kvtbWcpmCKXTak3QIXjLZJ2bXfqQKMq+gjTAfu/MB8QKp2:Bteq0QIXJJyXEv/MBK67lALNtnd1PBwN
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" umtuxean-ecixú±¬± -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\¯ñäæŒñäæŒñäæŒñäæŒùñ俬ñ俬ùñ俬ñ俬ùñäæŒñäæŒùñäæŒñäæŒñäæŒñäæŒñ俬ñ俬© umtuxean-ecixú±¬± Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\¯ñäæŒñäæŒñäæŒñäæŒùñ俬ñ俬ùñ俬ñ俬ùñäæŒñäæŒùñäæŒñäæŒñäæŒñäæŒñ俬ñ俬©\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901 = "a" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\¯ñäæŒñäæŒñäæŒñäæŒùñ俬ñ俬ùñ俬ñ俬ùñäæŒñäæŒùñäæŒñäæŒñäæŒñäæŒñ俬ñ俬©\§º§ µ¸¸±° = "1" umtuxean-ecixú±¬± Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\¯ñäæŒñäæŒñäæŒñäæŒùñ俬ñ俬ùñ俬ñ俬ùñäæŒñäæŒùñäæŒñäæŒñäæŒñäæŒñ俬ñ俬©\‡ ¡¶„µ ¼ = "C:\\Windows\\system32\\iffeaxeam-afootú±¬±" umtuxean-ecixú±¬± -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" umtuxean-ecixú±¬± Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\±¶¡³³±¦ = "C:\\Windows\\system32\\urkemamú±¬±" umtuxean-ecixú±¬± Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe umtuxean-ecixú±¬± -
Executes dropped EXE 2 IoCs
pid Process 3016 umtuxean-ecixú±¬± 2800 umtuxean-ecixú±¬± -
Loads dropped DLL 3 IoCs
pid Process 1064 d6b4d656a00fd7aae69fb558bb5dba30N.exe 1064 d6b4d656a00fd7aae69fb558bb5dba30N.exe 3016 umtuxean-ecixú±¬± -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" umtuxean-ecixú±¬± Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" umtuxean-ecixú±¬± -
description ioc Process Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\±¶¡³³±¦ umtuxean-ecixú±¬± -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\umtuxean-ecixú±¬± d6b4d656a00fd7aae69fb558bb5dba30N.exe File opened for modification C:\Windows\SysWOW64\urkemamú±¬± umtuxean-ecixú±¬± File created C:\Windows\SysWOW64\urkemamú±¬± umtuxean-ecixú±¬± File created C:\Windows\SysWOW64\ofbotitú°¸¸ umtuxean-ecixú±¬± File opened for modification C:\Windows\SysWOW64\umtuxean-ecixú±¬± umtuxean-ecixú±¬± File opened for modification C:\Windows\SysWOW64\umtuxean-ecixú±¬± d6b4d656a00fd7aae69fb558bb5dba30N.exe File opened for modification C:\Windows\SysWOW64\iffeaxeam-afootú±¬± umtuxean-ecixú±¬± File created C:\Windows\SysWOW64\iffeaxeam-afootú±¬± umtuxean-ecixú±¬± File opened for modification C:\Windows\SysWOW64\ofbotitú°¸¸ umtuxean-ecixú±¬± -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6b4d656a00fd7aae69fb558bb5dba30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umtuxean-ecixú±¬± -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 2800 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± 3016 umtuxean-ecixú±¬± -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1064 wrote to memory of 3016 1064 d6b4d656a00fd7aae69fb558bb5dba30N.exe 30 PID 1064 wrote to memory of 3016 1064 d6b4d656a00fd7aae69fb558bb5dba30N.exe 30 PID 1064 wrote to memory of 3016 1064 d6b4d656a00fd7aae69fb558bb5dba30N.exe 30 PID 1064 wrote to memory of 3016 1064 d6b4d656a00fd7aae69fb558bb5dba30N.exe 30 PID 3016 wrote to memory of 2800 3016 umtuxean-ecixú±¬± 31 PID 3016 wrote to memory of 2800 3016 umtuxean-ecixú±¬± 31 PID 3016 wrote to memory of 2800 3016 umtuxean-ecixú±¬± 31 PID 3016 wrote to memory of 2800 3016 umtuxean-ecixú±¬± 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6b4d656a00fd7aae69fb558bb5dba30N.exe"C:\Users\Admin\AppData\Local\Temp\d6b4d656a00fd7aae69fb558bb5dba30N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\umtuxean-ecixú±¬±"C:\Windows\system32\umtuxean-ecixú±¬±"2⤵
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Indicator Removal: Clear Persistence
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\umtuxean-ecixú±¬±ùù¿çç¤3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5b5be9e19d2f553cedc3a840dcdcb7fd7
SHA1931f5ea27c2adb61d5905fd7f6f424322b9e873f
SHA256bb6e322b408121ac4321dc8af4a1905022e86d6eb4cb2f854da8062423764193
SHA512a59e72428fd9b532291de76f221c4978e089b3774530e7aabb7a628ad1449c953e0efb6dcd75331ae18a6cb78b8a46e56258d83188b59b865500d2ca9af6c045
-
Filesize
5KB
MD548c45e05569f9a5665d082fbdc116c14
SHA1e491ab1327b88312fc6d0535621b6de733c8efb5
SHA2567e916f847bb5de3e09b36bd527e09ed656df13296bdcd9924185bcccde7dbe4c
SHA512e1cc47e185831dc6c40372efc227f299964f262c641b790d31f0fe452a5bc70a4946c689913504c64790833c131d40c01fcd9ff3a148636be9f502959f7cc49c
-
Filesize
80KB
MD5d6b4d656a00fd7aae69fb558bb5dba30
SHA1587b128fa375a51082e249dd8ab6d7a64c59eecd
SHA256ba4e9f1436254a4e3ee987d63fff0d137dc939d8575f1d5a2f7be7d8d3d86258
SHA51235434db98d31164b4fdc7867798d75e4ca4b2546ede0b06350d65ab07c82f7290691889644d3cdb5c35114467a349378ff4a81bfa6f856d1e068618ecdb964f9
-
Filesize
83KB
MD5ddc8e68f2eb3f7f06c9efb7ec0f06e38
SHA1c316ce905020e860240fa1cffeed9c766efd0b08
SHA2562ba68fbf0b67288059f388c38677cc1aba90f498f79b3bb29229c0c1bddd5540
SHA512769614124bc265d2bd98de304245dc726bf8fc86739e0c104fa5422134124d187b0de8a61e69fd9cd475650aeaba59316cf96cc42e15b1d10123058843d2eaf1