Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 01:40
Behavioral task
behavioral1
Sample
cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe
Resource
win10v2004-20240802-en
General
-
Target
cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe
-
Size
102KB
-
MD5
ad5e0bed246c493bad23e8c6a2c5cfe1
-
SHA1
9bf3a6c474d35bdf87106aca8692e74ade4493ac
-
SHA256
cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6
-
SHA512
e329b82705283cd7d56379bcb25304ad7794c11cd65c175cb91a18ad4416344b4b6c8bd8f0423f3c45a208b95dab0b207a75e89acc426a3526810e1cd80dcf9c
-
SSDEEP
3072:xFphTfm1UC7AdYzrV+Dljy/32ubwZZqJ:FhTfmuCkdYzrVolu/J0ZZ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3384 WindowsService.exe 620 WindowsService.exe 3092 WindowsService.exe -
Loads dropped DLL 5 IoCs
pid Process 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe -
resource yara_rule behavioral1/memory/2676-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2676-4-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2676-449-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3108-447-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2676-174-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2676-133-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2676-80-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0009000000016140-488.dat upx behavioral1/memory/3108-494-0x0000000002830000-0x000000000286B000-memory.dmp upx behavioral1/memory/3384-497-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3108-499-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3384-1050-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/620-1048-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3384-1047-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3108-1052-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/620-1055-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\SystemWindows\\WindowsService.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2676 set thread context of 3108 2676 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 30 PID 3384 set thread context of 620 3384 WindowsService.exe 36 PID 3384 set thread context of 3092 3384 WindowsService.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe Token: SeDebugPrivilege 620 WindowsService.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2676 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 3384 WindowsService.exe 620 WindowsService.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3108 2676 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 30 PID 2676 wrote to memory of 3108 2676 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 30 PID 2676 wrote to memory of 3108 2676 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 30 PID 2676 wrote to memory of 3108 2676 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 30 PID 2676 wrote to memory of 3108 2676 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 30 PID 2676 wrote to memory of 3108 2676 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 30 PID 2676 wrote to memory of 3108 2676 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 30 PID 2676 wrote to memory of 3108 2676 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 30 PID 3108 wrote to memory of 3308 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 32 PID 3108 wrote to memory of 3308 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 32 PID 3108 wrote to memory of 3308 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 32 PID 3108 wrote to memory of 3308 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 32 PID 3308 wrote to memory of 3360 3308 cmd.exe 34 PID 3308 wrote to memory of 3360 3308 cmd.exe 34 PID 3308 wrote to memory of 3360 3308 cmd.exe 34 PID 3308 wrote to memory of 3360 3308 cmd.exe 34 PID 3108 wrote to memory of 3384 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 35 PID 3108 wrote to memory of 3384 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 35 PID 3108 wrote to memory of 3384 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 35 PID 3108 wrote to memory of 3384 3108 cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe 35 PID 3384 wrote to memory of 620 3384 WindowsService.exe 36 PID 3384 wrote to memory of 620 3384 WindowsService.exe 36 PID 3384 wrote to memory of 620 3384 WindowsService.exe 36 PID 3384 wrote to memory of 620 3384 WindowsService.exe 36 PID 3384 wrote to memory of 620 3384 WindowsService.exe 36 PID 3384 wrote to memory of 620 3384 WindowsService.exe 36 PID 3384 wrote to memory of 620 3384 WindowsService.exe 36 PID 3384 wrote to memory of 620 3384 WindowsService.exe 36 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37 PID 3384 wrote to memory of 3092 3384 WindowsService.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe"C:\Users\Admin\AppData\Local\Temp\cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe"C:\Users\Admin\AppData\Local\Temp\cd1341d772da24f9ad6e87382ece92aa6cd1be26dd07ac2867ba8e9180c4c3b6.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SPOSG.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3360
-
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:620
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3092
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5f6a90c20834f271a907a4e2bc28184c2
SHA136c9d1602b74f622346fbb22693597d7889df48d
SHA25673f29cd953eee40cea4de67842556ffd96efe8094a6a9b70f33a35df2582febd
SHA51239cabae19fe1faa37455e4bd242c868be60d6252b07f01224b3f7501c3cf734e503300b840d83381a452707cab6df2f95f920655884be56d4024676b26943804
-
Filesize
102KB
MD5b6fb086d0e2a7366772bd8dc1e927af4
SHA1f2461890ec3d7a6909295c15ac1b2c2bd0eb8392
SHA256e08e601142a06386092531e12d20f7b4d8f7ae9ff77a15c23596fe47c34810e4
SHA512141743fb08ea829edafc76292b682ee8204d18559041a218924123fa61e18b423ff546408681c1ef787d0441593da7916d8b7ef8220c98bf3a3dcc0d6f27197c