Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 21:20
Behavioral task
behavioral1
Sample
5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe
Resource
win7-20240704-en
General
-
Target
5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe
-
Size
176KB
-
MD5
14d0ff15f0af156ac70bfe66d080aadb
-
SHA1
9c372cdd1ee5925efb1828d399a05a0bc755db2f
-
SHA256
5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2
-
SHA512
1aa7a99b3d586ee0044df6a3d2d8b00b3fffdf35730d8661df6e0a3070db1d76396e10f690e40aa1d0f0b31443c99cb871f4f0491aa284c31fcccd895f679e8e
-
SSDEEP
3072:H86wLHW98aGEbxeE5hf1jNi+FnA8PJi7K9tOa9txNoK/Gm52222222222222:lwK97FbwEFBxruKrOarxNP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2028 SearchIndexerDB.exe 2888 SearchIndexerDB.exe -
Loads dropped DLL 4 IoCs
pid Process 1668 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe 1668 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe 1668 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe 2028 SearchIndexerDB.exe -
resource yara_rule behavioral1/memory/1668-0-0x0000000000E10000-0x0000000000E78000-memory.dmp upx behavioral1/files/0x000600000001925c-24.dat upx behavioral1/memory/1668-27-0x0000000000E10000-0x0000000000E78000-memory.dmp upx behavioral1/memory/2888-28-0x0000000001150000-0x00000000011B8000-memory.dmp upx behavioral1/memory/1668-20-0x00000000030C0000-0x0000000003128000-memory.dmp upx behavioral1/memory/2028-29-0x0000000001150000-0x00000000011B8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SearchIndexerDB.exe -
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\shell\open 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\ = "Application" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\shell\open\command\IsolatedCommand = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\ = "cmos" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\shell\open\command 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\SearchIndexerDB.exe\" /START \"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\shell\runas\command 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\runas 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\shell 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\DefaultIcon\ = "%1" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\open\command 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\shell\runas 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\shell\runas\command\IsolatedCommand = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\DefaultIcon 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\runas\command 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\Content-Type = "application/x-msdownload" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\DefaultIcon 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\DefaultIcon\ = "%1" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\cmos\shell\runas\command\ = "\"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\open 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\SearchIndexerDB.exe\" /START \"%1\" %*" 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2028 SearchIndexerDB.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2028 1668 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe 30 PID 1668 wrote to memory of 2028 1668 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe 30 PID 1668 wrote to memory of 2028 1668 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe 30 PID 1668 wrote to memory of 2028 1668 5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe 30 PID 2028 wrote to memory of 2888 2028 SearchIndexerDB.exe 31 PID 2028 wrote to memory of 2888 2028 SearchIndexerDB.exe 31 PID 2028 wrote to memory of 2888 2028 SearchIndexerDB.exe 31 PID 2028 wrote to memory of 2888 2028 SearchIndexerDB.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe"C:\Users\Admin\AppData\Local\Temp\5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe"3⤵
- Executes dropped EXE
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5fa39cb92cc4b8ce5cf4321ec0ac0aeac
SHA19be47b3775218f9c8b0504e7062481b15dceb193
SHA256b75e84219e0d23bcfc057e7c83c17fd34f38447238ae49dfbd323ca689aa1836
SHA5129d819d56e8bdc5f573288f3253b02b47834c3a12498daf99da144689e6b60a1dbc816312b94d862451b2cb9a6c3da56aabaadfdc3c233e0f5e0e8f34ce1830ee