Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 19:37
Behavioral task
behavioral1
Sample
119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe
Resource
win7-20240705-en
General
-
Target
119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe
-
Size
280KB
-
MD5
ebda4498a4f12fc4fd8f89a974218b40
-
SHA1
c968d7ab02de9db080fb302058607283989c14e2
-
SHA256
119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95
-
SHA512
38e1ab26aba496739b71be4c3ab40f93a4c33738d2d38eb4f063b24a5003db0756fb01228a719ff0de2bb840cb642e8ef23bd3762ef72444d9fb68ba7400e677
-
SSDEEP
6144:GXSQ8BCMis1TMrRQwy7eIeCDb1mY8cEOkCybEaQRXr9HNdvOa:GXv8BCLocRZy7eIeybt6Okx2LIa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1176 375d8d40 -
resource yara_rule behavioral1/memory/3016-0-0x0000000000CC0000-0x0000000000D4E000-memory.dmp upx behavioral1/files/0x00070000000120fb-2.dat upx behavioral1/memory/1176-3-0x0000000001220000-0x00000000012AE000-memory.dmp upx behavioral1/memory/3016-4-0x0000000000CC0000-0x0000000000D4E000-memory.dmp upx behavioral1/memory/1176-6-0x0000000001220000-0x00000000012AE000-memory.dmp upx behavioral1/memory/3016-690-0x0000000000CC0000-0x0000000000D4E000-memory.dmp upx behavioral1/memory/1176-691-0x0000000001220000-0x00000000012AE000-memory.dmp upx behavioral1/memory/1176-780-0x0000000001220000-0x00000000012AE000-memory.dmp upx behavioral1/memory/1176-1190-0x0000000001220000-0x00000000012AE000-memory.dmp upx behavioral1/memory/3016-1336-0x0000000000CC0000-0x0000000000D4E000-memory.dmp upx behavioral1/memory/3016-2203-0x0000000000CC0000-0x0000000000D4E000-memory.dmp upx behavioral1/memory/3016-2673-0x0000000000CC0000-0x0000000000D4E000-memory.dmp upx behavioral1/memory/3016-3071-0x0000000000CC0000-0x0000000000D4E000-memory.dmp upx -
Unexpected DNS network traffic destination 8 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 114.114.114.114 -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 375d8d40 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 375d8d40 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 375d8d40 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 375d8d40 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 375d8d40 File created C:\Windows\Syswow64\375d8d40 119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 375d8d40 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople 375d8d40 Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs 375d8d40 Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs 375d8d40 Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{59B5F870-767D-4958-A4D1-544A873180CD}\WpadDecision = "0" 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d3-4d-e4-64-86 375d8d40 Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{59B5F870-767D-4958-A4D1-544A873180CD}\e6-d3-4d-e4-64-86 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates 375d8d40 Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{59B5F870-767D-4958-A4D1-544A873180CD}\WpadNetworkName = "Network 3" 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{59B5F870-767D-4958-A4D1-544A873180CD} 375d8d40 Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{59B5F870-767D-4958-A4D1-544A873180CD}\WpadDecisionReason = "1" 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed 375d8d40 Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 375d8d40 Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 375d8d40 Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d3-4d-e4-64-86\WpadDecisionTime = b02a4db281f9da01 375d8d40 Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d3-4d-e4-64-86\WpadDecision = "0" 375d8d40 Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs 375d8d40 Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs 375d8d40 Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{59B5F870-767D-4958-A4D1-544A873180CD}\WpadDecisionTime = b02a4db281f9da01 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates 375d8d40 Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 375d8d40 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs 375d8d40 Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-d3-4d-e4-64-86\WpadDecisionReason = "1" 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs 375d8d40 Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates 375d8d40 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1176 375d8d40 1176 375d8d40 1176 375d8d40 1176 375d8d40 3016 119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe 3016 119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe 3016 119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3016 119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe Token: SeTcbPrivilege 3016 119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe Token: SeDebugPrivilege 1176 375d8d40 Token: SeTcbPrivilege 1176 375d8d40
Processes
-
C:\Users\Admin\AppData\Local\Temp\119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe"C:\Users\Admin\AppData\Local\Temp\119630f05cb37d5893c204c7ab28234cbb775fff54de8e54beb9c8f7f7a2ec95.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
C:\Windows\Syswow64\375d8d40C:\Windows\Syswow64\375d8d401⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5f36347d133f20f36ce7ce1a88edfb5d6
SHA1c9a8be94c5118ebb66ae485f681c2c1f285ae39b
SHA2566b1baa0e54818c880f70e33e136e9762f03cd54544e9252b51b3b717f775bbbe
SHA512c87847d147ddc6194b1fbac0a80c87d981e188c3bd5f639c20cceb79e88c96196c4543a1d53ad6f96e09acb885d4db13dd64df491dc072796502bc7cc7eeed37
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
Filesize70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a1933d99bbda8201bfe5895477f32291
SHA1d9ffbd3bd38fd5467772de28213d3e01f7143fa1
SHA256cd26aa7eba0ff46f7b41847ac600ad55e0b32fb4f2a05b673b6b52bc95dbd81e
SHA51228119734d546950658576594014b0c01ff26cc551ce300b6c66639fdc83a1b15baf9dc3beb18df7c5784b4ebd2eaa42f62742f51b3fe4c0a912d576f91efd76f
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b