Overview
overview
8Static
static
3au.exe
windows7-x64
7au.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$R0.dll
windows7-x64
3$R0.dll
windows10-2004-x64
3Data/sqlite3.dll
windows7-x64
3Data/sqlite3.dll
windows10-2004-x64
3Office2007Blue.dll
windows7-x64
1Office2007Blue.dll
windows10-2004-x64
1au.chm
windows7-x64
1au.chm
windows10-2004-x64
1au.exe
windows7-x64
7au.exe
windows10-2004-x64
7au32.exe
windows7-x64
1au32.exe
windows10-2004-x64
3clearpasti...ry.vbs
windows7-x64
8clearpasti...ry.vbs
windows10-2004-x64
8createsrpoint.vbs
windows7-x64
4createsrpoint.vbs
windows10-2004-x64
1da.exe
windows7-x64
3da.exe
windows10-2004-x64
3hstdel.exe
windows7-x64
1hstdel.exe
windows10-2004-x64
3rc.chm
windows7-x64
1rc.chm
windows10-2004-x64
1rc.exe
windows7-x64
3rc.exe
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
au.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
au.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$R0.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$R0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Data/sqlite3.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Data/sqlite3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Office2007Blue.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Office2007Blue.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
au.chm
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
au.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
au.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
au.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
au32.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
au32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
clearpasticonhistory.vbs
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
clearpasticonhistory.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
createsrpoint.vbs
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
createsrpoint.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
da.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
da.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
hstdel.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
hstdel.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
rc.chm
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
rc.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
rc.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
rc.exe
Resource
win10v2004-20240802-en
General
-
Target
clearpasticonhistory.vbs
-
Size
241B
-
MD5
c2f92bd41b97855a68e39ad6bbc3b9e4
-
SHA1
8a70c5384bedbcf7be26b5d43ae0e3c276d4ed05
-
SHA256
79b3101e208879d26b84113859a46919e4f1d29da417f604f2946e5949bc4db4
-
SHA512
12273e97c8b6f0804fe4d6f237aace1456c0ef4c57871d057724c7bcccbca6cb6bec4e4daef37cbb465fdbd097f03c881c2dd00e9a37fe86c159b858297fa9ce
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2060 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 2060 explorer.exe Token: SeShutdownPrivilege 2060 explorer.exe Token: SeShutdownPrivilege 2060 explorer.exe Token: SeShutdownPrivilege 2060 explorer.exe Token: SeShutdownPrivilege 2060 explorer.exe Token: SeShutdownPrivilege 2060 explorer.exe Token: SeShutdownPrivilege 2060 explorer.exe Token: SeShutdownPrivilege 2060 explorer.exe Token: SeShutdownPrivilege 2060 explorer.exe Token: SeShutdownPrivilege 2060 explorer.exe Token: 33 2816 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2816 AUDIODG.EXE Token: 33 2816 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2816 AUDIODG.EXE Token: SeShutdownPrivilege 2060 explorer.exe Token: SeShutdownPrivilege 2060 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe 2060 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\clearpasticonhistory.vbs"1⤵PID:2468
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2060
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5901⤵
- Suspicious use of AdjustPrivilegeToken
PID:2816