Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
oxhzulzwrt.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
oxhzulzwrt.exe
Resource
win10v2004-20240802-en
General
-
Target
oxhzulzwrt.exe
-
Size
137KB
-
MD5
a7c87a3414b9f40f48700c10391d5980
-
SHA1
97e195564d3b1b394e730d2cbe0369243c81149d
-
SHA256
b959398a698e3e7b4b18306724d9aa2d697956c6a160725f6d9a3a1c0699a1d4
-
SHA512
e4c3ae8a84679d8c05eacd160048bf98046fe25efab16e12c3759f1314f14930c8127a640af29ac0d85cd83e073775a384dfa474cc4d1cf5a3935229d506358e
-
SSDEEP
1536:0hYSOk+ac5boqXL6QozPIb/umpVvLX48JV0TdpHu4Eo5n1xesW+cd1GdxZbShX:06ZGQGgru+vLxJYnng1YxYX
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 oxhzulzwrt.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oxhzulzwrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Kills process with taskkill 1 IoCs
pid Process 3236 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1588 reg.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3236 taskkill.exe Token: 33 3392 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3392 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2964 2200 oxhzulzwrt.exe 94 PID 2200 wrote to memory of 2964 2200 oxhzulzwrt.exe 94 PID 2200 wrote to memory of 2964 2200 oxhzulzwrt.exe 94 PID 2964 wrote to memory of 3236 2964 cmd.exe 96 PID 2964 wrote to memory of 3236 2964 cmd.exe 96 PID 2964 wrote to memory of 3236 2964 cmd.exe 96 PID 2200 wrote to memory of 4880 2200 oxhzulzwrt.exe 97 PID 2200 wrote to memory of 4880 2200 oxhzulzwrt.exe 97 PID 2200 wrote to memory of 4880 2200 oxhzulzwrt.exe 97 PID 4880 wrote to memory of 1588 4880 cmd.exe 99 PID 4880 wrote to memory of 1588 4880 cmd.exe 99 PID 4880 wrote to memory of 1588 4880 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\oxhzulzwrt.exe"C:\Users\Admin\AppData\Local\Temp\oxhzulzwrt.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im taskmgr.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\reg.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1588
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4dc 0x50c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3392