Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
1b690b07da320ba1263eeadaae44d990N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1b690b07da320ba1263eeadaae44d990N.exe
Resource
win10v2004-20240802-en
General
-
Target
1b690b07da320ba1263eeadaae44d990N.exe
-
Size
328KB
-
MD5
1b690b07da320ba1263eeadaae44d990
-
SHA1
7479d5abe7c5f6018ef097f73f8336cd05494cb2
-
SHA256
16395b6495c17fcc6dd834b399b1acdc672b8320a6248860a2a25638720b2c87
-
SHA512
622a87647867eff95eabaad5c519079ab495d8ebc460e6a51f23171e3722db2088038a7d2fbc3599a0772374d015492ad084813d6f4ac73c26433a673293c11e
-
SSDEEP
6144:J2XgY8FFX7Z6A/P352p4gFs/e8PeAZuon2T5T7UcIGMAQTeJ:J2X1cFx/PAp4ks/e6Fn2dEZGjQSJ
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\conhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\conhost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Executes dropped EXE 4 IoCs
pid Process 3304 1b690b07da320ba1263eeadaae44d990N.exe 3548 conhost.exe 3056 conhost.exe 3500 conhost.exe -
Loads dropped DLL 6 IoCs
pid Process 2280 1b690b07da320ba1263eeadaae44d990N.exe 3304 1b690b07da320ba1263eeadaae44d990N.exe 3304 1b690b07da320ba1263eeadaae44d990N.exe 3304 1b690b07da320ba1263eeadaae44d990N.exe 3304 1b690b07da320ba1263eeadaae44d990N.exe 3304 1b690b07da320ba1263eeadaae44d990N.exe -
resource yara_rule behavioral1/memory/3304-461-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3304-464-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3304-508-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3304-1070-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3500-1066-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral1/memory/3056-1056-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3056-1078-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3500-1081-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Console Window Host = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\conhost.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2280 set thread context of 3304 2280 1b690b07da320ba1263eeadaae44d990N.exe 29 PID 3548 set thread context of 3056 3548 conhost.exe 34 PID 3548 set thread context of 3500 3548 conhost.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b690b07da320ba1263eeadaae44d990N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b690b07da320ba1263eeadaae44d990N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 840 reg.exe 3700 reg.exe 1964 reg.exe 3712 reg.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: 1 3500 conhost.exe Token: SeCreateTokenPrivilege 3500 conhost.exe Token: SeAssignPrimaryTokenPrivilege 3500 conhost.exe Token: SeLockMemoryPrivilege 3500 conhost.exe Token: SeIncreaseQuotaPrivilege 3500 conhost.exe Token: SeMachineAccountPrivilege 3500 conhost.exe Token: SeTcbPrivilege 3500 conhost.exe Token: SeSecurityPrivilege 3500 conhost.exe Token: SeTakeOwnershipPrivilege 3500 conhost.exe Token: SeLoadDriverPrivilege 3500 conhost.exe Token: SeSystemProfilePrivilege 3500 conhost.exe Token: SeSystemtimePrivilege 3500 conhost.exe Token: SeProfSingleProcessPrivilege 3500 conhost.exe Token: SeIncBasePriorityPrivilege 3500 conhost.exe Token: SeCreatePagefilePrivilege 3500 conhost.exe Token: SeCreatePermanentPrivilege 3500 conhost.exe Token: SeBackupPrivilege 3500 conhost.exe Token: SeRestorePrivilege 3500 conhost.exe Token: SeShutdownPrivilege 3500 conhost.exe Token: SeDebugPrivilege 3500 conhost.exe Token: SeAuditPrivilege 3500 conhost.exe Token: SeSystemEnvironmentPrivilege 3500 conhost.exe Token: SeChangeNotifyPrivilege 3500 conhost.exe Token: SeRemoteShutdownPrivilege 3500 conhost.exe Token: SeUndockPrivilege 3500 conhost.exe Token: SeSyncAgentPrivilege 3500 conhost.exe Token: SeEnableDelegationPrivilege 3500 conhost.exe Token: SeManageVolumePrivilege 3500 conhost.exe Token: SeImpersonatePrivilege 3500 conhost.exe Token: SeCreateGlobalPrivilege 3500 conhost.exe Token: 31 3500 conhost.exe Token: 32 3500 conhost.exe Token: 33 3500 conhost.exe Token: 34 3500 conhost.exe Token: 35 3500 conhost.exe Token: SeDebugPrivilege 3056 conhost.exe Token: SeDebugPrivilege 3056 conhost.exe Token: SeDebugPrivilege 3056 conhost.exe Token: SeDebugPrivilege 3056 conhost.exe Token: SeDebugPrivilege 3056 conhost.exe Token: SeDebugPrivilege 3056 conhost.exe Token: SeDebugPrivilege 3056 conhost.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2280 1b690b07da320ba1263eeadaae44d990N.exe 3304 1b690b07da320ba1263eeadaae44d990N.exe 3548 conhost.exe 3056 conhost.exe 3500 conhost.exe 3500 conhost.exe 3500 conhost.exe 3500 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3304 2280 1b690b07da320ba1263eeadaae44d990N.exe 29 PID 2280 wrote to memory of 3304 2280 1b690b07da320ba1263eeadaae44d990N.exe 29 PID 2280 wrote to memory of 3304 2280 1b690b07da320ba1263eeadaae44d990N.exe 29 PID 2280 wrote to memory of 3304 2280 1b690b07da320ba1263eeadaae44d990N.exe 29 PID 2280 wrote to memory of 3304 2280 1b690b07da320ba1263eeadaae44d990N.exe 29 PID 2280 wrote to memory of 3304 2280 1b690b07da320ba1263eeadaae44d990N.exe 29 PID 2280 wrote to memory of 3304 2280 1b690b07da320ba1263eeadaae44d990N.exe 29 PID 2280 wrote to memory of 3304 2280 1b690b07da320ba1263eeadaae44d990N.exe 29 PID 3304 wrote to memory of 3472 3304 1b690b07da320ba1263eeadaae44d990N.exe 30 PID 3304 wrote to memory of 3472 3304 1b690b07da320ba1263eeadaae44d990N.exe 30 PID 3304 wrote to memory of 3472 3304 1b690b07da320ba1263eeadaae44d990N.exe 30 PID 3304 wrote to memory of 3472 3304 1b690b07da320ba1263eeadaae44d990N.exe 30 PID 3472 wrote to memory of 3524 3472 cmd.exe 32 PID 3472 wrote to memory of 3524 3472 cmd.exe 32 PID 3472 wrote to memory of 3524 3472 cmd.exe 32 PID 3472 wrote to memory of 3524 3472 cmd.exe 32 PID 3304 wrote to memory of 3548 3304 1b690b07da320ba1263eeadaae44d990N.exe 33 PID 3304 wrote to memory of 3548 3304 1b690b07da320ba1263eeadaae44d990N.exe 33 PID 3304 wrote to memory of 3548 3304 1b690b07da320ba1263eeadaae44d990N.exe 33 PID 3304 wrote to memory of 3548 3304 1b690b07da320ba1263eeadaae44d990N.exe 33 PID 3548 wrote to memory of 3056 3548 conhost.exe 34 PID 3548 wrote to memory of 3056 3548 conhost.exe 34 PID 3548 wrote to memory of 3056 3548 conhost.exe 34 PID 3548 wrote to memory of 3056 3548 conhost.exe 34 PID 3548 wrote to memory of 3056 3548 conhost.exe 34 PID 3548 wrote to memory of 3056 3548 conhost.exe 34 PID 3548 wrote to memory of 3056 3548 conhost.exe 34 PID 3548 wrote to memory of 3056 3548 conhost.exe 34 PID 3548 wrote to memory of 3500 3548 conhost.exe 35 PID 3548 wrote to memory of 3500 3548 conhost.exe 35 PID 3548 wrote to memory of 3500 3548 conhost.exe 35 PID 3548 wrote to memory of 3500 3548 conhost.exe 35 PID 3548 wrote to memory of 3500 3548 conhost.exe 35 PID 3548 wrote to memory of 3500 3548 conhost.exe 35 PID 3548 wrote to memory of 3500 3548 conhost.exe 35 PID 3548 wrote to memory of 3500 3548 conhost.exe 35 PID 3500 wrote to memory of 3620 3500 conhost.exe 36 PID 3500 wrote to memory of 3620 3500 conhost.exe 36 PID 3500 wrote to memory of 3620 3500 conhost.exe 36 PID 3500 wrote to memory of 3620 3500 conhost.exe 36 PID 3500 wrote to memory of 3612 3500 conhost.exe 37 PID 3500 wrote to memory of 3612 3500 conhost.exe 37 PID 3500 wrote to memory of 3612 3500 conhost.exe 37 PID 3500 wrote to memory of 3612 3500 conhost.exe 37 PID 3500 wrote to memory of 3660 3500 conhost.exe 38 PID 3500 wrote to memory of 3660 3500 conhost.exe 38 PID 3500 wrote to memory of 3660 3500 conhost.exe 38 PID 3500 wrote to memory of 3660 3500 conhost.exe 38 PID 3620 wrote to memory of 840 3620 cmd.exe 42 PID 3620 wrote to memory of 840 3620 cmd.exe 42 PID 3620 wrote to memory of 840 3620 cmd.exe 42 PID 3620 wrote to memory of 840 3620 cmd.exe 42 PID 3500 wrote to memory of 3684 3500 conhost.exe 43 PID 3500 wrote to memory of 3684 3500 conhost.exe 43 PID 3500 wrote to memory of 3684 3500 conhost.exe 43 PID 3500 wrote to memory of 3684 3500 conhost.exe 43 PID 3612 wrote to memory of 3700 3612 cmd.exe 44 PID 3612 wrote to memory of 3700 3612 cmd.exe 44 PID 3612 wrote to memory of 3700 3612 cmd.exe 44 PID 3612 wrote to memory of 3700 3612 cmd.exe 44 PID 3660 wrote to memory of 1964 3660 cmd.exe 46 PID 3660 wrote to memory of 1964 3660 cmd.exe 46 PID 3660 wrote to memory of 1964 3660 cmd.exe 46 PID 3660 wrote to memory of 1964 3660 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b690b07da320ba1263eeadaae44d990N.exe"C:\Users\Admin\AppData\Local\Temp\1b690b07da320ba1263eeadaae44d990N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\1b690b07da320ba1263eeadaae44d990N.exe"C:\Users\Admin\AppData\Local\Temp\1b690b07da320ba1263eeadaae44d990N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ISOJS.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Console Window Host" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3524
-
-
-
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
PID:3684 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3712
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154B
MD50d0a854e96bddf0e7df7f5f024674226
SHA1f45ca9c7f935422ddfb0550febdfc7a09baf2d98
SHA2565bab0b5c3ef8a28a7246854074a5a469c602a10ac803d18f2102399597d35907
SHA5128b6db387b3bb5774c691bcdd4d9f3a147e1556eee89fe1de929464510c01b14495157c14cbb355fc850b79dee500b8be7ae7a0c3b5ea0916d6eb9154f9ae73a8
-
Filesize
328KB
MD51b690b07da320ba1263eeadaae44d990
SHA17479d5abe7c5f6018ef097f73f8336cd05494cb2
SHA25616395b6495c17fcc6dd834b399b1acdc672b8320a6248860a2a25638720b2c87
SHA512622a87647867eff95eabaad5c519079ab495d8ebc460e6a51f23171e3722db2088038a7d2fbc3599a0772374d015492ad084813d6f4ac73c26433a673293c11e
-
Filesize
328KB
MD5d6bd9da7e23fa6ff2bafe9e33ad567f2
SHA1536857b863a16e1782a534bdf41d31750ca9d22d
SHA2565b9c5f9854cc7075f65981ae3cc8c78f0b7f1db4bbcddd3577f9e10a79ffe1c2
SHA5121da4640f9a1d769684f7828dd80764578e7b690f482ccbc728c4ce9289a91c9f5a8726f540e631468d5ffa9a5888ac98965d77f8e0953da217af2e5427337f60