Analysis

  • max time kernel
    22s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 10:39

Errors

Reason
Machine shutdown

General

  • Target

    Re-Loader Activator 3.0 2/SetupComplete.cmd

  • Size

    331B

  • MD5

    21a93c0f93ee99f60adf82478fc19c65

  • SHA1

    1c7771aa4e2873ec92db5b78af1cc5c3f544c3cc

  • SHA256

    353413c1c76ef3fb63ee05414474a1b90537b34e0d1584bd79d159a0b0602aea

  • SHA512

    19254d21228497ea2adc596cc597e54448d1dd6ded4990ebd153b519af196bf9c84321272c4d94c535d18bb1a655e80a856f4cedb4b3ab6e49858b744dcb0eb9

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Indicator Removal: Clear Persistence 1 TTPs 2 IoCs

    remove IFEO.

  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Re-Loader Activator 3.0 2\SetupComplete.cmd"
    1⤵
    • Deletes itself
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\Re-Loader Activator 3.0 2\[email protected]
      "C:\Users\Admin\AppData\Local\Temp\Re-Loader Activator 3.0 2\[email protected]" /ActAuto /RestorePoint /Logo=AutoDetect
      2⤵
      • Event Triggered Execution: Image File Execution Options Injection
      • Indicator Removal: Clear Persistence
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Users\Admin\AppData\Local\Temp\Re-Loader\OEM\brset.exe
        "C:\Users\Admin\AppData\Local\Temp\Re-Loader\OEM\brset.exe" /nt60 SYS /force
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1928
      • C:\Users\Admin\AppData\Local\Temp\Re-Loader\OEM\bootsect.exe
        "C:\Users\Admin\AppData\Local\Temp\Re-Loader\OEM\bootsect.exe" /nt52 SYS /force
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1948
      • C:\Windows\System32\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im SppSvc
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2256
      • C:\Windows\System32\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im OsppSvc
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:588
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" delete KMS-R@1n
        3⤵
        • Launches sc.exe
        PID:2568
      • C:\Windows\System32\netsh.exe
        "C:\Windows\System32\netsh.exe" advfirewall firewall delete rule name="KMS-R@1n"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:1140
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" stop hkmsvc
        3⤵
        • Launches sc.exe
        PID:996
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" delete hkmsvc
        3⤵
        • Launches sc.exe
        PID:492
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" create "KMS-R@1n" DisplayName= KMS-R@1n binPath= "C:\Windows\[email protected]" obj= "NT Authority\NetworkService" type= "own" error= "normal" start= "auto" depend= "RpcSs/tcpip"
        3⤵
        • Launches sc.exe
        PID:620
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" description "KMS-R@1n" "v3.0 Beta 2"
        3⤵
        • Launches sc.exe
        PID:1820
      • C:\Windows\System32\netsh.exe
        "C:\Windows\System32\netsh.exe" advfirewall firewall delete rule name="KMS-R@1n"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:860
      • C:\Windows\System32\netsh.exe
        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="KMS-R@1n" dir=in program="C:\Windows\[email protected]" localport=1688 protocol=TCP action=allow remoteip=any
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:1052
      • C:\Windows\System32\netsh.exe
        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="KMS-R@1n" dir=out program="C:\Windows\[email protected]" localport=1688 protocol=TCP action=allow remoteip=any
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        PID:3036
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /F /TN "\R@1n-KMS\Office14ProPlus" /SC minute /MO 1 /TR "wmic path OfficeSoftwareProtectionProduct where (ID='6f327760-8c5c-417c-9b61-836a98287e0c') call Activate" /ru "SYSTEM"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2764
      • C:\Windows\System32\shutdown.exe
        "C:\Windows\System32\shutdown.exe" /r /t 1
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:676
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2784
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003E4" "0000000000000598"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2304
  • [email protected] "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
      "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
      2⤵
        PID:276
    • [email protected] C:\Windows\system32\sppsvc.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\system32\sppsvc.exe
        C:\Windows\system32\sppsvc.exe
        2⤵
        • Drops file in Windows directory
        PID:2536
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:756
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:1152

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\Re-Loader\OEM\bootsect.exe

                Filesize

                95KB

                MD5

                d7701bacc5d02e9c75d22aa3ecd5db93

                SHA1

                53d7c5a012877d1e8ce3026cdfd4c6d8eba18d61

                SHA256

                2d4e0a0003a8c4c236d1ec69ce764c2d503f5f03836c7a08bad38b573440cb5b

                SHA512

                2539691014987d89589a06928ecb9a4f1f634d76de7d4d3f477cca99be1a924b0dad6a5516f6cdd5e02342da26a32dc60f9aec8ee68101a1e48330e5ab90786a

              • C:\Users\Admin\AppData\Local\Temp\Re-Loader\OEM\brset.exe

                Filesize

                95KB

                MD5

                9594bc046765df20f4ac8ded4d1dd5d8

                SHA1

                95de0064b529d0ee2a0bc786d3511a9376352847

                SHA256

                4c457232dd4b8e3589f2f38f705089baf568b1e9ec1554a0a3022b39f4286e76

                SHA512

                5c1110603239d314ad8216e3503ecb78f40d2c286810e4af7944ab4fdb0591e96a64268d545cd950696651e2a4e85529f1220a188cf7013db827d8fa23a5a6b1

              • C:\Windows\[email protected]

                Filesize

                25KB

                MD5

                0f9fd9565e6eb157fa9be11ed9c1dc9f

                SHA1

                ffd767312eb98685aec289b97e3768559767ee86

                SHA256

                7565255f0a28d065f8f30f876e7df3e46ef2e6fedf420eca7d454cf49887b2de

                SHA512

                d76b375a790271a8d88004e02b827f98afc2cbaaa76d20dc7e3aa9ce7dc1582f125e120950fe84722fc113fc6835cd850cdc513be2d3c488e9f357f14f90835c

              • C:\Windows\[email protected]

                Filesize

                4KB

                MD5

                a2f93b21413115c31260975c35ec4e4c

                SHA1

                21809876fc990326f4d5de834bf16fe844893493

                SHA256

                5197323ddee0141ca9c433d3860e5e7b0193c0821d9e5278d8e5f6ea0523c322

                SHA512

                9ae1caac963a3048c87de01ff260061686aabd5d33da14992beb5562cf2c439b6ed6a3d8907f270a603cfe91322812d5d2ae345fe4806eae88364855aab31fce

              • C:\Windows\[email protected]

                Filesize

                5KB

                MD5

                dc30cfd21bbb742c10e3621d5b506780

                SHA1

                ffc5574a43121acdb27b9ed001cd9edf27cfc769

                SHA256

                484c74d529eb1551fc2ddfe3c821a7a87113ce927cf22d79241030c2b4a4aa74

                SHA512

                6acc15363fe596d71d2328ac2021e253cbb7be6983dfbd9d91f2fc7a45c26dbe5ec9be3a1d79ccd1e4976f686cf0582eae59a28335dc3ae5ab8fc3b380bb65c2

              • \Device\HarddiskVolume1\FMJES

                Filesize

                322KB

                MD5

                49864d91eda705bb680af048d74ad0a5

                SHA1

                8c08aea642da143b9f75dfa15c5f38519f4c5149

                SHA256

                730df9b3ffb7d69476d81ef8a20d4f845797b0344233f9c49eb962a378f7518c

                SHA512

                1d83450a489a129e657f7b719c6fd9c87130479a489d93459d650d970ddefc78573d587388493233a5c108e55654195acab0887f73382132ac462bd8df4a5e71

              • memory/276-37-0x0000000000060000-0x0000000000061000-memory.dmp

                Filesize

                4KB

              • memory/276-45-0x000007FEF7690000-0x000007FEF7695000-memory.dmp

                Filesize

                20KB

              • memory/3024-5-0x000007FEF56C0000-0x000007FEF60AC000-memory.dmp

                Filesize

                9.9MB

              • memory/3024-4-0x000007FEF56C0000-0x000007FEF60AC000-memory.dmp

                Filesize

                9.9MB

              • memory/3024-0-0x000007FEF56C3000-0x000007FEF56C4000-memory.dmp

                Filesize

                4KB

              • memory/3024-28-0x000007FEF56C3000-0x000007FEF56C4000-memory.dmp

                Filesize

                4KB

              • memory/3024-30-0x000007FEF56C0000-0x000007FEF60AC000-memory.dmp

                Filesize

                9.9MB

              • memory/3024-31-0x000007FEF56C0000-0x000007FEF60AC000-memory.dmp

                Filesize

                9.9MB

              • memory/3024-3-0x000007FEF56C0000-0x000007FEF60AC000-memory.dmp

                Filesize

                9.9MB

              • memory/3024-2-0x000000001ADE0000-0x000000001B5A0000-memory.dmp

                Filesize

                7.8MB

              • memory/3024-1-0x00000000002D0000-0x00000000002E0000-memory.dmp

                Filesize

                64KB

              • memory/3024-42-0x000007FEF56C0000-0x000007FEF60AC000-memory.dmp

                Filesize

                9.9MB