Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
IMG2110EJPG.exe
Resource
win7-20240903-en
General
-
Target
IMG2110EJPG.exe
-
Size
180KB
-
MD5
91575475845a413145f40a52aa0dbdbe
-
SHA1
77ede321de2e4b5c8ed35b6021761e6a28d7c4ae
-
SHA256
31ff1c7b6a573ad6c9294d272f84a4a7c8b4f1fa0029fdaba9c40a854294fc46
-
SHA512
69915cbed1a8a6892992a5f977ab0b01aae6e41ec21be5c1146f680612bdd3a6c6c06f4e5ced548c8b59c0087cf83f23f2df111b0f9451f1e2e86c5c1dc85bac
-
SSDEEP
3072:pD+8YTx96HM0XU+aDe5UEjmIlmijI7rUGimMNw7qU5lTYpMoYrrrrKFfA4MEzWrY:F+tRn+aC1meyUGimMNhpMohW4JzW4x
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 IMG2110EJPG.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG2110EJPG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key IMG2110EJPG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ IMG2110EJPG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" IMG2110EJPG.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2732 reg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2256 IMG2110EJPG.exe 2256 IMG2110EJPG.exe 2256 IMG2110EJPG.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2744 2256 IMG2110EJPG.exe 29 PID 2256 wrote to memory of 2744 2256 IMG2110EJPG.exe 29 PID 2256 wrote to memory of 2744 2256 IMG2110EJPG.exe 29 PID 2256 wrote to memory of 2744 2256 IMG2110EJPG.exe 29 PID 2744 wrote to memory of 2732 2744 cmd.exe 32 PID 2744 wrote to memory of 2732 2744 cmd.exe 32 PID 2744 wrote to memory of 2732 2744 cmd.exe 32 PID 2744 wrote to memory of 2732 2744 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG2110EJPG.exe"C:\Users\Admin\AppData\Local\Temp\IMG2110EJPG.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1