Analysis
-
max time kernel
118s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 12:31
Behavioral task
behavioral1
Sample
7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe
Resource
win10v2004-20240802-en
General
-
Target
7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe
-
Size
102KB
-
MD5
b99fd966a29774fec7076fa33ec19100
-
SHA1
d15f8f6e68befb5d76ea73d489b2dfd6f3cf1ac3
-
SHA256
7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201b
-
SHA512
b98d84fc128414ac912fe03fd594136a1874728f02814fa32e300a8c11907144d50e24facb3927af319629c3b68ae55671a0deae1b6845a119731301cb7b611d
-
SSDEEP
3072:xFphTfm1UC7AdYzrV+Dljy/32ubwZZqJ:FhTfmuCkdYzrVolu/J0ZZ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3404 WindowsService.exe 836 WindowsService.exe 3100 WindowsService.exe -
Loads dropped DLL 5 IoCs
pid Process 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\SystemWindows\\WindowsService.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2432 set thread context of 3164 2432 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 30 PID 3404 set thread context of 836 3404 WindowsService.exe 35 PID 3404 set thread context of 3100 3404 WindowsService.exe 36 -
resource yara_rule behavioral1/memory/2432-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2432-25-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2432-80-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2432-164-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2432-121-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2432-78-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3164-447-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2432-450-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x002b000000015cca-475.dat upx behavioral1/memory/3164-477-0x0000000003200000-0x000000000323B000-memory.dmp upx behavioral1/memory/3164-494-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3164-496-0x0000000003200000-0x000000000323B000-memory.dmp upx behavioral1/memory/3404-1014-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/3164-1047-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3404-1044-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/836-1050-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsService.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe Token: SeDebugPrivilege 836 WindowsService.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2432 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 3404 WindowsService.exe 836 WindowsService.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2432 wrote to memory of 3164 2432 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 30 PID 2432 wrote to memory of 3164 2432 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 30 PID 2432 wrote to memory of 3164 2432 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 30 PID 2432 wrote to memory of 3164 2432 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 30 PID 2432 wrote to memory of 3164 2432 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 30 PID 2432 wrote to memory of 3164 2432 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 30 PID 2432 wrote to memory of 3164 2432 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 30 PID 2432 wrote to memory of 3164 2432 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 30 PID 3164 wrote to memory of 3328 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 31 PID 3164 wrote to memory of 3328 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 31 PID 3164 wrote to memory of 3328 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 31 PID 3164 wrote to memory of 3328 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 31 PID 3328 wrote to memory of 3380 3328 cmd.exe 33 PID 3328 wrote to memory of 3380 3328 cmd.exe 33 PID 3328 wrote to memory of 3380 3328 cmd.exe 33 PID 3328 wrote to memory of 3380 3328 cmd.exe 33 PID 3164 wrote to memory of 3404 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 34 PID 3164 wrote to memory of 3404 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 34 PID 3164 wrote to memory of 3404 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 34 PID 3164 wrote to memory of 3404 3164 7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe 34 PID 3404 wrote to memory of 836 3404 WindowsService.exe 35 PID 3404 wrote to memory of 836 3404 WindowsService.exe 35 PID 3404 wrote to memory of 836 3404 WindowsService.exe 35 PID 3404 wrote to memory of 836 3404 WindowsService.exe 35 PID 3404 wrote to memory of 836 3404 WindowsService.exe 35 PID 3404 wrote to memory of 836 3404 WindowsService.exe 35 PID 3404 wrote to memory of 836 3404 WindowsService.exe 35 PID 3404 wrote to memory of 836 3404 WindowsService.exe 35 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36 PID 3404 wrote to memory of 3100 3404 WindowsService.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe"C:\Users\Admin\AppData\Local\Temp\7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe"C:\Users\Admin\AppData\Local\Temp\7dfd9e721fb55f610e6465d61f50daa5172a00253482cd7717bab52ccf8e201bN.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GRWSG.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3380
-
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:836
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3100
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5f6a90c20834f271a907a4e2bc28184c2
SHA136c9d1602b74f622346fbb22693597d7889df48d
SHA25673f29cd953eee40cea4de67842556ffd96efe8094a6a9b70f33a35df2582febd
SHA51239cabae19fe1faa37455e4bd242c868be60d6252b07f01224b3f7501c3cf734e503300b840d83381a452707cab6df2f95f920655884be56d4024676b26943804
-
Filesize
102KB
MD57fb721769412eb50649e4c343fbb348b
SHA14cd2dc6cbc6cb107479158aa780e0c9630e9becd
SHA2569e52268756ceef104d91404fe4b2939798d7bdd2abf20de7b174a4ad9bc6277e
SHA5120166dfe17654b62f0e50bcd1193fbb667e1f334c5d21c6f8c4f434dbfcd5240cc13af21634cb7c6874d59661245f46125f8137969e74aedc93694a98056f25c7