Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 06:35

General

  • Target

    7681ce2d372a70dfa4acbe6736edbf8ecf43b99f20cadda24596d7d9ee2bc7c0N.exe

  • Size

    9.2MB

  • MD5

    90d4eeb13d02455640cca508b2a0cc40

  • SHA1

    f85f1749ffd854e8f7862f10a6a54423e63ec39b

  • SHA256

    7681ce2d372a70dfa4acbe6736edbf8ecf43b99f20cadda24596d7d9ee2bc7c0

  • SHA512

    6cfc0f987fe1f86cacd2302fd0f732f8c2725646b615c8fd1990db79db59af3b20342257edfc2e6680f7c8bba0ebe2eaed021c1ee036f746c6e0ad8ba947665f

  • SSDEEP

    6144:IriTOeUceEZPVB18RdCqdomsKAgh/lI86JQPDHDdx/Qtqx:phZdv8R0qRsKAg9lIPJQPDHvd

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 27 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7681ce2d372a70dfa4acbe6736edbf8ecf43b99f20cadda24596d7d9ee2bc7c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7681ce2d372a70dfa4acbe6736edbf8ecf43b99f20cadda24596d7d9ee2bc7c0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Hijack Execution Flow: Executable Installer File Permissions Weakness
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\ntwyjs.exe
      "C:\Users\Admin\AppData\Local\Temp\ntwyjs.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • System Location Discovery: System Language Discovery
      • System policy modification
      PID:2092
    • C:\Users\Admin\AppData\Local\Temp\ntwyjs.exe
      "C:\Users\Admin\AppData\Local\Temp\ntwyjs.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Impair Defenses: Safe Mode Boot
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\mppowcafdkaipqfqzforrqyec.fmc

    Filesize

    268B

    MD5

    f71e6d96650d349b09ba56b4441b7324

    SHA1

    ec0a2d2f9e783a4a78adc91e7bc6355907ed3160

    SHA256

    081170545c78ec27814f5380855b5e81958222683aa42ec826ba96431e070d57

    SHA512

    9610b911124f1092a92f1673b79bdda93e1e6391b907a85211137dfdf7c11e7d054472c61caa31b2da00b8193d1a0b2c598d715022216232bf50f2e0ce35c6e7

  • C:\Program Files (x86)\mppowcafdkaipqfqzforrqyec.fmc

    Filesize

    268B

    MD5

    8fefd52e98676e422272cadf0a2c7e75

    SHA1

    69ac15afd1df2ecf2dadb28a8a592dedcdbfcc02

    SHA256

    20dc961c517176c7258c204e4e37e6f3df6e4d2346a3c6a7ac190350c6444965

    SHA512

    40d79d872fd28d7992b46681868451811959f95af653d217408e5e8246cb959fbce7a29ac1be9ca75daae4ff7e6a2eb2e21049b58632b6da213c38bb64ffcba8

  • C:\Program Files (x86)\mppowcafdkaipqfqzforrqyec.fmc

    Filesize

    268B

    MD5

    ef0d3da930d3c1aa8bb0656184064b32

    SHA1

    4590c23c1f49dfe14b5e987c24381bf73f73313a

    SHA256

    763b02b3b52963c589a42c6b1f0ef3936b5cd7f1b740239b70bf36d7538add7f

    SHA512

    6c54fa92577a58607c104a61b5494167f445491c1ece030ff204968cbb2a01d07a2576e00d51beba1d9ee024ff8a140c8c06558381d1493e498f610e196722b9

  • C:\Users\Admin\AppData\Local\Temp\ntwyjs.exe

    Filesize

    11.4MB

    MD5

    27ebe7f8704c5a188e09e8a59f6cd954

    SHA1

    8a20814c7097def3d1597c809a7fc5cbfe49e91e

    SHA256

    23fc4d9ed795971bfb65d6bd53e7dfaa81e301713fe63dca4fe836767086d028

    SHA512

    1457dad3079e976dc64579a951f81c79ac5728811a94d60e2e138cb3e951651cf07e977347bf4024cda16d66b33a74c4e9853dd656f5178fed10811098604409

  • C:\Users\Admin\AppData\Local\mppowcafdkaipqfqzforrqyec.fmc

    Filesize

    268B

    MD5

    dbbe1867060bbac98cfe75b87b153673

    SHA1

    e6aa33077ef0e6ab43eaf399f6c580db0a756b39

    SHA256

    d88edf9db05ba570afb7ef144ca00532b864a96e24297c1de6ce34c7205a5e74

    SHA512

    f149dcdc2e59cbb53b900e67b5a23f7c3237ac0e0f633bc471291d28ec4e741a2f51e61d27e5d4740f3a2aa068a39cded5c79f9d32fe2afbe9b2d6879bbe82a3

  • C:\Users\Admin\AppData\Local\mppowcafdkaipqfqzforrqyec.fmc

    Filesize

    268B

    MD5

    d8b8ea9c31894b5f8cf873d42b66fa41

    SHA1

    b190e9b254c5c03b669f0fbb9a8ff6fe0196867f

    SHA256

    b5d424041b2e127877dfce657a4ed583a5cbc1699cc56a9f6e6b3aefd956fdbc

    SHA512

    9ae1c1aad535337fd54fc6b3f39cd233cb4d5dc9892ffe5db20463bd605b65c40bd108f9b334cbe35a35ca16a236080b9c908bf574c23e6d2e3a4f5ada7b08b6

  • C:\Users\Admin\AppData\Local\mppowcafdkaipqfqzforrqyec.fmc

    Filesize

    268B

    MD5

    c4d1ed8d9e90849c0068c61df0757afe

    SHA1

    0d336fe4eb5e48c44bb80f509f6c08bb48a491c4

    SHA256

    748b88ee694d8826f4c1bb60d63efad033335b137deff9482fe0ed5b982b66ee

    SHA512

    7a3287e61252cfe9237348f29a0c6d1a1acc4b0ab33ef3cf790bed4afaffa85fa4398de086912a1ab389b05e1fc593b8c46c1e33a199ed493c641b998d8b89ce

  • C:\Users\Admin\AppData\Local\mppowcafdkaipqfqzforrqyec.fmc

    Filesize

    268B

    MD5

    3b4cb85f33d68ab6c8c2ab1b45e52b83

    SHA1

    db3d196a7de29ddc217e9110c8a8deae575d766f

    SHA256

    fb1543a345db21cd2b50a5f37e0216021d6c4f9d913763b93f29aeaa2de973fb

    SHA512

    bff515e4db91d83883e851affada69501c6684aba10f2ef8d1c4b0fe0daba0404e71b1d31e0f4cd8a7e75d38015146370e10837956d3297ac5d78d7d0a0e6b2c

  • C:\Users\Admin\AppData\Local\mppowcafdkaipqfqzforrqyec.fmc

    Filesize

    268B

    MD5

    03f0887e192e129a4e094869138fd667

    SHA1

    7065b96d437864e9783f83300ba84d9b1d9f75b9

    SHA256

    b5f8fc29f5bc7518849d9e1f151e0ffbf1c815f26b5b0719d1cc8d2b61541d90

    SHA512

    f4e4e97c2fdc78b7b3e179002a2d8c285aafaf9d2febc4ccc58bb151bd953e29e8f1b9e6650472c7cb81e524192b0ae85a623f68926c09d1889be7bed2eb01c1

  • C:\Users\Admin\AppData\Local\rfqatktjsklewiieypjxislclbkcdwoaawqh.pak

    Filesize

    3KB

    MD5

    537d71f41602d70c359f0a1b00b62b00

    SHA1

    10522c5edc66a9f73af11adecf5d6bda0daba062

    SHA256

    8b31d61d016118878f3632edc9b45b9137ca470b2ee5de831438a56ca59a10d8

    SHA512

    cd8ee886f7c6ae33e54f7696cc7c0a4c66899bc98a0c8f1025d99c54df56510f87814bc7f1e2db84d097c4c140af9e87717dd907cd0e5ceb2db49a9774b5be0c