Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 04:03
Behavioral task
behavioral1
Sample
e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe
Resource
win7-20240903-en
8 signatures
150 seconds
General
-
Target
e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe
-
Size
114KB
-
MD5
4fe6be2c29ea60ddd0f813cfa8c00f2c
-
SHA1
06e7fbea32b780b48a703f38b1623d037d89fd1d
-
SHA256
e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8
-
SHA512
0636d2781a19a55901a5013cb4ac50d27b5ab196e2f9a16f381adb3b14f0c3a73ed13370b3451792dc0c2636a1ab62d3f2c0d0d7ffdf02ad27f0360fb2d087a4
-
SSDEEP
3072:BOEY4TjVzg8252TDH+U0p+Cjey9NxOjCzYsKF8ftX:B1Y4TZg8ZH+U0hj19NxECzYBKl
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\MSASCui.exe = "C:\\Users\\Admin\\AppData\\Roaming\\MSASCui.exe:*:Enabled:Windows Messanger" reg.exe -
resource yara_rule behavioral1/memory/2532-0-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-6-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-7-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-8-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-10-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-11-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-12-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-14-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-16-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-19-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-22-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2532-24-0x0000000000400000-0x000000000045E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2732 reg.exe 2768 reg.exe 2256 reg.exe 2772 reg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeCreateTokenPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeAssignPrimaryTokenPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeLockMemoryPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeIncreaseQuotaPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeMachineAccountPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeTcbPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeSecurityPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeTakeOwnershipPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeLoadDriverPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeSystemProfilePrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeSystemtimePrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeProfSingleProcessPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeIncBasePriorityPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeCreatePagefilePrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeCreatePermanentPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeBackupPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeRestorePrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeShutdownPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeDebugPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeAuditPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeSystemEnvironmentPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeChangeNotifyPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeRemoteShutdownPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeUndockPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeSyncAgentPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeEnableDelegationPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeManageVolumePrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeImpersonatePrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeCreateGlobalPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: 31 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: 32 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: 33 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: 34 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: 35 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe Token: SeDebugPrivilege 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2008 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 31 PID 2532 wrote to memory of 2008 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 31 PID 2532 wrote to memory of 2008 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 31 PID 2532 wrote to memory of 2008 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 31 PID 2532 wrote to memory of 2076 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 32 PID 2532 wrote to memory of 2076 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 32 PID 2532 wrote to memory of 2076 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 32 PID 2532 wrote to memory of 2076 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 32 PID 2532 wrote to memory of 2092 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 33 PID 2532 wrote to memory of 2092 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 33 PID 2532 wrote to memory of 2092 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 33 PID 2532 wrote to memory of 2092 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 33 PID 2532 wrote to memory of 2984 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 35 PID 2532 wrote to memory of 2984 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 35 PID 2532 wrote to memory of 2984 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 35 PID 2532 wrote to memory of 2984 2532 e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe 35 PID 2076 wrote to memory of 2768 2076 cmd.exe 40 PID 2076 wrote to memory of 2768 2076 cmd.exe 40 PID 2076 wrote to memory of 2768 2076 cmd.exe 40 PID 2008 wrote to memory of 2256 2008 cmd.exe 39 PID 2076 wrote to memory of 2768 2076 cmd.exe 40 PID 2008 wrote to memory of 2256 2008 cmd.exe 39 PID 2008 wrote to memory of 2256 2008 cmd.exe 39 PID 2008 wrote to memory of 2256 2008 cmd.exe 39 PID 2984 wrote to memory of 2732 2984 cmd.exe 41 PID 2984 wrote to memory of 2732 2984 cmd.exe 41 PID 2984 wrote to memory of 2732 2984 cmd.exe 41 PID 2984 wrote to memory of 2732 2984 cmd.exe 41 PID 2092 wrote to memory of 2772 2092 cmd.exe 42 PID 2092 wrote to memory of 2772 2092 cmd.exe 42 PID 2092 wrote to memory of 2772 2092 cmd.exe 42 PID 2092 wrote to memory of 2772 2092 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe"C:\Users\Admin\AppData\Local\Temp\e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe:*:Enabled:Windows Messanger" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\e3a3e9e14b44fc3d480b777cd8b08139160eebe50379a67eeeff8d264f2a65e8.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\MSASCui.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MSASCui.exe:*:Enabled:Windows Messanger" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\MSASCui.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MSASCui.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2732
-
-