Overview
overview
10Static
static
70b42c766b0...32.exe
windows7-x64
1011f9bb7186...6b.exe
windows7-x64
3childmoney.exe
windows7-x64
31c281ece6f...2a.exe
windows7-x64
332bb88fa59...4b.exe
windows7-x64
35056cbe553...3d.exe
windows7-x64
350e0f20cb3...69.exe
windows7-x64
657bbc27030...7b.exe
windows7-x64
365a84ff98e...02.exe
windows7-x64
106db6ac1ce8...be.exe
windows7-x64
1072745efc42...46.exe
windows7-x64
10751fb51baa...fe.exe
windows7-x64
1095e95a5be0...63.exe
windows7-x64
3a935725900...07.exe
windows7-x64
3c190931380...74.dll
windows7-x64
3dafc6c03ef...19.exe
windows7-x64
1e3c6c48ba7...87.exe
windows7-x64
10edbb453cc0...46.exe
windows7-x64
5f633e6f255...4b.exe
windows7-x64
fda537bc5e...ad.exe
windows7-x64
3Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 19:18
Behavioral task
behavioral1
Sample
0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11f9bb7186adbefb2633904f1626b20f3f8d0d3ecb98e55a3a81e6a17039786b.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
childmoney.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
1c281ece6f6be8983f6f858636ddf9169dcb00ec2c0a98d0797bf8d3619cb22a.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
32bb88fa592ba0f338d58730d224728823684134157afe5892f5bbd8c042d54b.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
5056cbe5539d0e171c81451306f2a970b43a6039dd847316a96f24be7b19453d.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
50e0f20cb3844c6b0ddc4af01daf274b7ebdddd0d322f06f05b7d6fec7c16869.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
57bbc27030a7c47b62aa08d6d05b6c7eee36010246260924ed6b85ff7e53917b.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
65a84ff98e09a002d01b1c2935ca603125c8ddcb5c5824da9cc60787594a5202.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
6db6ac1ce8f946e0b441c1a1be1b0f094cef331231ae4f9d58b30e3e353145be.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
72745efc423d4adb76434360755cfbc3cfe8fa47ba8e5fa2920ada7dc9ceb146.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
751fb51baa5a4ed44c9c2bb45b824831914025e87d4d866e5861a38f734d8bfe.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
95e95a5be0b57cee969c5d9f616be2e973bc08a77482c75570936faaaaa35063.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
a935725900d1ad19b92bcda1c0d612bccccd8bba53dd6e13cabe6d59d7874607.exe
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
c19093138028ea6a6a6665e270c36558757931f1d7f6f88910b08e39903a1774.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
dafc6c03ef671f66ddbe47e6eee600d2dfa894eee1c1b67d51d3a24532f58e19.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
e3c6c48ba7d213e5c5c31f43d70dc4ca1709fc29e06883f64487ad049a520b87.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
edbb453cc08e8ac79d0c60c0f1ca3803060e8c3a4dd2e2a7b40c50ec3fb0dd46.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
fda537bc5e4051c8c69491089041df58483e31f410f180c5767901a53a67f9ad.exe
Resource
win7-20240903-en
General
-
Target
0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe
-
Size
112KB
-
MD5
f004f9006a9593085ea7b8137b1a49b0
-
SHA1
f934c59beed0e2ce22f7e599ca044896891e6b50
-
SHA256
0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232
-
SHA512
a92dd14212f3e2bfcb28367156dcb1812e127f36d7d20000a1f9e2349f9d9cc7576672dbdcbb8bd0834a6eb06ff8ef4b039483c63c3aae5aab7e2aad1b95e345
-
SSDEEP
1536:nUYy7yep5ACr/BTHVrWRNUFhipHo6JiAXE7ddHQ:Eyep5AKIRTjpE7ddH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1540 netsh.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update = "C:\\Windows\\dllhost.exe" 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\dllhost.exe 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe File opened for modification C:\Windows\dllhost.exe 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1540 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 29 PID 2796 wrote to memory of 1540 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 29 PID 2796 wrote to memory of 1540 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 29 PID 2796 wrote to memory of 1540 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 29 PID 2796 wrote to memory of 3008 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 30 PID 2796 wrote to memory of 3008 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 30 PID 2796 wrote to memory of 3008 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 30 PID 2796 wrote to memory of 3008 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 30 PID 2796 wrote to memory of 2972 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 31 PID 2796 wrote to memory of 2972 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 31 PID 2796 wrote to memory of 2972 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 31 PID 2796 wrote to memory of 2972 2796 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe 31 PID 2972 wrote to memory of 2672 2972 net.exe 35 PID 2972 wrote to memory of 2672 2972 net.exe 35 PID 2972 wrote to memory of 2672 2972 net.exe 35 PID 2972 wrote to memory of 2672 2972 net.exe 35 PID 3008 wrote to memory of 2816 3008 net.exe 36 PID 3008 wrote to memory of 2816 3008 net.exe 36 PID 3008 wrote to memory of 2816 3008 net.exe 36 PID 3008 wrote to memory of 2816 3008 net.exe 36 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe"C:\Users\Admin\AppData\Local\Temp\0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2796 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Windows\SysWOW64\net.exenet stop security center2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop security center3⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\net.exenet stop WinDefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5