Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
oztye8a3t88nb35f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
oztye8a3t88nb35f.exe
Resource
win10v2004-20241007-en
General
-
Target
oztye8a3t88nb35f.exe
-
Size
10.1MB
-
MD5
7d1755e8e41a6c2f08d2faeffdf9dad1
-
SHA1
c04d89f1054f2ee34b548126a5add4eee4751ae4
-
SHA256
44cf4321c138c4cacecc95deba735f508c96049e7f0e8f0538684dc4f0c1e9a5
-
SHA512
b099238838b0d8b258529126b3c279ac735feff778d52c3117eb3cd587267a145a09bc1317fb412b2c810ea8b2232a8218fe459e33ac99f9b48decfdc62e4816
-
SSDEEP
196608:PE1LTxbO313norADHLHhHiVulZ/KHNV4G:PyxbOFC8b/KtV4
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Executes dropped EXE 3 IoCs
pid Process 476 Process not Found 2984 main.exe 3000 main.exe -
Loads dropped DLL 23 IoCs
pid Process 476 Process not Found 2984 main.exe 2984 main.exe 2984 main.exe 2984 main.exe 2984 main.exe 2984 main.exe 2984 main.exe 2984 main.exe 2984 main.exe 2984 main.exe 476 Process not Found 476 Process not Found 3000 main.exe 3000 main.exe 3000 main.exe 3000 main.exe 3000 main.exe 3000 main.exe 3000 main.exe 3000 main.exe 3000 main.exe 3000 main.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2752 icacls.exe 2736 icacls.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 151 ip-api.com -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1936 sc.exe 2856 sc.exe 2540 sc.exe 2480 sc.exe -
Kills process with taskkill 1 IoCs
pid Process 3028 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3028 taskkill.exe Token: SeRestorePrivilege 2752 icacls.exe Token: SeSecurityPrivilege 2736 icacls.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3028 2248 oztye8a3t88nb35f.exe 30 PID 2248 wrote to memory of 3028 2248 oztye8a3t88nb35f.exe 30 PID 2248 wrote to memory of 3028 2248 oztye8a3t88nb35f.exe 30 PID 2248 wrote to memory of 2540 2248 oztye8a3t88nb35f.exe 33 PID 2248 wrote to memory of 2540 2248 oztye8a3t88nb35f.exe 33 PID 2248 wrote to memory of 2540 2248 oztye8a3t88nb35f.exe 33 PID 2248 wrote to memory of 2480 2248 oztye8a3t88nb35f.exe 35 PID 2248 wrote to memory of 2480 2248 oztye8a3t88nb35f.exe 35 PID 2248 wrote to memory of 2480 2248 oztye8a3t88nb35f.exe 35 PID 2248 wrote to memory of 1936 2248 oztye8a3t88nb35f.exe 37 PID 2248 wrote to memory of 1936 2248 oztye8a3t88nb35f.exe 37 PID 2248 wrote to memory of 1936 2248 oztye8a3t88nb35f.exe 37 PID 2248 wrote to memory of 2856 2248 oztye8a3t88nb35f.exe 39 PID 2248 wrote to memory of 2856 2248 oztye8a3t88nb35f.exe 39 PID 2248 wrote to memory of 2856 2248 oztye8a3t88nb35f.exe 39 PID 2248 wrote to memory of 2752 2248 oztye8a3t88nb35f.exe 42 PID 2248 wrote to memory of 2752 2248 oztye8a3t88nb35f.exe 42 PID 2248 wrote to memory of 2752 2248 oztye8a3t88nb35f.exe 42 PID 2248 wrote to memory of 2736 2248 oztye8a3t88nb35f.exe 44 PID 2248 wrote to memory of 2736 2248 oztye8a3t88nb35f.exe 44 PID 2248 wrote to memory of 2736 2248 oztye8a3t88nb35f.exe 44 -
cURL User-Agent 1 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 152 curl/8.4.0
Processes
-
C:\Users\Admin\AppData\Local\Temp\oztye8a3t88nb35f.exe"C:\Users\Admin\AppData\Local\Temp\oztye8a3t88nb35f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\taskkill.exetaskkill.exe /F /FI "SERVICES eq RDP-Controller"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\system32\sc.exesc.exe stop RDP-Controller2⤵
- Launches sc.exe
PID:2540
-
-
C:\Windows\system32\sc.exesc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore2⤵
- Launches sc.exe
PID:2480
-
-
C:\Windows\system32\sc.exesc.exe failure RDP-Controller reset= 1 actions= restart/100002⤵
- Launches sc.exe
PID:1936
-
-
C:\Windows\system32\sc.exesc.exe start RDP-Controller2⤵
- Launches sc.exe
PID:2856
-
-
C:\Windows\system32\icacls.exeicacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-182⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\system32\icacls.exeicacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.acl2⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeC:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984
-
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeC:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456B
MD540ab00517f4227f2c3c334f1d16b65b4
SHA1f8d57af017e2209b4fb24122647fd7f71b67c87c
SHA2564baf4b78d05a28af7dee7dbbce2b4edf6053d9239c1756c932be9f2feee4ef85
SHA51275d74306f043b864295f09a60c19a43494c226664733c99318989ce5c22cb9395bb407fb5c8c0268ad9184a79813304ed5fc943a6b53db54f5f225cda31650e3
-
Filesize
848B
MD5888087d6a4cbbc7f5e60acff356ffd2f
SHA131838f510ec2f8596d8561db99ed96a4d8f7d6d4
SHA2560c145fbeb1cfa59847a799c1fc168cbefefcf4760aebcd48996b41e16f78bcdd
SHA512cbe347c973e3b503df43898b1bc5da7f4c8e0847414bad99a5e7a45d13b79506df542a457e9f9a9ac06ad1971fe443b0574a2541d04f0690953a8bbd47000d02
-
Filesize
214B
MD526702faab91b6b144715714a96728f39
SHA1cbdc34fc8fd3559cd49475fb5bc76176a5f88ff8
SHA25683d30846dd5576de38a512b17163419d22ff35f2f5b0fe613c401e8a5a25b7a4
SHA51250d35d3dcd60b6e57c1a277e6c3e7afbb5c2b46425732fc5a9fd3c0a55febf5ab3f05411a83cec230aac40199774ff78f30848d57d1e04a11b9e60777b038289
-
Filesize
102KB
MD57a8e8a0842d8d65713dee5393e806755
SHA1af6f3a52009fbf62c21a290efc34a94c151b683e
SHA25651c131081921626d22faf44977d5e4dcfe00e5d6cddeda877a82f13631be7c2e
SHA512d1b8d93b7efbeaa348d3a01293ad5d92bc8f28eb2554df5e6e71506d00d135390082c52c18d0bc3f0439b068777d8b2c43aaed930c72e5ffab2593eeac470cf4
-
Filesize
955B
MD576e31550268fb1a5fa7ae4d2ecb2dacf
SHA117df17f4763c286ecfd3018f762758d48e6724ef
SHA25650bd5039f8c5122ed04b1511d05e6e67639fd78c437f8e3c4b65fa5478d32794
SHA512cf690a865d846149a0df527189c2370e4cb622cd77c4dede26e7bd5ab84abd4ef5a4fed03d84fd6006eba0e5bc7a5db0be319b22a4ed121e1e5df0f03ee133d3
-
Filesize
90KB
MD5fdcf93acd089b505b524ddfa0ff947f9
SHA1a2bada5807ba001758dbce46da634332a5cc14c2
SHA256adfe373f98cabf338577963dcea279103c19ff04b1742dc748b9477dc0156bb4
SHA512110455dc5c3f090a1341ee6d09d9b327cd03999c70d4a2c0b762b91bc334b0448e750cb1fd7b34ce729b8e1cd33b55a4e1fa1187586c2ff8850b2fd907afe03e
-
Filesize
924B
MD52313d4bbe152f9255585db1ac142bf79
SHA1e1595f542d4c79fd2906a354e83c6223139e01d4
SHA25675bc67087f0f91ba30932b55ae28088b60e9f81ba6d6d1b9cbf84ccfbb8f40b5
SHA5120407e74a9820f8c3c1934b220c6841e3beb9b10d665aaa6e2b353cbddf825f2f9ce1826c4f2812a9302d7d79f6d29fa73366c9e67383cf0af77c3cd6b85fa4f3
-
Filesize
8KB
MD527535cee6740dfc50a78a0322415e67c
SHA1e80541cf15c8ed4c5eeda8d8c24674a5b8a27f61
SHA256fb0cdbf4e0215ae1866e97860c2ac3dd96e7498bfe2af3d82378041cdff7f292
SHA51225f11a8262b5a2f59bd6c9d8673b5ad5a140eae8c007244810b2924eb08b5cf54ae19e61be5139319877278d11868bbd85bd2e6c67f5fad4e2a458e2844ebc0c
-
Filesize
60KB
MD5688fdfae15f328a84e8f19f8f4193af2
SHA1c65d4cda0c93b84154dfbc065ae78b9e2f7ecfa8
SHA2568d37ff2458fde376a41e9e702a9049ff89e78b75669c0f681cfcafba9d49688e
SHA512f19bc7f204dbe3449abe9494bfff8be632f20f1b4b8272f0af71c4cec344a20617c0909c024cb4a4e0c6b266d386cb127554dc70f3a6aa7a81daf1a8748f5d2d
-
Filesize
80B
MD552b68e14f6548637144862e3d06b1244
SHA17bfd68fe0ca5a39b13f95acacc40bec64d761995
SHA25696c4617b5511036c2fc416c2f405fd6b123c743c3e8038f9f285f840d129ee31
SHA5124c5cba712fa0cf779a9961e01f1cb350f69f1b6156d9e16819cd64478bfb5da9ffc23e4bd07177c31d5450615a5693c2b97e2d8c39cbc8ea349c01098c11c9cd
-
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\i2p\peerProfiles\pH\profile-hCqwOUAgp4qSHpfwQO9FqcBJ6Vc3ofyvXLOKtc2qb9g=.txt
Filesize136B
MD560df5a6f6238c2bbf0b1c598b50bfdfc
SHA1faef37c0c159277f308393d349ed7248b52b2123
SHA256ebf01b37533b69e121dcf51689326543efb9c13ed60eb25d80cef23e3248065e
SHA512541829950d446741a00665708e53b275391d477f2bef344478da095c700e4170d01aa30c7be47830a0c4eff8aff60e539f8fa0288bbbeeddd66ffe0df19d1a0c
-
Filesize
721B
MD5b94e3bd4db3b5b303d86f7dfe52c8a12
SHA1e261353c4fb2ac0c3cdd6d59eb68936533880b90
SHA256cc1ed8375984689428f91b34c5851983edc218ecef56fec7495fe916bcefa603
SHA51276fe5f33128b5438b6bb4cd971ccf292df3988a0d3bc4de31b0a0f4132cb1b40f180873dd67f9e1fd264b0b74acedc46382d34c5a8e44715c7ca8cdb2507280f
-
Filesize
721B
MD52426430b525610e722906541dc7f4468
SHA1bf31fdf49e01cd0857b148cb0a3a4dfbea430abb
SHA2565044fc5fb2d033ac6929276cf6a4e6600b9618bc9e937219921a1c2d56e081a4
SHA51283a3e6128fb9ca16db9ba9cc3294b19732425b21e8f8e8f3d3e62001d5d71086b7072aaa45aeb97e376e3dee16fb53dbe7ca9fc250ec60dcc2473c79998374ff
-
Filesize
455B
MD5a0f5bbf3f4e36acda6d14d0bddb95a2e
SHA1412c00cca7249d26606addcb42682ecc0e098205
SHA256d3712eb58d2edadc7b2a81b78e1de8a8bde8e1a46e8f4eaeeb59b1a5a9543c94
SHA512fbf2e02f06bbcfe1892c819a01b12552f9f7df630b644c4f06364bb76010bbacba2e018a984a4a5d6cad5208f7bec5dad23df379186d03573f206224e6754d70
-
Filesize
96B
MD5ebd29f4ae4e556a34bebe5490f9cd2ce
SHA1f5c4b4b5f2642b04ba9f6a7a2ac019abf3f3250c
SHA2564ec37d74e2be7c5b516dd7fb014c1f41add73ce0a8dea269b6540031a2bd218f
SHA5126823fd0cde8a7ba716c1c4473f846bee244aec7b5b39eaa0260a0dc816df36d21817a70914f56ad6bf6df669c02c987929a64b218fde7c67295bf6a4395a98b9
-
Filesize
8.7MB
MD5676064a5cc4729e609539f9c9bd9d427
SHA1f77ba3d5b6610b345bfd4388956c853b99c9eb60
SHA25677d203e985a0bc72b7a92618487389b3a731176fdfc947b1d2ead92c8c0e766b
SHA5124c876e9c1474e321c94ea81058b503d695f2b5c9dca9182c515f1ae6de065099832fd0337d011476c553958808c7d6f748566734deee6af1e74b45a690181d02
-
Filesize
1KB
MD574663f41851c1f7199c870b244f7f59d
SHA1cfd7bbdf32b963c9d7a8da65d6f7c32f4d9b15d5
SHA256d3c1a49eef31ab8dd40e920f4a6c1d89804f0789db34b0da6eca477ca21895b2
SHA5128f2b5ef137e617fec655a629331d537a96ec5160541dbc7e39f0f2480eaabafdfdeb1c3f8bd8296bebe88d63487c1d3b1f85ad903e7eb9a7b187bb82e15ec120
-
Filesize
9KB
MD575797944212d70c9926325cf4055f929
SHA11b8568912c83c444735081b10b85470692cf664b
SHA2563b81384f577b92085d7f055bfed811276c20a48379d3e76ba66822b20ee55f6b
SHA5126f4591a9c57c698b16cef435d5d1098fa4502518195012a2043690942f5bc36f1e9da06aa75700e028834e526ffb585d6a5c23b6908ba0ccb88e50f47a3dcada
-
Filesize
103KB
MD591a0dd29773fbfb7112c5fcff1873c13
SHA1e1eaf1efb134caa7da5aaa362830a68ab705c023
SHA256ae2d023ebbfeefd5a26eaa255ad3862c9a1c276bb0b46ff88ea9a9999406d6b6
SHA512f7a665a218bb2ccec32326b0e0a9845b2981f17445b5cb54bba7d6ef9e200b4538ebd19916c2dacb0bbe1b409c14a499b23ba707874ae1f1b154279c90dc33dd
-
Filesize
872B
MD59bfedec07624bd0fe1816825f67fed6d
SHA17953a6a3213f4abc002c64379ef8ba073e2655d9
SHA25620730a79d8bc8e80f900ebec284378e5618e81f52486310767ba5028f4d1ea55
SHA5121d48541b00760efdcc21459857e50db08938e878b4e3f8da67fedb216035a5e39e089713d2fa728e59af8c46ec3ece6cd8efb9fe27302358f54d4576186addc0
-
Filesize
126KB
MD5c89542aba45ce1084760ae8de6eae09e
SHA1603560a3e4b6a8cb906ca98c907373adbf4d3b1c
SHA2561b6e559dc0cb37ebb2311c7cbf01b039f0dc1c3ec6da057837451a531b1e2cb0
SHA51260a0eb698afe25cdddb133fc937fee478f1e0f8af72b825c19bb2d544fafcc217babf6dd3d01704a106677e92aae3dd57538e34731c950da17f5715df0732ff6
-
Filesize
896B
MD5c0f8fe4f792340574dcd775f4427cc3d
SHA1c8420dcfbac8c25a4a2e038430baa347ea4ad3b6
SHA256896f6d0edd9276cbf2f6a64d24f5af767063b9a513588fa9aa77faa80f494fa6
SHA512d6c99c7e01101449bc6370ce1ba633d4bf4d481a2e0cc93c3ee166f5c229a438d6faff204798ef9d5fdbd236b28b3350ad62a73dc82fb2b1a9a2f212d8838043
-
Filesize
36KB
MD5e3e4492e2c871f65b5cea8f1a14164e2
SHA181d4ad81a92177c2116c5589609a9a08a5ccd0f2
SHA25632ff81be7818fa7140817fa0bc856975ae9fcb324a081d0e0560d7b5b87efb30
SHA51259de035b230c9a4ad6a4ebf4befcd7798ccb38c7eda9863bc651232db22c7a4c2d5358d4d35551c2dd52f974a22eb160baee11f4751b9ca5bf4fb6334ec926c6
-
Filesize
113KB
MD5d0f0423aeee6b6ff6754d860603d46d0
SHA1a06f3b9605b3398ba68154da39adf26ddee41743
SHA25681da68f52df2ed997c374ccbefc56849650770fb30eda8f202bbc7fc3fe6a51d
SHA512c30faede4520ff1c859b8b39e351112cfc60daeca98b1359f9f86ab79bcfb996ba84f35a5b178b4abec66152864720e58f741ae13d06b64913e240a1f9e6a633
-
Filesize
896B
MD59836488dbcbb0387ad4fda93b7ffbb74
SHA1d4b1358db6064e3b89dd9b7aac772c19ba8338ba
SHA2569e56cc93d3a091e003af93232fb73e29d09d25d885931b727ad194fc55c8961a
SHA5125af468ae7885dd829b1ac68f1b15aec346e84d952d181c5e023c2f95d81939f55ed0b1651ab925190c7a7e3d8918cc8b5bf02c3f38071ca05b874661d54233be
-
Filesize
89KB
MD54c086c8f48c4d0f8c20410e60340aec9
SHA177481360a98f3018f92a57b66e1dc7a6ec0dd0e8
SHA2560a8fcb54df736100f5792b6ce57ae165553712cb1e5701e4e0dd7620e6089f59
SHA512cdbcc2fd4195a6fa5a343234a745e3e7a558f68a496d376fdf6a86d585c9fa39a64f0ceb20a2d2e6e30e59ba46f62493e500d6eeb033fa981daa60f00ee42f14
-
Filesize
431KB
MD55fcb4b6362e04a8d1c6ecd33ad246fb9
SHA1e198d3e81c4b8527451133bceafa799d2115a8bb
SHA256060ee1bcb5817709f2d73bb1762c5abca09faf5271e8f90503a84f9657ecdcd9
SHA512b5839d79d1a34da86ba9b34a9105f7cc05e642c99d84d55e3e88833544dce9fdd840f7abf0f09cd4470734f24ca7c600c3c64e4041a4481806590d3b7a6a032d
-
Filesize
10.0MB
MD5312704a6232d74733de04c6e00f8cf21
SHA12b4820ac82c5b851464d6563fa6ea0cb3e3629c2
SHA2568d11890f2b70ba2abb4b017b05f3bb1d20eca6ad3eb84f0251e0857c77682c9b
SHA5125c32b9a8267c57ce640e7612bdecd7d7ec67f4e0ab48dd97a53373d220765ab234bc28779f524e788e1e03d8857ccd7755a22f19e1a34ae36fd6f33444016f01
-
Filesize
112KB
MD5be6174ae2b452da9d00f9c7c4d8a675b
SHA10abd2c76c82416ae9c30124c43802e2e49c8ed28
SHA256a62bdf318386aaab93f1d25144cfbdc1a1125aaad867efc4e49fe79590181ebf
SHA5125631b1595f8cee8c0dfa991852259fee17ea8b73a9eed900a10450bbb7c846acfc88c32930be379d60efa6ae1bbbead0a605a9f36e20129b53bca36b13ba5858
-
Filesize
87KB
MD54e320e2f46342d6d4657d2adbf1f22d0
SHA1a5acfe6397dffc61d243206885c389ea05428755
SHA2567d4a26158f41de0bfd7e76d99a474785957a67f7b53ee8ad376d69abc6e33cc8
SHA512e8e044fd17b36d188bb5ee8e5f7bfc9aecc01ab17e954d6996b900bc60d6d57afd782c7e01df7cc76a84e04ce16f77fe882f2d86e5113f25c1c3d385cfae37a5