Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 14:05
Behavioral task
behavioral1
Sample
f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe
Resource
win10v2004-20241007-en
General
-
Target
f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe
-
Size
33KB
-
MD5
bf32cec5dfaf81964dfc0b0f0b4b2c20
-
SHA1
338b25ffa4c2b2fc172aeb41e05105b8f3cf2e06
-
SHA256
f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ce
-
SHA512
9aff436852c333b6535fcd4b20c9be6f9d2319faf99ea00f5f3d5500ad9ba09351563e5ebb10ceac406e53e582f564a979bc7d80dddad74f238e4cb60ea115ad
-
SSDEEP
768:UEzNbLcQ9qQuVriDMuyuruTD0qB77777J77c77c77c7nOTBI/M+:l3h9qQA6hZunrB77777J77c77c77c7OW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\inetc.{7007ACC7-3202-11D1-AAD2-00805FC1270E}.\\ÿóýÿüêâüü.exe\"" úîøú÷åÝ÷÷„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\inetc.{7007ACC7-3202-11D1-AAD2-00805FC1270E}.\\ÿóýÿüêâüü.exe\"" ÿóýÿüêâüü.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\inetc.{7007ACC7-3202-11D1-AAD2-00805FC1270E}.\\ÿóýÿüêâüü.exe\"" f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Active Setup\Installed Components\{C52248AC-18A4-F681-24F6-48AC24F618A4} f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Active Setup\Installed Components\{C52248AC-18A4-F681-24F6-48AC24F618A4}\Direktori = "d[}v”†“”}b…ŽŠ\u008f}b‘‘e‚•‚}s\u0090‚ŽŠ\u008fˆ}Š\u008f†•„OœXQQXbddXNTSQSNRReRNbbeSNQQYQVgdRSXQfž" f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Active Setup\Installed Components\{C52248AC-18A4-F681-24F6-48AC24F618A4}\last-check = "ÿóýÿüêâüü.exe" f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Active Setup\Installed Components\{C52248AC-18A4-F681-24F6-48AC24F618A4}\last-check7 = "úîøú÷åÝ÷÷\u0090„•\u0090.exe" f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" úîøú÷åÝ÷÷„•.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ÿóýÿüêâüü.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 1888 úîøú÷åÝ÷÷„•.exe 1992 ÿóýÿüêâüü.exe -
Loads dropped DLL 4 IoCs
pid Process 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" úîøú÷åÝ÷÷„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" ÿóýÿüêâüü.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\úîøú÷åÝ÷÷„•.exe = "C:\\Users\\Admin\\AppData\\Roaming\\inetc.{7007ACC7-3202-11D1-AAD2-00805FC1270E}.\\úîøú÷åÝ÷÷\u0090„•\u0090.exe" f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\úîøú÷åÝ÷÷„•.exe = "C:\\Users\\Admin\\AppData\\Roaming\\inetc.{7007ACC7-3202-11D1-AAD2-00805FC1270E}.\\úîøú÷åÝ÷÷\u0090„•\u0090.exe" úîøú÷åÝ÷÷„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\úîøú÷åÝ÷÷„•.exe = "C:\\Users\\Admin\\AppData\\Roaming\\inetc.{7007ACC7-3202-11D1-AAD2-00805FC1270E}.\\úîøú÷åÝ÷÷\u0090„•\u0090.exe" ÿóýÿüêâüü.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\RakyatKelaparan.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\SysWOW64\IDTemplate.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\SysWOW64\RakyatKelaparan.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\SysWOW64\IDTemplate.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr ÿóýÿüêâüü.exe File opened for modification C:\Windows\SysWOW64\KesenjanganSosial.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\SysWOW64\3D Animation.scr ÿóýÿüêâüü.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\SysWOW64\KesenjanganSosial.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\SysWOW64\3D Animation.scr úîøú÷åÝ÷÷„•.exe -
resource yara_rule behavioral1/memory/2616-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x000a000000016d2a-7.dat upx behavioral1/memory/2616-10-0x00000000003A0000-0x00000000003C2000-memory.dmp upx behavioral1/files/0x0007000000016cf5-19.dat upx behavioral1/memory/2616-31-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-32-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-33-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-34-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-35-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-36-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-37-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-38-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-39-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-40-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-41-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-42-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-43-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-44-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-45-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-46-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-47-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-48-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-49-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-50-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-51-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-52-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-53-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1888-54-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1992-55-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in Windows directory 20 IoCs
description ioc Process File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\ShellNew\IDTemplate.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\KesenjanganSosial.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\ShellNew\IDTemplate.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\IDTemplate.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\ShellNew\KesenjanganSosial.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\ShellNew\3D Animation.scr ÿóýÿüêâüü.exe File opened for modification C:\Windows\ShellNew\cmd-brontok.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\3D Animation.scr úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\KesenjanganSosial.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\ShellNew\3D Animation.scr úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\ShellNew\cmd-brontok.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\3D Animation.scr ÿóýÿüêâüü.exe File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\RakyatKelaparan.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\cmd-brontok.exe úîøú÷åÝ÷÷„•.exe File opened for modification C:\Windows\RakyatKelaparan.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\IDTemplate.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\cmd-brontok.exe ÿóýÿüêâüü.exe File opened for modification C:\Windows\ShellNew\KesenjanganSosial.exe ÿóýÿüêâüü.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language úîøú÷åÝ÷÷„•.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÿóýÿüêâüü.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile úîøú÷åÝ÷÷„•.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" úîøú÷åÝ÷÷„•.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile ÿóýÿüêâüü.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "Microscope World Document" ÿóýÿüêâüü.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 1888 úîøú÷åÝ÷÷„•.exe 1992 ÿóýÿüêâüü.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1888 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 30 PID 2616 wrote to memory of 1888 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 30 PID 2616 wrote to memory of 1888 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 30 PID 2616 wrote to memory of 1888 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 30 PID 2616 wrote to memory of 1992 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 31 PID 2616 wrote to memory of 1992 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 31 PID 2616 wrote to memory of 1992 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 31 PID 2616 wrote to memory of 1992 2616 f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe"C:\Users\Admin\AppData\Local\Temp\f7c76bf1ebecdb528102af8ab268426a9b1ea49f3b2810c0b9095abc9a08e7ceN.exe"1⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\inetc.{7007ACC7-3202-11D1-AAD2-00805FC1270E}\úîøú÷åÝ÷÷„•.exeC:\Users\Admin\AppData\Roaming\inetc.{7007ACC7-3202-11D1-AAD2-00805FC1270E}\úîøú÷åÝ÷÷„•.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1888
-
-
C:\Users\Admin\AppData\Roaming\inetc.{7007ACC7-3202-11D1-AAD2-00805FC1270E}\ÿóýÿüêâüü.exeC:\Users\Admin\AppData\Roaming\inetc.{7007ACC7-3202-11D1-AAD2-00805FC1270E}\ÿóýÿüêâüü.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5a839cddf3b4e39ca386276e824dd9526
SHA14d88993a57d6ae7e94e959d861f5fbe0245c7c13
SHA2563e8c464de3ede8773617ea5f4b236d2a17b991796d23f62e2fcc3e5a0b1c2fe7
SHA512c63b1c7ed85176ac669a1d1c03d192226a34aa14c70c7280216ae5a6877ef0719a6642b72ce38206f4e4a990568ebfc48991b99a53d881226ed826074d2a20cd
-
Filesize
33KB
MD55e78dbc1eba469b57034262f732b651c
SHA110cc40056518e43ab230741a335cc9543ed65ff2
SHA2561d748a105d2ccf416be6697ee7f19883cd485635fa27ec53927f4f089c2edea2
SHA51299addfbea8f6104889dd7758d469ae07acbf99b6d8d1c61e502abfe2505ca43407e42fd1b37ed04045d1df92c3f7ef37f18b533848f7a490abc644564a6ddbce