Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe
Resource
win10v2004-20241007-en
General
-
Target
c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe
-
Size
327KB
-
MD5
d5593d3cf85d2fe35b3aedf655fd7507
-
SHA1
a0bcd56fdabdc1e3fa282fe80a40fdc3fa56ef44
-
SHA256
c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2
-
SHA512
06abbb02fde9cf03d35a2e6a175f4aac25c161436bd285ce6f7ad7aab68529b755d56eb94af02f2f72519b8e98a7f5a2de607156f0513a248ecba23593bee2dc
-
SSDEEP
6144:p2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:p2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2896 SearchIndexerDB.exe 2672 SearchIndexerDB.exe -
Loads dropped DLL 4 IoCs
pid Process 1892 c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe 1892 c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe 1892 c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe 2896 SearchIndexerDB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SearchIndexerDB.exe -
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\shell c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\Content-Type = "application/x-msdownload" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\shell\open c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\shell\runas c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\shell\runas\command\IsolatedCommand = "\"%1\" %*" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\ = "cmos" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\open c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\ = "Application" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\runas\command c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\shell\open\command\IsolatedCommand = "\"%1\" %*" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\shell\open\command c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\open\command c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\DefaultIcon c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\SearchIndexerDB.exe\" /START \"%1\" %*" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\runas c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\DefaultIcon\ = "%1" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\shell\runas\command c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\DefaultIcon\ = "%1" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\SearchIndexerDB.exe\" /START \"%1\" %*" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\shell\runas\command\ = "\"%1\" %*" c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.exe c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\cmos\DefaultIcon c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2896 SearchIndexerDB.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2896 1892 c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe 30 PID 1892 wrote to memory of 2896 1892 c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe 30 PID 1892 wrote to memory of 2896 1892 c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe 30 PID 1892 wrote to memory of 2896 1892 c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe 30 PID 2896 wrote to memory of 2672 2896 SearchIndexerDB.exe 31 PID 2896 wrote to memory of 2672 2896 SearchIndexerDB.exe 31 PID 2896 wrote to memory of 2672 2896 SearchIndexerDB.exe 31 PID 2896 wrote to memory of 2672 2896 SearchIndexerDB.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe"C:\Users\Admin\AppData\Local\Temp\c130f4e2fb0ceea67880bcc72c343b56aac4e91ca9ced795a5cb58fa41c04ad2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"3⤵
- Executes dropped EXE
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD55cc685c544fb8f80dc09c457e29ce817
SHA1dd20cb209fd9e45b5643761bd4d3aadbef40fc5b
SHA2566fcc53af841cf0f7d2eec9d17921e9d430ca37daeb1e687daa5fd6c43d6de4e8
SHA5122ef947bf7fb0654647eebcbcf524bbef05072587b3c175df9b90ff63342a253e375f303f4463b85ba3e406afc94835231a48c9d0ae50d4b325fbac08fb1f9c20