Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 18:40

General

  • Target

    18fe37fd8b64145b123d5b9498ebc1ee36116e4e9c58e02293f273fdc7957277N.exe

  • Size

    1016KB

  • MD5

    033277c330873b005d0b593011a48780

  • SHA1

    e37535d32d6a8104d33107d39a1e93685bfe5117

  • SHA256

    18fe37fd8b64145b123d5b9498ebc1ee36116e4e9c58e02293f273fdc7957277

  • SHA512

    80435c29cbc80d99829511fc3c9b1819ad2f1f21c36e450b80854ba24d13a4583d43348ef155f7c369fce4bdb4585350640100fc76477ce56e95cb4b810568b2

  • SSDEEP

    6144:BIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUB:BIXsgtvm1De5YlOx6lzBH46U

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 27 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 25 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18fe37fd8b64145b123d5b9498ebc1ee36116e4e9c58e02293f273fdc7957277N.exe
    "C:\Users\Admin\AppData\Local\Temp\18fe37fd8b64145b123d5b9498ebc1ee36116e4e9c58e02293f273fdc7957277N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe
      "C:\Users\Admin\AppData\Local\Temp\izfuneuesjp.exe" "c:\users\admin\appdata\local\temp\18fe37fd8b64145b123d5b9498ebc1ee36116e4e9c58e02293f273fdc7957277n.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2864
      • C:\Users\Admin\AppData\Local\Temp\yfjxekl.exe
        "C:\Users\Admin\AppData\Local\Temp\yfjxekl.exe" "-C:\Users\Admin\AppData\Local\Temp\xnaxncmathrnysqm.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:1336
      • C:\Users\Admin\AppData\Local\Temp\yfjxekl.exe
        "C:\Users\Admin\AppData\Local\Temp\yfjxekl.exe" "-C:\Users\Admin\AppData\Local\Temp\xnaxncmathrnysqm.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\cdbjkkfeihcjfktagguvtbc.xwa

    Filesize

    280B

    MD5

    d545ac285137f565c4452998a47593dd

    SHA1

    55a004fad2d8ea6c7100fdc95708d2075687a6de

    SHA256

    0945c143b47ec7becf755aed60ce7063417f2e4056eed2959b816141b0eb3f96

    SHA512

    bd81f38432706e9b71d93c8d861510d76f1db2aa3557e2265f68d7379f5c45bb9b564191d1343eafded3d768a05250ae8aaae7e672ad72c2e2cd6c526f1547f5

  • C:\Program Files (x86)\cdbjkkfeihcjfktagguvtbc.xwa

    Filesize

    280B

    MD5

    308d87a5bd645368db965b63a5a24c15

    SHA1

    c71c64af532a19f26fa14e8bfae3635d10a23aef

    SHA256

    f22337d87d86a653c1a692dcbbf763fe75f9c7d65b42468fb8520b37c4dab386

    SHA512

    9a2bb37b97851a01e64e2494596c8b2fae53b774eba4bcdb14a8008f30589ecdf001d73e0c6a97fe8db377570762681ae9aaa21b7d2a92db14ee0c006d827322

  • C:\Users\Admin\AppData\Local\cdbjkkfeihcjfktagguvtbc.xwa

    Filesize

    280B

    MD5

    7a7e9ae4ef5b44924cc49ec8a2c93ce5

    SHA1

    3efe7b9cff609aa2820251b5ba4226be7a9e2e2a

    SHA256

    9bb2b1a2b59220965b91056b28d1b773c465188601aebb064be48d11289988c8

    SHA512

    f90a0e6254b5737c2064f6b89e4ab24d1b6b7ef733c7b900ab64c284c0cac8649ecc52d7ae1834cd280442680c5a675d74b717709e45c6696209509772e6ad22

  • C:\Users\Admin\AppData\Local\pbkdpagqfpvnukewnyxjslxioynxdvcsme.gfr

    Filesize

    4KB

    MD5

    b6265179b68373945281f594a280abf8

    SHA1

    8575ba74fe550ca45605dd7ccbfd7f4847cf7123

    SHA256

    533d05c4e024a7908005cf8c92b57078500fa9ad258215f4a12b66bdfb38add3

    SHA512

    0b2ff6e6d67100707d83905a59be64d54fff614236657f478dfc8cac09c9708975b081b94348a754e716a58779789c297d20725b0693405b6d1aafba80880991

  • C:\Windows\SysWOW64\nfutlcoezpbzmiigdu.exe

    Filesize

    1016KB

    MD5

    033277c330873b005d0b593011a48780

    SHA1

    e37535d32d6a8104d33107d39a1e93685bfe5117

    SHA256

    18fe37fd8b64145b123d5b9498ebc1ee36116e4e9c58e02293f273fdc7957277

    SHA512

    80435c29cbc80d99829511fc3c9b1819ad2f1f21c36e450b80854ba24d13a4583d43348ef155f7c369fce4bdb4585350640100fc76477ce56e95cb4b810568b2

  • \Users\Admin\AppData\Local\Temp\izfuneuesjp.exe

    Filesize

    320KB

    MD5

    efe1eddee674b1b4ad381b6c6fc79364

    SHA1

    422392e19058bc59743e8454315621f5199b5371

    SHA256

    92b7fd6f62b79e425f7cdc875977bb005713d9afbb6584e56aa24053c1613d41

    SHA512

    7c0b02dc207e6b1abcdfb829c9cbb5c4a5492b5e6ad6ceed7b281cc100cbe8cf68bf3dcb4acb8776ab3c93d0158e9f9e898fdf6b3dd20a65a6d09c5a676bbdd9

  • \Users\Admin\AppData\Local\Temp\yfjxekl.exe

    Filesize

    720KB

    MD5

    6b46656140e2a3bd9ca16891dfb8bd61

    SHA1

    40cb4135eed67e8d5f7230724c88bc1b42ae3e3c

    SHA256

    4736c35015f9f6e34244d60002665b5a815ba9f591f14a8f913fd59701a21620

    SHA512

    4922860155934adfe0614d0b9d35660743ea184c47124254a48703cba300bf0ab197b0125c7f1f576d321c7889edeeb1e9a4fab2b1a29b941c9ce34414bf386d