Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe
Resource
win10v2004-20241007-en
General
-
Target
151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe
-
Size
346KB
-
MD5
fb9c21a9cc24889784f8f943dd558f70
-
SHA1
836f910db289475f0e1404bad3461c6bc1e3c3b7
-
SHA256
151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639
-
SHA512
ac2dbb3ef927d8ba6e13102c9c193156cd3e19b53d797ef009eb0ccdad74313cd76e0f4ece13096cc4d075962e1bdc6db4a1b90c10d4d09c520c1e018a2ef8e1
-
SSDEEP
6144:+CjwZuxYoa6PTe6VlWT8b9MM2MNuTDbNSRuW:EZuXPTPVle8KM2TlSR
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\Videos\\xdwdMicrosoft SharePoint.exe" 151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Drops file in Windows directory 1 IoCs
Processes:
151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exedescription ioc Process File created C:\Windows\xdwd.dll 151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 2704 schtasks.exe 2936 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exedescription pid Process Token: SeDebugPrivilege 2384 151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exeCMD.exeCMD.exedescription pid Process procid_target PID 2384 wrote to memory of 2784 2384 151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe 32 PID 2384 wrote to memory of 2784 2384 151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe 32 PID 2384 wrote to memory of 2784 2384 151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe 32 PID 2784 wrote to memory of 2936 2784 CMD.exe 34 PID 2784 wrote to memory of 2936 2784 CMD.exe 34 PID 2784 wrote to memory of 2936 2784 CMD.exe 34 PID 2384 wrote to memory of 2532 2384 151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe 35 PID 2384 wrote to memory of 2532 2384 151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe 35 PID 2384 wrote to memory of 2532 2384 151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe 35 PID 2532 wrote to memory of 2704 2532 CMD.exe 37 PID 2532 wrote to memory of 2704 2532 CMD.exe 37 PID 2532 wrote to memory of 2704 2532 CMD.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe"C:\Users\Admin\AppData\Local\Temp\151943288a689ed0ed49c715efd9df77c7e4c7f838e56bed0573de3b62a1f639N.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\Admin\Videos\xdwdMicrosoft SharePoint.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Azure DevOps" /tr "C:\Users\Admin\Videos\xdwdMicrosoft SharePoint.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2936
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Autodesk Revit Upgrade" /tr "C:\Users\Admin\AppData\Local\xdwdMicrosoft Hyper-V.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Autodesk Revit Upgrade" /tr "C:\Users\Admin\AppData\Local\xdwdMicrosoft Hyper-V.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1