Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 18:49

General

  • Target

    9a6adbd778780648e6b465adecad694bd5a61355508c6b2cd87f9115fa349a47.exe

  • Size

    3.2MB

  • MD5

    d1824b06f3bd783c114ad66173ac58c5

  • SHA1

    24fd0f8539cbd0ab4bc509ecc7e0f345608dc47b

  • SHA256

    9a6adbd778780648e6b465adecad694bd5a61355508c6b2cd87f9115fa349a47

  • SHA512

    534702ef7c2dddb8b62df7cc7b6afc01565de3032fbf8a1f0ddaff6d4cf6b880f66943ea4cf754067d60b45ab9578b80917432db5e7e921b9dcbbe34d95ccda9

  • SSDEEP

    12288:rXgvmzFHi0mo5aH0qMzd58p7FiKPJQPDHvd3:rXgvOHi0mGaH0qSd+Fl4V3

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 28 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a6adbd778780648e6b465adecad694bd5a61355508c6b2cd87f9115fa349a47.exe
    "C:\Users\Admin\AppData\Local\Temp\9a6adbd778780648e6b465adecad694bd5a61355508c6b2cd87f9115fa349a47.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Hijack Execution Flow: Executable Installer File Permissions Weakness
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\acfmr.exe
      "C:\Users\Admin\AppData\Local\Temp\acfmr.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Impair Defenses: Safe Mode Boot
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2636
    • C:\Users\Admin\AppData\Local\Temp\acfmr.exe
      "C:\Users\Admin\AppData\Local\Temp\acfmr.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • System Location Discovery: System Language Discovery
      • System policy modification
      PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\cazcdffemingaalbrsusruv.xwe

    Filesize

    280B

    MD5

    f27e9fa656fc136d88c57b99d9b79914

    SHA1

    8264ff6b3b476fbd2c18c92282b376af2331cfeb

    SHA256

    912b7cc240b4cbba967481d02a505a86b003a58bab97396cd6fe0d21795b10d0

    SHA512

    afe9ac939ec3ca0196d2283c728b0fd65248ddaaf5c63ffb8e980f10159a549c52cfd790d72cb0c9eb3290d6e66fe9d56b2461850e950a0bede56bff329373ff

  • C:\Program Files (x86)\cazcdffemingaalbrsusruv.xwe

    Filesize

    280B

    MD5

    2a66ad7a85466e6783a5101bf75d3b6f

    SHA1

    079a8ef614e95b60c56a82a23d99511b6b89153f

    SHA256

    e2aefdcb6df97a71a3dd01cd8ef2ae2655fe624e627e3ea027db1bcce0f7a46f

    SHA512

    ec12578bec65d16255e2ea3b4dbb85e491afe4fa48480f67e8a9f291de6e6c3a8a21672936615cb382c912b92e6f45e9954bb2e2ffcbf39a43037f14622245ef

  • C:\Program Files (x86)\cazcdffemingaalbrsusruv.xwe

    Filesize

    280B

    MD5

    e9199440c782ab125a76283b3379f4f5

    SHA1

    3c533978c4e81aab1545753ce13517a70a7cad1b

    SHA256

    8f6b6560708cab15e8cc6ac50ca6cdfe4b8b283dac0a8baf0c96511d89f78fed

    SHA512

    3c9a8ddd8dfb6564e0459a8f417af7a42d4a31961d1155c19eee646482cfc221728d209d481f02a45bf59d5df1bbe97ec243685d26f6a2f5e956f1357d5ffcb4

  • C:\Program Files (x86)\cazcdffemingaalbrsusruv.xwe

    Filesize

    280B

    MD5

    b289b62e8920922b1a4b8efcc0790343

    SHA1

    98430fcbbd99ff5ab57ec66e4b0875254e0b0494

    SHA256

    e29056549b81c36f3019be02dfe19f1e9665af9c5f9893f01f799a234a0067b4

    SHA512

    bbc029d8e38f6775fc87fedb59feb5aa0b2cf094711dc69d9788c7116bf4e3ec1a1c5098c6b6307e11e940f65af6d419a54143e205d961f9921b7e589fc6a40f

  • C:\Program Files (x86)\cazcdffemingaalbrsusruv.xwe

    Filesize

    280B

    MD5

    fe515c8a5cc58174f0252fc9065b97a2

    SHA1

    e78e639a0e7312e2628fe0544741efc27c3794cb

    SHA256

    0d3bef2f84df5901e42de70f7dc4b288b81db4fa8500f18e22fb6d5115360a99

    SHA512

    72f2c2acb97a54077bddb6546b72146f6dbef9b950a18abd99340455f1ff8e709ad683647e1c9ee2e2a6b74138296f1e74066f985fdb3232a2d42e56ec619d19

  • C:\Program Files (x86)\cazcdffemingaalbrsusruv.xwe

    Filesize

    280B

    MD5

    dd1360867dfa320a73bc55241ee9f94e

    SHA1

    c31aa82a04468139aba1fdd2920b4fd24cbd8732

    SHA256

    15f2f0ef0eed3e4bd7a9b48d54a4ac141b3cfbc3dc9832c2b438d869e1df9bf5

    SHA512

    06b4566881531d24f7d5147542bf5d5776776be6f408fd9df655e46d8dcb71868ff87815f5f06ac0bd84ccf826aa41ca08ea9283bfb17f69c1a45a3d9488ff06

  • C:\Program Files (x86)\cazcdffemingaalbrsusruv.xwe

    Filesize

    280B

    MD5

    a515c219db73b37ec2c2d938c607e6e6

    SHA1

    104ebcb37c212d580020cf86efbc8bbdc56a4e89

    SHA256

    64de022e3f7ff2f359906761e830e053d5980cc1f8f7e5399b554c8461e36c78

    SHA512

    be07aac09efed4693a1abcb15a97d4afc634cf8ff82480ef2e74de19ad53d385c38031373c29869ad5f665d570c1d362253a8e400e4f7d2c674acc78d54869c4

  • C:\Users\Admin\AppData\Local\cazcdffemingaalbrsusruv.xwe

    Filesize

    280B

    MD5

    d13077aa7f5224cab3ae04dbb1955e56

    SHA1

    e881e0dae8e960b3574af3884cbaf1c00bfa43be

    SHA256

    09bf1ea9fee85fea805805d8c1c58fabc1d28af2d6005840c1a9521d716c6714

    SHA512

    bf7a45607b8ced55e81cc0959281b8d1c54fb5a6b07ccdda7a124f6463f2404921ca70075f5686fdf97b6cededde50289c50b29b1d87999bc0eaabe70b9aeb9f

  • C:\Users\Admin\AppData\Local\pyiwivgqjqgkpawxykxgqeqdoyryosxief.sfo

    Filesize

    4KB

    MD5

    d015ec1b85f5c50f1ed6d1f710a5fa43

    SHA1

    a4f6959af980860f5929194482815b659013898b

    SHA256

    bff49c9ddd2330115e6884c91b9234512c7c1d499aeb7e1bcc79fad25062a750

    SHA512

    a17868c3b63d1fac69c5f27a9510eaf2306ef56680483700d7f4d5e4b9f11158f79bbae22b328554fb60aeb07add495a49bda8980e6879c6823a535b1779557a

  • \Users\Admin\AppData\Local\Temp\acfmr.exe

    Filesize

    4.5MB

    MD5

    abd2220951cfcc2478f58a394f3748a5

    SHA1

    4e0c8422530f7d192d95e25496e4148e42510f6c

    SHA256

    c4493aa3b8b1d545b70b7d9ca1caa41f235b4f39be560c561d69089edb7632f3

    SHA512

    5eb317869f73be67a635094ff0a5bb107e8d576bc4df21031e04482ae13a48e7ce2518a604ae0b15c192585e133fefd1f91232f64f6bf54b55454425f65a9b63