Analysis
-
max time kernel
26s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/11/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
Client.exe
-
Size
608KB
-
MD5
39727583da3ec4b5a2c90f3d098b79fc
-
SHA1
a2ebefa269b3462f7a85b7af2188ede8ed4f0aac
-
SHA256
e10cb7d36b757ce8925ae85fa3c2163df542b98866e06468b54abc9c4c9c05d0
-
SHA512
12c0d9dbd63259cb19cf70b765faf0c6220a3ee8ef6ad7ec6e7638ac4a07c2b701a92e19b8af4a1e859f2b34df159c316653e89ff77b214c71beb5d71170c2a3
-
SSDEEP
6144:KnR9gbQETjrVwuR7V5Ew1w6Ici19/e6VlWT8b9khzaiMuz3KVjbI4R6SqBUiTVVo:G8bQSVEw14fPVle8Sqvx6Sqx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\xdwdMicrosoft Excel Host.exe" Client.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2544 schtasks.exe 1776 schtasks.exe 940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 940 schtasks.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 3048 WmiApSrv.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe 2180 Client.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2180 Client.exe Token: SeShutdownPrivilege 2164 shutdown.exe Token: SeRemoteShutdownPrivilege 2164 shutdown.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2712 2180 Client.exe 31 PID 2180 wrote to memory of 2712 2180 Client.exe 31 PID 2180 wrote to memory of 2712 2180 Client.exe 31 PID 2712 wrote to memory of 2544 2712 CMD.exe 33 PID 2712 wrote to memory of 2544 2712 CMD.exe 33 PID 2712 wrote to memory of 2544 2712 CMD.exe 33 PID 2180 wrote to memory of 3056 2180 Client.exe 34 PID 2180 wrote to memory of 3056 2180 Client.exe 34 PID 2180 wrote to memory of 3056 2180 Client.exe 34 PID 3056 wrote to memory of 1776 3056 CMD.exe 36 PID 3056 wrote to memory of 1776 3056 CMD.exe 36 PID 3056 wrote to memory of 1776 3056 CMD.exe 36 PID 2180 wrote to memory of 2640 2180 Client.exe 37 PID 2180 wrote to memory of 2640 2180 Client.exe 37 PID 2180 wrote to memory of 2640 2180 Client.exe 37 PID 2640 wrote to memory of 940 2640 CMD.exe 39 PID 2640 wrote to memory of 940 2640 CMD.exe 39 PID 2640 wrote to memory of 940 2640 CMD.exe 39 PID 2180 wrote to memory of 1984 2180 Client.exe 42 PID 2180 wrote to memory of 1984 2180 Client.exe 42 PID 2180 wrote to memory of 1984 2180 Client.exe 42 PID 1984 wrote to memory of 2164 1984 cmd.exe 44 PID 1984 wrote to memory of 2164 1984 cmd.exe 44 PID 1984 wrote to memory of 2164 1984 cmd.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\system32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "SecurityHealthSystray.exe" /tr "C:\Users\Admin\xdwdMicrosoft Excel Host.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "SecurityHealthSystray.exe" /tr "C:\Users\Admin\xdwdMicrosoft Excel Host.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2544
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\xdwdMicrosoft Excel Host.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\xdwdMicrosoft Excel Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1776
-
-
-
C:\Windows\system32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\Documents\xdwdCitrix Receiver.exe" /RL HIGHEST & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\Documents\xdwdCitrix Receiver.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Shutdown /s /f /t 002⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\shutdown.exeShutdown /s /f /t 003⤵
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2964
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1216
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6