Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe
Resource
win10v2004-20241007-en
General
-
Target
62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe
-
Size
266KB
-
MD5
a529a8193d8afea364ea8ce6abe0ca20
-
SHA1
ac0a275a3a506399e90195d4f73e89e4ea77358d
-
SHA256
62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0f
-
SHA512
a656b3f4899f504f7964f7eaab3ab30c183f9c18a3f471f02a248758c0ac09cc4462f054764182c175fce8c6b0a71a882455ce24685b8ef320666b32c1861e98
-
SSDEEP
6144:1RnQDj+U72wXnrt5d9AwKUFokmQZuUkBygMRuAK+c:TQ+U7dt5E6p92+An
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Local\Temp\62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe" 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe -
Drops file in Windows directory 4 IoCs
Processes:
62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exedescription ioc Process File created C:\Windows\regCef.dll 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe File created C:\Windows\blockbb.bat 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe File created C:\Windows\blockcef.bat 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe File created C:\Windows\regBB.dll 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 2648 sc.exe 2756 sc.exe 2668 sc.exe 2696 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exesc.exesc.exesc.exe62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.execmd.exesc.execacls.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Modifies registry class 6 IoCs
Processes:
regini.exeregini.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41A1C0E-EA6C-11D4-B1B8-444553540000}\VersionIndependentProgID regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41A1C0E-EA6C-11D4-B1B8-444553540000} regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41A1C0E-EA6C-11D4-B1B8-444553540003}\VersionIndependentProgID regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C41A1C0E-EA6C-11D4-B1B8-444553540003} regini.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exepid Process 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exepid Process 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 2464 wrote to memory of 2744 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 31 PID 2464 wrote to memory of 2744 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 31 PID 2464 wrote to memory of 2744 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 31 PID 2464 wrote to memory of 2744 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 31 PID 2464 wrote to memory of 1568 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 32 PID 2464 wrote to memory of 1568 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 32 PID 2464 wrote to memory of 1568 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 32 PID 2464 wrote to memory of 1568 2464 62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe 32 PID 1568 wrote to memory of 3040 1568 cmd.exe 35 PID 1568 wrote to memory of 3040 1568 cmd.exe 35 PID 1568 wrote to memory of 3040 1568 cmd.exe 35 PID 1568 wrote to memory of 3040 1568 cmd.exe 35 PID 2744 wrote to memory of 2648 2744 cmd.exe 36 PID 2744 wrote to memory of 2648 2744 cmd.exe 36 PID 2744 wrote to memory of 2648 2744 cmd.exe 36 PID 2744 wrote to memory of 2648 2744 cmd.exe 36 PID 1568 wrote to memory of 2964 1568 cmd.exe 37 PID 1568 wrote to memory of 2964 1568 cmd.exe 37 PID 1568 wrote to memory of 2964 1568 cmd.exe 37 PID 1568 wrote to memory of 2964 1568 cmd.exe 37 PID 2744 wrote to memory of 2756 2744 cmd.exe 38 PID 2744 wrote to memory of 2756 2744 cmd.exe 38 PID 2744 wrote to memory of 2756 2744 cmd.exe 38 PID 2744 wrote to memory of 2756 2744 cmd.exe 38 PID 1568 wrote to memory of 2668 1568 cmd.exe 40 PID 1568 wrote to memory of 2668 1568 cmd.exe 40 PID 1568 wrote to memory of 2668 1568 cmd.exe 40 PID 1568 wrote to memory of 2668 1568 cmd.exe 40 PID 2796 wrote to memory of 2676 2796 cmd.exe 41 PID 2796 wrote to memory of 2676 2796 cmd.exe 41 PID 2796 wrote to memory of 2676 2796 cmd.exe 41 PID 1568 wrote to memory of 2696 1568 cmd.exe 43 PID 1568 wrote to memory of 2696 1568 cmd.exe 43 PID 1568 wrote to memory of 2696 1568 cmd.exe 43 PID 1568 wrote to memory of 2696 1568 cmd.exe 43 PID 1616 wrote to memory of 936 1616 cmd.exe 45 PID 1616 wrote to memory of 936 1616 cmd.exe 45 PID 1616 wrote to memory of 936 1616 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe"C:\Users\Admin\AppData\Local\Temp\62346854582332ba2b0c68acbb1685776372a2c13aad80cc1c3937e265874b0fN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\blockBB.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\sc.exesc create privtorador binpath= "cmd /K start /wait regini C:\Windows\regBB.dll" type= own type= interact3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\sc.exesc start privtorador3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\blockCef.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo s"3⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Scpad\scpsssh2.dll" /D Administrador3⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\SysWOW64\sc.exesc create privtorador2 binpath= "cmd /K start /wait regini C:\Windows\regCef.dll" type= own type= interact3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2668
-
-
C:\Windows\SysWOW64\sc.exesc start privtorador23⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
C:\Windows\system32\cmd.execmd /K start /wait regini C:\Windows\regBB.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\regini.exeregini C:\Windows\regBB.dll2⤵
- Modifies registry class
PID:2676
-
-
C:\Windows\system32\cmd.execmd /K start /wait regini C:\Windows\regCef.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\regini.exeregini C:\Windows\regCef.dll2⤵
- Modifies registry class
PID:936
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5f430aa73c8c7a904f16c4fb08a0631c9
SHA121bfbfae75073175b26728c31e8538e8192a580a
SHA2568a32ea32a4be25484356fa74eeab522ac946975855744576d05b56d6f647119d
SHA51234a8c2f71fc8298c648ede8e8e26233ff29c05e8de881703b3270d5215f7d7d84f11163e166df05b36d8e7998246e2cf13af1420b3f81d0908a0fcdbd6acc240
-
Filesize
221B
MD526c836dd8f5c1a52e0ac8f0fb2118018
SHA16c6618d782d3a3917e590ba693cefc57a4e0165b
SHA256c6db26b8e0e4805a8abf8cc399e31ee32300ec6cd2a51ab3554cdaea67a91a9e
SHA512b734b61c58527bfd6ecfe08e38b1316278e1dff981123394e11678c77d7a98ee37a6b454a95a59725af33abffa8de4471f1a13ec1211d39a3372cfa9e4d78952
-
Filesize
602B
MD575c88f0e4063fa4b2740ffde7e807e4f
SHA1e114692c54a81070e83d5f731580e70e804ad957
SHA256f3cc1573fb86fb2837d6a5c4b8e83a76a2a37ad00433b63e10e29a22887597df
SHA512251050bfa49fff4c0290f27afbf01c38c113e2628a262bbb5f7da6b7c6460704caded48cf62af27a58b4df898dc893d9e72be396d68c61395ca0e77dbf9ef7af
-
Filesize
602B
MD53aa8185e72179791676feea73a81a955
SHA1cfdf18b9c6bc2177191082e362faefdddf913fdc
SHA256d7c9dec38ef63025ebd78812d7b2c33e9372510953e9fadd0c54f46c23a51e2d
SHA512ca8692afdcbd17cba8dd652c5a088e247b5ddee2dbfc351188f9f7bb7b407eae834e04cbaca3360079b5f9d38518a3fbfbe0e215a2f58ff10a11be3cdd73f971