Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe
Resource
win10v2004-20241007-en
General
-
Target
7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe
-
Size
328KB
-
MD5
87ff8a4df8d83ab76a2c842954572930
-
SHA1
3bd1c9014ec8f2be2063f9f4badb67abaa566329
-
SHA256
7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26
-
SHA512
dd5b2b90f51c57d33fc1bcc178f482d04cd650d6d1e107cb99833b490fd32f67901b260639d81d5c0ac46e23b4cc59c0e5b7009cd01358f4ac374292e05090e2
-
SSDEEP
6144:RyWOeLm+tkxoGQvT+W4+HMc+MEGRQ6saHSMf3z0AzbLUG50Tpm+MmvbWdlL0d5aU:RCemx0vN3HKGi6sYjJLUGGtedud5tr7
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\54bc9b75.sys 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 4984 takeown.exe 3960 icacls.exe 4572 takeown.exe 444 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\54bc9b75\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\54bc9b75.sys" 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 4984 takeown.exe 3960 icacls.exe 4572 takeown.exe 444 icacls.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ws2tcpip.dll 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe File opened for modification C:\Windows\SysWOW64\ws2tcpip.dll 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe File created C:\Windows\SysWOW64\wshtcpip.dll 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe File created C:\Windows\SysWOW64\midimap.dll 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\HOOK_ID 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\HOOK_ID\name = "7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe" 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\SYS_DLL 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\SYS_DLL\name = "yyui.dll" 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe Token: SeTakeOwnershipPrivilege 4984 takeown.exe Token: SeTakeOwnershipPrivilege 4572 takeown.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1828 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 96 PID 1428 wrote to memory of 1828 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 96 PID 1428 wrote to memory of 1828 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 96 PID 1828 wrote to memory of 4984 1828 cmd.exe 98 PID 1828 wrote to memory of 4984 1828 cmd.exe 98 PID 1828 wrote to memory of 4984 1828 cmd.exe 98 PID 1828 wrote to memory of 3960 1828 cmd.exe 99 PID 1828 wrote to memory of 3960 1828 cmd.exe 99 PID 1828 wrote to memory of 3960 1828 cmd.exe 99 PID 1428 wrote to memory of 4496 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 100 PID 1428 wrote to memory of 4496 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 100 PID 1428 wrote to memory of 4496 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 100 PID 4496 wrote to memory of 4572 4496 cmd.exe 102 PID 4496 wrote to memory of 4572 4496 cmd.exe 102 PID 4496 wrote to memory of 4572 4496 cmd.exe 102 PID 4496 wrote to memory of 444 4496 cmd.exe 103 PID 4496 wrote to memory of 444 4496 cmd.exe 103 PID 4496 wrote to memory of 444 4496 cmd.exe 103 PID 1428 wrote to memory of 880 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 104 PID 1428 wrote to memory of 880 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 104 PID 1428 wrote to memory of 880 1428 7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe"C:\Users\Admin\AppData\Local\Temp\7faf355f150771e125b8e4eb345fd092ded04aa2c01cb419a105fa957afceb26N.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\wshtcpip.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\midimap.dll && icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\midimap.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat2⤵
- System Location Discovery: System Language Discovery
PID:880
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD57bdb1aa1dfd66e965486813a86d64016
SHA1f373a46c158faea9b055c23173e8693212c96b71
SHA256ef69fa604946cd133c7d0019757a81c881522fab5a356140dd9053c3517f4673
SHA5125f00078c6e5e7d85bb62d6ec05cd055da100e3032337221d656b88fa2ba41f43f3873a909b01b8ac5e25940f4a95cc6414b82871ff2f3d5335f31421cad01758