Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2025, 12:42

General

  • Target

    dfd5f2dabc9e48eaf333b76da901ffa387e0753fd00353b8b03f976f36d3e00a.exe

  • Size

    696KB

  • MD5

    a79189ec6015e24cb01ae28574e355b3

  • SHA1

    fa795dff6bcf25e8dc707829c19f2fe6377055fb

  • SHA256

    dfd5f2dabc9e48eaf333b76da901ffa387e0753fd00353b8b03f976f36d3e00a

  • SHA512

    72a7992caa811cce783cf76499658e1d853552cd589cc7297f0a3cff8cbbfb14dc9b1d11332856b6a33f3c1225c62d10db7a2e967d782f20f6941ed78370ae6c

  • SSDEEP

    6144:I3Be8ySm8hQAAIfFrRXuEE+0l97mKwKRwHVqF86JQPDHDdx/Qtqa:h/zkFF+EExZmKbRQV4PJQPDHvd

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 26 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfd5f2dabc9e48eaf333b76da901ffa387e0753fd00353b8b03f976f36d3e00a.exe
    "C:\Users\Admin\AppData\Local\Temp\dfd5f2dabc9e48eaf333b76da901ffa387e0753fd00353b8b03f976f36d3e00a.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Hijack Execution Flow: Executable Installer File Permissions Weakness
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\gvszmt.exe
      "C:\Users\Admin\AppData\Local\Temp\gvszmt.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Impair Defenses: Safe Mode Boot
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2696
    • C:\Users\Admin\AppData\Local\Temp\gvszmt.exe
      "C:\Users\Admin\AppData\Local\Temp\gvszmt.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • System Location Discovery: System Language Discovery
      • System policy modification
      PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\xfvvbbuyrqhfpeubcufnd.jjc

    Filesize

    272B

    MD5

    7ad37d18b9c4f82a333310bdddea8b9f

    SHA1

    7ba2ac6c0bcc71572ee550af082a7b366ffa8172

    SHA256

    29af93ebde1ee4b84dec4000db45124e91c8c96b5255db554b867e58ccacc34b

    SHA512

    8c03e72d3d76fb70656fed9a2d79d91e6e23e0ab4715871fda7c2a7b2462df1a9408541839babb127061d2324d9babc9db6e8f962d62346bdad4fb2976a0f89e

  • C:\Users\Admin\AppData\Local\Temp\gvszmt.exe

    Filesize

    1.2MB

    MD5

    e50ab7103facb30382f7edfbf0deb100

    SHA1

    62b5d8d5f102d52e38cac4989db38271937f6755

    SHA256

    c8960a32f17786d7b06905556b54cbd805894573c3ca3a8d2611ddf13d4dfaa7

    SHA512

    0f7a805fec6bfbd22917912536ada0d9a6c20991b9d495d0ea11e04b6abb975659a219b63325c24f7e1c7e14b821cdd25c100936a73ade8c8b43b9bd74f4d586

  • C:\Users\Admin\AppData\Local\slmxozdswgirmmnfruqjkvmxbquegpkk.dps

    Filesize

    3KB

    MD5

    19e5b5ef9eda9b313c9f8dcc80262254

    SHA1

    35a4d69fa73546830cfe0078d79433cd9d5589e0

    SHA256

    35c4f3da1e0d2f70d918607a495724ce1ef08c03a82edf46674a2a42df0121e6

    SHA512

    21ca2480e5dac43d095e0f632e703f3bf8c4515d0a8a9c66ec3f75b8b4079101898872306381945588287afad78caec9904be0bfc3bde62d9bd21a0e7ea603ee

  • C:\Users\Admin\AppData\Local\xfvvbbuyrqhfpeubcufnd.jjc

    Filesize

    272B

    MD5

    0db56c0570ba4de5ca06cfefd7e3d7c6

    SHA1

    2f82fcad3f2a711db0ffe667f31be2cee63ea8d8

    SHA256

    69100c766f682246dc5c92a24b3175b83ed710782c699ff4b45e0962c268bca8

    SHA512

    af3cc2c1f58efedb11d60c3d26b903c7cd0a9132ef41329eac3c07faffa257547a8feb349d2a45087ae070943a75f5d621087171f6e6846c41ae7fc9d66d4b61

  • C:\Users\Admin\AppData\Local\xfvvbbuyrqhfpeubcufnd.jjc

    Filesize

    272B

    MD5

    09d8402cfb633af02561826c8f924e6e

    SHA1

    a094b087bbe2265a1b017b1de9a04e9d031d5f95

    SHA256

    3129c13b2f5f828db67e16133289e9c3a8c2ead148ed63058dd951ec9cb1262c

    SHA512

    0857d4524b385739bdcb3fb500dbce63dcbd0d91a378ab0ad9d81bf49ad63feca42c7ff4f2334144aadc5d84a07dd7b97febe87645943dc0a80626ca50967361

  • C:\Users\Admin\AppData\Local\xfvvbbuyrqhfpeubcufnd.jjc

    Filesize

    272B

    MD5

    1823a25e5591aa9e5d963483b7f8b756

    SHA1

    413ce17432a6287ac2243bdf6343fb5e6216e4cc

    SHA256

    b817ba0310e5313d751abc521e736e7a7284351fe0f820276291da49b550472b

    SHA512

    aa80e1d9fd05ce4ac22ad67077b6e76aa21afd0579fb3d2c28e198f5869ff8df562af8485fb35f190b1b4a51a2161ac3a5d66f1c523367e070f4518f78084ff0

  • C:\Users\Admin\AppData\Local\xfvvbbuyrqhfpeubcufnd.jjc

    Filesize

    272B

    MD5

    9202491a8db0c0ea63a343da28137b93

    SHA1

    a41801e38227ba96f005a80814677b5d96f7cb81

    SHA256

    2a25cfc958b16fd0ee83711a7b47e5599a658c0694027c53bf0a5d7f981e1051

    SHA512

    85cddeaf789f6ea4daa75957bb5a7ace9fd6f251a0979f102f6d0e8c2907bad744b8ceed427e271d35e45b6f79c743a64fceb7884877f2533d8444c7c1283aa7