Analysis
-
max time kernel
127s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-06-2024 13:03
Behavioral task
behavioral1
Sample
sd.exe
Resource
win7-20240220-en
General
-
Target
sd.exe
-
Size
203KB
-
MD5
cb57bb7b429df360f87e1e83566ff9a7
-
SHA1
8d03c9d0b486d0fcd2e271e0902039cdb0480705
-
SHA256
1be5176e2bdc3b3434e8dc95c902e0cfaaaf7a23fc8203b413effc121011ad30
-
SHA512
1859e20474b69aa658f723c08c6543505ebe1843d1b6eee401fb7688821485397e5d20b7589be81d4f0ad7071120be6b9595bfe82e096c85126dc282472f47b8
-
SSDEEP
6144:sLV6Bta6dtJmakIM5O/Uj1i3VmcHhyT9O+PjmdR/Fyr:sLV6BtpmkV/UJilzHhUO+yd6
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
sd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Subsystem = "C:\\Program Files (x86)\\TCP Subsystem\\tcpss.exe" sd.exe -
Processes:
sd.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sd.exe -
Drops file in Program Files directory 2 IoCs
Processes:
sd.exedescription ioc process File created C:\Program Files (x86)\TCP Subsystem\tcpss.exe sd.exe File opened for modification C:\Program Files (x86)\TCP Subsystem\tcpss.exe sd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4877C421-3161-11EF-9680-DA96D1126947} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2516 schtasks.exe 2664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
sd.exepid process 2872 sd.exe 2872 sd.exe 2872 sd.exe 2872 sd.exe 2872 sd.exe 2872 sd.exe 2872 sd.exe 2872 sd.exe 2872 sd.exe 2872 sd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
sd.exepid process 2872 sd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
sd.exedescription pid process Token: SeDebugPrivilege 2872 sd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2388 iexplore.exe 2388 iexplore.exe 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE 604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
sd.exeiexplore.exedescription pid process target process PID 2872 wrote to memory of 2516 2872 sd.exe schtasks.exe PID 2872 wrote to memory of 2516 2872 sd.exe schtasks.exe PID 2872 wrote to memory of 2516 2872 sd.exe schtasks.exe PID 2872 wrote to memory of 2516 2872 sd.exe schtasks.exe PID 2872 wrote to memory of 2664 2872 sd.exe schtasks.exe PID 2872 wrote to memory of 2664 2872 sd.exe schtasks.exe PID 2872 wrote to memory of 2664 2872 sd.exe schtasks.exe PID 2872 wrote to memory of 2664 2872 sd.exe schtasks.exe PID 2872 wrote to memory of 2388 2872 sd.exe iexplore.exe PID 2872 wrote to memory of 2388 2872 sd.exe iexplore.exe PID 2872 wrote to memory of 2388 2872 sd.exe iexplore.exe PID 2872 wrote to memory of 2388 2872 sd.exe iexplore.exe PID 2388 wrote to memory of 604 2388 iexplore.exe IEXPLORE.EXE PID 2388 wrote to memory of 604 2388 iexplore.exe IEXPLORE.EXE PID 2388 wrote to memory of 604 2388 iexplore.exe IEXPLORE.EXE PID 2388 wrote to memory of 604 2388 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\sd.exe"C:\Users\Admin\AppData\Local\Temp\sd.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "TCP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp29BF.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "TCP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2A3D.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\image.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ae2504678871cb19b84b2401270c06e2
SHA175d6a85b06d2ee5fff03aa75205f1581353dc47c
SHA256a30b4d6b26cdbd919c5e01ec739c3f169808476f13b2f002fe190106a185bc9c
SHA512a55f1a4215a6ae70e31c8e164fffa881d24029be15879efd4231f6f62eb2c559aad72071578e13093af49cbc5a5abbea9dff26187b74421a3bc3c129c3482bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52a86c2293c4ffcc2d72e6ffe6410be39
SHA1a4489b4da39c8cd46b273f0a2cbe8fa7722534a1
SHA2568a40bc7e82be520f30466fa8604e1505766d8b18695cba2d00643a7903fe0f8d
SHA5120f196bea1b4aa1ff4b0e9779da6a3bc44c3b72a38ff7bf0c1509feb69d0c15101a678e40734d692e25d84b1cf2818db08821e6086c989daf543a40425c4e60cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5543c256ff6613ad4f0b6582833492251
SHA1dce8a8b3bdaae27ad0dc533b919a241e24e245e3
SHA25601b92920462597c836a54018fee8c44f926e449e38303b5c53654c36bca8aa99
SHA5124d47458f1eccff7f71157d129a5dc080dc8b4223c5233809007572936efed392dce433caabbaa058b424afe87d967a1393212963ba619257b0005f5c55f3a41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55a10634ba1240bf658e5b1410040f3a4
SHA1ec05afa39b17eb2d110f1a6b44dbeebcecade6df
SHA256389d3fb3e6a0c5370f11e94be37d6a25e9a8a8415c8a9087b413afafe2df7d78
SHA51291d0e29de195bd9b68740c779b46fa9e40dd9d84c8e7d772b1c5985f31261f4e279c639dbcb2ba10a1165d24c09eb96444792b552d0495c249e2c855c6719e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD505e57fee8c3c21aca202ba17f3db711e
SHA10bc0fac315cef4861a1aead69b9d2177882978d1
SHA256d183a10f388940b3a1e391e81378539997b7521648dc51e0e0619730cfb8f55a
SHA5122546330811f63af8a29fbdb7f777647c445fec1cc1b8c45ec77c5b1eca3d122aa2bf9f81554eafd735fdaa47d421fb9df1143a3656b46b2d1f94903af3842bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c87b5d74244e7edce82b927529cb9104
SHA1d416a35d3db19ade1ab620ae050700e3f3d1cd97
SHA256ea49cbf230769ded3a2caccac14cbd3f889c72885eadf5a5d0c75a9dd74e9e73
SHA51247d4351bda904eaa842b4734e417a800201107e3b321644c1ca5d87609f80dcffeb3d6c8ac23be1f2d77f2525f5ff2555083aa3c249fd478d156d67816ae8bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e6a9d1205a77e088eb7835865c7b4b8e
SHA1f750182fbe0ec5670b9fb225ad10f9da52e22c0f
SHA25645a11aeae3088be74c3b1929d9b07c151824d657c8049f67375070cac4211bbb
SHA512ea8e479b494e66601731e2053f42731142714495676af012ec1affb0c617732a3567d76eb53960aaa6a4433eb1aa522805b983025b868ec4c91bdd29a33f7f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d9b34eee5626247ca8e03e570c119e6b
SHA13467822363110e232332c8cf5c9b7755f95edcda
SHA256f24e15e5433edb4297f360c6e35aa9cdbb93b82d643b0f878c07fb9eae232453
SHA5120d3a709313bd60a3454a725c74210c3b783908a114038051311e5d24b3b5dd8581cc76cc2b604a10683c1d7c4d144075727fb0be2f0baa62645efb93a6c85e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f6d12049624e8011dda0351095d0c0ec
SHA189462cdc39d277855bc2b461a3a46f999d14cfe7
SHA2563324277f01c04bfe00fe8bdc1ecfc16fbf365db86b65db558ad00eef72671a03
SHA51277ce0bc8a0fb4b964a6a23e9038d3a888cba08b24d2404cde8974a6d1aa6478ef72a191831ebcd5f84242cac3c680b7c6551ead26ec90f10ad232911a8ef270d
-
C:\Users\Admin\AppData\Local\Temp\Cab11BF.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar12A3.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Local\Temp\image.gifFilesize
14KB
MD52883fecb93bd0f19e05b9d397149b2ca
SHA19fd918c9d67451a0726189807891949aee538414
SHA256372886c9978c664cc9e0fc3c74aa89b946c40a8de2e9e848ddf8796f8fcc2303
SHA512281683324e4458e0d6a8758f9ea3d4471a610dcb8e925c5a0569e93e3c9616c27fdeb0e6c00fa10aabf0c1e0614c13815f2515b0fd9e67b6641e8c8c019a4d28
-
C:\Users\Admin\AppData\Local\Temp\tmp29BF.tmpFilesize
1KB
MD5f7d890eac080bcc878916c23c4b34c3d
SHA1efa80352399bfd5c91b958dbc45228560e3a2b7e
SHA256a7c1ea9b3651907399af17cb4bbaa5696b6a4f0bdcb04640842fa7af3bf0a670
SHA512a03dfd061d8fe7d01333fbdc641a92d9daa56dd21758ce788ea3a5114de16fcc37acd5f7bb0aaad5b23dc74c50ce51ab80603f429bd61292d81497ce68287085
-
C:\Users\Admin\AppData\Local\Temp\tmp2A3D.tmpFilesize
1KB
MD54b7ef560289c0f62d0baf6f14f48a57a
SHA18331acb90dde588aa3196919f6e847f398fd06d1
SHA256062844155306130d6fafc4fe10ac9e5ddd2ed462532b729c50cdc979c0d83207
SHA512ecaa27c4b703d95f9f9b37d8c339982970482e7dab968c2010e0aa644bbfa31973111aafb827565af30c423d1d14e4ff997ec149614e713ff7ef3456894d02d8
-
memory/2872-0-0x0000000074A41000-0x0000000074A42000-memory.dmpFilesize
4KB
-
memory/2872-14-0x0000000074A40000-0x0000000074FEB000-memory.dmpFilesize
5.7MB
-
memory/2872-13-0x0000000074A40000-0x0000000074FEB000-memory.dmpFilesize
5.7MB
-
memory/2872-2-0x0000000074A40000-0x0000000074FEB000-memory.dmpFilesize
5.7MB
-
memory/2872-1-0x0000000074A40000-0x0000000074FEB000-memory.dmpFilesize
5.7MB