Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 20:30
Behavioral task
behavioral1
Sample
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe
Resource
win10v2004-20240611-en
General
-
Target
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe
-
Size
7.5MB
-
MD5
c443e48d5d694f46ac75803502537d49
-
SHA1
77773230d0563684f6eb8640e67f4656c91de221
-
SHA256
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96
-
SHA512
a585eeca37705dd910bcd7599f1bbb0de035d8a337d60e47c924a6d18cb02aab3934eee799726f5044b8d7b76eed8126766b0f3b625e2d3ac187c029f8fba1b9
-
SSDEEP
196608:JXQunepn0D07Gen6765oacIo70fN4BncsGD8:JXQuneODI6kdfW7P
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exedescription ioc process File created C:\Windows\system32\drivers\Hd796Md.sys b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Z1Ldw88S4v3\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\Hd796Md.sys" b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe -
Processes:
resource yara_rule behavioral2/memory/1580-11-0x0000000000400000-0x000000000152E000-memory.dmp vmprotect behavioral2/memory/1580-20-0x0000000000400000-0x000000000152E000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exepid process 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe -
Drops file in Windows directory 1 IoCs
Processes:
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exedescription ioc process File created C:\Windows\keymou.dll b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exepid process 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exepid process 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exedescription pid process Token: SeDebugPrivilege 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe Token: SeDebugPrivilege 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe Token: SeLoadDriverPrivilege 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exepid process 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe 1580 b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe"C:\Users\Admin\AppData\Local\Temp\b7312ca08230a2fd10619f8df39da6ec1bcaff14ab3f1eda2b833bcb40f6db96.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1580-7-0x0000000003420000-0x0000000003421000-memory.dmpFilesize
4KB
-
memory/1580-6-0x0000000003410000-0x0000000003411000-memory.dmpFilesize
4KB
-
memory/1580-5-0x0000000003400000-0x0000000003401000-memory.dmpFilesize
4KB
-
memory/1580-4-0x00000000033F0000-0x00000000033F1000-memory.dmpFilesize
4KB
-
memory/1580-3-0x0000000001C30000-0x0000000001C31000-memory.dmpFilesize
4KB
-
memory/1580-2-0x0000000001C00000-0x0000000001C01000-memory.dmpFilesize
4KB
-
memory/1580-1-0x0000000001AE0000-0x0000000001AE1000-memory.dmpFilesize
4KB
-
memory/1580-0-0x0000000000B12000-0x0000000000DB5000-memory.dmpFilesize
2.6MB
-
memory/1580-11-0x0000000000400000-0x000000000152E000-memory.dmpFilesize
17.2MB
-
memory/1580-12-0x0000000010000000-0x0000000010016000-memory.dmpFilesize
88KB
-
memory/1580-19-0x0000000000B12000-0x0000000000DB5000-memory.dmpFilesize
2.6MB
-
memory/1580-20-0x0000000000400000-0x000000000152E000-memory.dmpFilesize
17.2MB