Overview
overview
9Static
static
8080540b15c...f5.exe
windows7_x64
8080540b15c...f5.exe
windows10_x64
816937c50e9...9a.exe
windows7_x64
916937c50e9...9a.exe
windows10_x64
92fc4602468...5b.exe
windows7_x64
82fc4602468...5b.exe
windows10_x64
32fd826bdb8...14.exe
windows7_x64
82fd826bdb8...14.exe
windows10_x64
8cool summer.exe
windows7_x64
3cool summer.exe
windows10_x64
3iext3.fne.dll
windows7_x64
1iext3.fne.dll
windows10_x64
1krnln.fnr.dll
windows7_x64
1krnln.fnr.dll
windows10_x64
1xplib.fne.dll
windows7_x64
1xplib.fne.dll
windows10_x64
14373d18b2b...83.exe
windows7_x64
84373d18b2b...83.exe
windows10_x64
8485e37b429...f9.exe
windows7_x64
1485e37b429...f9.exe
windows10_x64
159c049de6d...14.exe
windows7_x64
859c049de6d...14.exe
windows10_x64
8641da56f29...fc.exe
windows7_x64
9641da56f29...fc.exe
windows10_x64
964b4fe7baf...60.exe
windows7_x64
164b4fe7baf...60.exe
windows10_x64
174368a064e...e0.exe
windows7_x64
874368a064e...e0.exe
windows10_x64
8c087a84574...ce.exe
windows7_x64
7c087a84574...ce.exe
windows10_x64
390eca63d6a...52.exe
windows7_x64
890eca63d6a...52.exe
windows10_x64
3Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-03-2021 23:08
Behavioral task
behavioral1
Sample
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
080540b15c90a082697cfa8fa08e0d31ab4e8d12035b69df52a71da41f5e7bf5.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
16937c50e9597e6d3ce66dc15632eee53ad10c32bb077d53baf0c4368b8a359a.exe
Resource
win7v20201028
Behavioral task
behavioral4
Sample
16937c50e9597e6d3ce66dc15632eee53ad10c32bb077d53baf0c4368b8a359a.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
2fc4602468f243f742b496683ee9bd6ff22c4c85b56567eff3df2bf7ef5c495b.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
2fc4602468f243f742b496683ee9bd6ff22c4c85b56567eff3df2bf7ef5c495b.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
2fd826bdb83c394de8e5c660cb4af4885e071c96db236e80503b3c4ef048b414.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
2fd826bdb83c394de8e5c660cb4af4885e071c96db236e80503b3c4ef048b414.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
cool summer.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
cool summer.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
iext3.fne.dll
Resource
win7v20201028
Behavioral task
behavioral12
Sample
iext3.fne.dll
Resource
win10v20201028
Behavioral task
behavioral13
Sample
krnln.fnr.dll
Resource
win7v20201028
Behavioral task
behavioral14
Sample
krnln.fnr.dll
Resource
win10v20201028
Behavioral task
behavioral15
Sample
xplib.fne.dll
Resource
win7v20201028
Behavioral task
behavioral16
Sample
xplib.fne.dll
Resource
win10v20201028
Behavioral task
behavioral17
Sample
4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe
Resource
win7v20201028
Behavioral task
behavioral18
Sample
4373d18b2bf09478387fc4e762cf29d6a9ba886e2f39dd4353fb6e8b33fee083.exe
Resource
win10v20201028
Behavioral task
behavioral19
Sample
485e37b429bee1807d1cc52afa3de654928bd2a17f71b028abe71b1abac7e3f9.exe
Resource
win7v20201028
Behavioral task
behavioral20
Sample
485e37b429bee1807d1cc52afa3de654928bd2a17f71b028abe71b1abac7e3f9.exe
Resource
win10v20201028
Behavioral task
behavioral21
Sample
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe
Resource
win7v20201028
Behavioral task
behavioral22
Sample
59c049de6d7f42e5739b586fe1fe0dff6318328555f82a71080d03763d08d314.exe
Resource
win10v20201028
Behavioral task
behavioral23
Sample
641da56f29c645a544f19c88f54c1dfcf3a7f52711c5b0ff8826cf36bbaef3fc.exe
Resource
win7v20201028
Behavioral task
behavioral24
Sample
641da56f29c645a544f19c88f54c1dfcf3a7f52711c5b0ff8826cf36bbaef3fc.exe
Resource
win10v20201028
Behavioral task
behavioral25
Sample
64b4fe7baf53d40ac6ab1fd13bdcedb48f38b37c76d792b93da00bc3ba195260.exe
Resource
win7v20201028
Behavioral task
behavioral26
Sample
64b4fe7baf53d40ac6ab1fd13bdcedb48f38b37c76d792b93da00bc3ba195260.exe
Resource
win10v20201028
Behavioral task
behavioral27
Sample
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe
Resource
win7v20201028
Behavioral task
behavioral28
Sample
74368a064edba03fecd56aeb572127318861fc9b9d14851cd46029cd5a270ee0.exe
Resource
win10v20201028
Behavioral task
behavioral29
Sample
c087a84574092eba9510c17f425853ce.exe
Resource
win7v20201028
Behavioral task
behavioral30
Sample
c087a84574092eba9510c17f425853ce.exe
Resource
win10v20201028
Behavioral task
behavioral31
Sample
90eca63d6ac05c375af58247435cea9fa724335f946e4576986a25a553dcb852.exe
Resource
win7v20201028
Behavioral task
behavioral32
Sample
90eca63d6ac05c375af58247435cea9fa724335f946e4576986a25a553dcb852.exe
Resource
win10v20201028
General
-
Target
c087a84574092eba9510c17f425853ce.exe
-
Size
128KB
-
MD5
c087a84574092eba9510c17f425853ce
-
SHA1
015a499f638d2c3bbb453ca98b31a3ac6203b2b7
-
SHA256
2a56e792c187c3b59f0f62b58dcd92d8137581ad83eeff0b86c120e78c3bba13
-
SHA512
68df03dc8ccc6d386f4c00c2491c0ce0e337af3f46c89bb586894901215280ec171a032b6913fe6201f92324c1cdc049f0515e9b65170352957cf0d19eec21ce
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosdate svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c087a84574092eba9510c17f425853ce.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aaaaaaaa = "C:\\Windows\\System32\\aaaaaaaa.exe" c087a84574092eba9510c17f425853ce.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\aaaaaaaa = "C:\\Users\\Admin\\aaaaaaaa.exe" c087a84574092eba9510c17f425853ce.exe -
Drops file in System32 directory 1 IoCs
Processes:
c087a84574092eba9510c17f425853ce.exedescription ioc process File created C:\Windows\SysWOW64\aaaaaaaa.exe c087a84574092eba9510c17f425853ce.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c087a84574092eba9510c17f425853ce.exedescription pid process target process PID 1668 set thread context of 1112 1668 c087a84574092eba9510c17f425853ce.exe svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c087a84574092eba9510c17f425853ce.exedescription pid process target process PID 1668 wrote to memory of 1112 1668 c087a84574092eba9510c17f425853ce.exe svchost.exe PID 1668 wrote to memory of 1112 1668 c087a84574092eba9510c17f425853ce.exe svchost.exe PID 1668 wrote to memory of 1112 1668 c087a84574092eba9510c17f425853ce.exe svchost.exe PID 1668 wrote to memory of 1112 1668 c087a84574092eba9510c17f425853ce.exe svchost.exe PID 1668 wrote to memory of 1112 1668 c087a84574092eba9510c17f425853ce.exe svchost.exe PID 1668 wrote to memory of 1112 1668 c087a84574092eba9510c17f425853ce.exe svchost.exe PID 1668 wrote to memory of 1112 1668 c087a84574092eba9510c17f425853ce.exe svchost.exe PID 1668 wrote to memory of 1112 1668 c087a84574092eba9510c17f425853ce.exe svchost.exe PID 1668 wrote to memory of 1112 1668 c087a84574092eba9510c17f425853ce.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c087a84574092eba9510c17f425853ce.exe"C:\Users\Admin\AppData\Local\Temp\c087a84574092eba9510c17f425853ce.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe2⤵
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1112-3-0x0000000009500000-0x0000000009508000-memory.dmpFilesize
32KB
-
memory/1112-4-0x0000000009504E30-mapping.dmp
-
memory/1112-5-0x0000000009500000-0x0000000009508000-memory.dmpFilesize
32KB
-
memory/1668-2-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB