Analysis
-
max time kernel
265s -
max time network
312s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-07-2021 20:37
Static task
static1
Behavioral task
behavioral1
Sample
haveSimpleAnd.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
haveSimpleAnd.dll
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
haveSimpleAnd.dll
-
Size
454KB
-
MD5
fdd1d81128f8fe9022d3cd6ae0f08bf1
-
SHA1
25f03defe490c9cc8455a0216e626217ca19abe5
-
SHA256
1e26ec8397bdc7b7b6ffb3169dbeb7f16ce8bd2d80398ccb0edcbd7b189d639e
-
SHA512
c3186b17f5b49b1c1d9ce102c227aa384e1a829f0e8bd682977a9bbad6b32e148b99f98f965a0608cf5d37914d8ac76d1308c3ca3c2fded7af48575bf69d70f1
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2016 created 3036 2016 regsvr32.exe Explorer.EXE -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 35 myexternalip.com 25 myexternalip.com 26 myexternalip.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2016 set thread context of 4092 2016 regsvr32.exe chrome.exe -
Discovers systems in the same network 1 TTPs 6 IoCs
Processes:
net.exenet.exenet.exenet.exenet.exenet.exepid process 3220 net.exe 3732 net.exe 2208 net.exe 732 net.exe 3776 net.exe 3392 net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
regsvr32.exechrome.exepid process 2016 regsvr32.exe 2016 regsvr32.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe PID 2016 wrote to memory of 4092 2016 regsvr32.exe chrome.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3036
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\haveSimpleAnd.dll2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092 -
C:\Windows\SYSTEM32\net.exenet view /all3⤵
- Discovers systems in the same network
PID:3776
-
-
C:\Windows\SYSTEM32\net.exenet view /all /domain3⤵
- Discovers systems in the same network
PID:3392
-
-
C:\Windows\SYSTEM32\nltest.exenltest /domain_trusts /all_trusts3⤵PID:2136
-
-
C:\Windows\SYSTEM32\net.exenet localgroup administrator3⤵PID:644
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrator4⤵PID:2756
-
-
-
C:\Windows\SYSTEM32\net.exenet group /domain admins3⤵PID:2768
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group /domain admins4⤵PID:2512
-
-
-
C:\Windows\SYSTEM32\net.exenet view /all3⤵
- Discovers systems in the same network
PID:3220
-
-
C:\Windows\SYSTEM32\net.exenet view /all /domain3⤵
- Discovers systems in the same network
PID:3732
-
-
C:\Windows\SYSTEM32\nltest.exenltest /domain_trusts /all_trusts3⤵PID:3128
-
-
C:\Windows\SYSTEM32\net.exenet localgroup administrator3⤵PID:2296
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrator4⤵PID:2516
-
-
-
C:\Windows\SYSTEM32\net.exenet group /domain admins3⤵PID:848
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group /domain admins4⤵PID:3728
-
-
-
C:\Windows\SYSTEM32\net.exenet view /all3⤵
- Discovers systems in the same network
PID:2208
-
-
C:\Windows\SYSTEM32\net.exenet view /all /domain3⤵
- Discovers systems in the same network
PID:732
-
-
C:\Windows\SYSTEM32\nltest.exenltest /domain_trusts /all_trusts3⤵PID:3864
-
-
C:\Windows\SYSTEM32\net.exenet localgroup administrator3⤵PID:1260
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrator4⤵PID:1416
-
-
-
C:\Windows\SYSTEM32\net.exenet group /domain admins3⤵PID:2288
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group /domain admins4⤵PID:2272
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\haveSimpleAnd.dll"1⤵PID:3756