Analysis

  • max time kernel
    151s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    31-08-2021 12:33

General

  • Target

    ssms.exe

  • Size

    155KB

  • MD5

    14a09a48ad23fe0ea5a180bee8cb750a

  • SHA1

    ac3cdd673f5126bc49faa72fb52284f513929db4

  • SHA256

    b14ccb3786af7553f7c251623499a7fe67974dde69d3dffd65733871cddf6b6d

  • SHA512

    3f11e6f0fb03f2857f29f4ba296dd4fdbda93938b1516a80c18d656d67175fec910727ca447c7217e8edf9a160d9c7c02ebd9f35081a0071247d572d960e9734

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 20 IoCs
  • Drops file in System32 directory 22 IoCs
  • Runs .reg file with regedit 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ssms.exe
    "C:\Users\Admin\AppData\Local\Temp\ssms.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\a.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Windows\SysWOW64\regedit.exe
        REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
        3⤵
        • Modifies security service
        • Runs .reg file with regedit
        PID:572
    • C:\Windows\SysWOW64\ssms.exe
      C:\Windows\system32\ssms.exe 472 "C:\Users\Admin\AppData\Local\Temp\ssms.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\Windows\SysWOW64\ssms.exe
        C:\Windows\system32\ssms.exe 544 "C:\Windows\SysWOW64\ssms.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c c:\a.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:940
          • C:\Windows\SysWOW64\regedit.exe
            REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
            5⤵
            • Modifies security service
            • Runs .reg file with regedit
            PID:1636
        • C:\Windows\SysWOW64\ssms.exe
          C:\Windows\system32\ssms.exe 552 "C:\Windows\SysWOW64\ssms.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:1696
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c c:\a.bat
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1060
            • C:\Windows\SysWOW64\regedit.exe
              REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
              6⤵
              • Modifies security service
              • Runs .reg file with regedit
              PID:1076
          • C:\Windows\SysWOW64\ssms.exe
            C:\Windows\system32\ssms.exe 548 "C:\Windows\SysWOW64\ssms.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:296
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c c:\a.bat
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2004
              • C:\Windows\SysWOW64\regedit.exe
                REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                7⤵
                • Modifies security service
                • Runs .reg file with regedit
                PID:1116
            • C:\Windows\SysWOW64\ssms.exe
              C:\Windows\system32\ssms.exe 556 "C:\Windows\SysWOW64\ssms.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:1096
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c c:\a.bat
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:980
              • C:\Windows\SysWOW64\ssms.exe
                C:\Windows\system32\ssms.exe 560 "C:\Windows\SysWOW64\ssms.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                PID:1508
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c c:\a.bat
                  8⤵
                    PID:516
                    • C:\Windows\SysWOW64\regedit.exe
                      REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                      9⤵
                      • Modifies security service
                      • Runs .reg file with regedit
                      PID:984
                  • C:\Windows\SysWOW64\ssms.exe
                    C:\Windows\system32\ssms.exe 568 "C:\Windows\SysWOW64\ssms.exe"
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    PID:1624
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c c:\a.bat
                      9⤵
                        PID:696
                        • C:\Windows\SysWOW64\regedit.exe
                          REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                          10⤵
                          • Modifies security service
                          • Runs .reg file with regedit
                          PID:1852
                      • C:\Windows\SysWOW64\ssms.exe
                        C:\Windows\system32\ssms.exe 564 "C:\Windows\SysWOW64\ssms.exe"
                        9⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        PID:1736
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c c:\a.bat
                          10⤵
                            PID:1756
                            • C:\Windows\SysWOW64\regedit.exe
                              REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                              11⤵
                              • Modifies security service
                              • Runs .reg file with regedit
                              PID:824
                          • C:\Windows\SysWOW64\ssms.exe
                            C:\Windows\system32\ssms.exe 576 "C:\Windows\SysWOW64\ssms.exe"
                            10⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            PID:508
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c c:\a.bat
                              11⤵
                                PID:428
                                • C:\Windows\SysWOW64\regedit.exe
                                  REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                                  12⤵
                                  • Modifies security service
                                  • Runs .reg file with regedit
                                  PID:1972
                              • C:\Windows\SysWOW64\ssms.exe
                                C:\Windows\system32\ssms.exe 572 "C:\Windows\SysWOW64\ssms.exe"
                                11⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                PID:1988
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c c:\a.bat
                                  12⤵
                                    PID:936
                                    • C:\Windows\SysWOW64\regedit.exe
                                      REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                                      13⤵
                                      • Modifies security service
                                      • Runs .reg file with regedit
                                      PID:1000
            • C:\Windows\SysWOW64\regedit.exe
              REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
              1⤵
              • Modifies security service
              • Runs .reg file with regedit
              PID:1252

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2024-61-0x00000000760B1000-0x00000000760B3000-memory.dmp

              Filesize

              8KB