Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15/05/2022, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe
Resource
win10v2004-20220414-en
General
-
Target
b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe
-
Size
202KB
-
MD5
89d7d4d58b8691bb4227caadd098a866
-
SHA1
66babca9673d34801bd59cd17f5a9bdb1f0fb72b
-
SHA256
b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0
-
SHA512
f340ac40f71ff5baf1e175be2ab8e0be72ad83e1c08d5cabf33e26baaffae6e090b2842638ad2c21464e739301a56d27c6c6ae4771e03ae7f1617db3e3c3ce44
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 964 winswwv.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe 1680 b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsServicesUpdates32 = "C:\\Windows\\8659455516097222\\winswwv.exe" b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsServicesUpdates32 = "C:\\Windows\\8659455516097222\\winswwv.exe" b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\8659455516097222\winswwv.exe b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe File opened for modification C:\Windows\8659455516097222\winswwv.exe b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe File opened for modification C:\Windows\8659455516097222 b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 964 1680 b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe 28 PID 1680 wrote to memory of 964 1680 b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe 28 PID 1680 wrote to memory of 964 1680 b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe 28 PID 1680 wrote to memory of 964 1680 b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe"C:\Users\Admin\AppData\Local\Temp\b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\8659455516097222\winswwv.exeC:\Windows\8659455516097222\winswwv.exe2⤵
- Executes dropped EXE
PID:964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD589d7d4d58b8691bb4227caadd098a866
SHA166babca9673d34801bd59cd17f5a9bdb1f0fb72b
SHA256b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0
SHA512f340ac40f71ff5baf1e175be2ab8e0be72ad83e1c08d5cabf33e26baaffae6e090b2842638ad2c21464e739301a56d27c6c6ae4771e03ae7f1617db3e3c3ce44
-
Filesize
202KB
MD589d7d4d58b8691bb4227caadd098a866
SHA166babca9673d34801bd59cd17f5a9bdb1f0fb72b
SHA256b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0
SHA512f340ac40f71ff5baf1e175be2ab8e0be72ad83e1c08d5cabf33e26baaffae6e090b2842638ad2c21464e739301a56d27c6c6ae4771e03ae7f1617db3e3c3ce44
-
Filesize
202KB
MD589d7d4d58b8691bb4227caadd098a866
SHA166babca9673d34801bd59cd17f5a9bdb1f0fb72b
SHA256b6d8c4a6ea47d3402ad8ff1a5cf7c3b85396521a10a2049cc6a9e247290020e0
SHA512f340ac40f71ff5baf1e175be2ab8e0be72ad83e1c08d5cabf33e26baaffae6e090b2842638ad2c21464e739301a56d27c6c6ae4771e03ae7f1617db3e3c3ce44