Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-05-2022 23:57
Static task
static1
Behavioral task
behavioral1
Sample
039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe
Resource
win10v2004-20220414-en
General
-
Target
039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe
-
Size
29KB
-
MD5
509c43bf877011d8e1c91c551bb3bede
-
SHA1
370d0591e61cd601b3eeadc3fe2b952bd96decdc
-
SHA256
039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f
-
SHA512
f01489e37af2c28cb7a09fee9977257e63e3c4e430aec12bac65c427d52fc5db8897c67809e5497199b2127d12501f318272499270b913de4b11fa0b4a43cc8c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
windrv.exepid process 4964 windrv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Driver = "C:\\Windows\\T-26207508265082650820840\\windrv.exe" 039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Driver = "C:\\Windows\\T-26207508265082650820840\\windrv.exe" 039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe -
Drops file in Windows directory 3 IoCs
Processes:
039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exedescription ioc process File opened for modification C:\Windows\T-26207508265082650820840 039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe File created C:\Windows\T-26207508265082650820840\windrv.exe 039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe File opened for modification C:\Windows\T-26207508265082650820840\windrv.exe 039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exedescription pid process target process PID 4160 wrote to memory of 4964 4160 039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe windrv.exe PID 4160 wrote to memory of 4964 4160 039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe windrv.exe PID 4160 wrote to memory of 4964 4160 039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe windrv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe"C:\Users\Admin\AppData\Local\Temp\039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\T-26207508265082650820840\windrv.exeC:\Windows\T-26207508265082650820840\windrv.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\T-26207508265082650820840\windrv.exeFilesize
29KB
MD5509c43bf877011d8e1c91c551bb3bede
SHA1370d0591e61cd601b3eeadc3fe2b952bd96decdc
SHA256039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f
SHA512f01489e37af2c28cb7a09fee9977257e63e3c4e430aec12bac65c427d52fc5db8897c67809e5497199b2127d12501f318272499270b913de4b11fa0b4a43cc8c
-
C:\Windows\T-26207508265082650820840\windrv.exeFilesize
29KB
MD5509c43bf877011d8e1c91c551bb3bede
SHA1370d0591e61cd601b3eeadc3fe2b952bd96decdc
SHA256039a5dec53f58c8d8b0eaa17dc16e30191003b1cb8accac40d7181e734ccc92f
SHA512f01489e37af2c28cb7a09fee9977257e63e3c4e430aec12bac65c427d52fc5db8897c67809e5497199b2127d12501f318272499270b913de4b11fa0b4a43cc8c
-
memory/4964-130-0x0000000000000000-mapping.dmp