Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-05-2022 23:18
Static task
static1
Behavioral task
behavioral1
Sample
0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe
Resource
win7-20220414-en
General
-
Target
0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe
-
Size
268KB
-
MD5
03f6ec5cca4b5d0eb52775125e770f07
-
SHA1
782a8fd49bbc5fe7ff3c28508561a400fc22732e
-
SHA256
0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744
-
SHA512
21a6896b3f3f2451a29aa3216d0dbb12c00b7f79f02319beaf10d5226f669cbdc3f7623e17da65d82d5320703fb9c17f713793e250d124492491cd9b19815ef8
Malware Config
Extracted
gootkit
410
parking.dynophyl.com
parked.dynonortheast.com
trktrk.eu
smeinsurances.co.uk
-
vendor_id
410
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 276 cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mstsc.exepid process 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe 1684 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exepid process 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exepid process 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exemstsc.execmd.exedescription pid process target process PID 1836 wrote to memory of 1684 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe mstsc.exe PID 1836 wrote to memory of 1684 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe mstsc.exe PID 1836 wrote to memory of 1684 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe mstsc.exe PID 1836 wrote to memory of 1684 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe mstsc.exe PID 1836 wrote to memory of 1684 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe mstsc.exe PID 1836 wrote to memory of 1684 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe mstsc.exe PID 1836 wrote to memory of 1684 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe mstsc.exe PID 1836 wrote to memory of 1684 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe mstsc.exe PID 1836 wrote to memory of 1684 1836 0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe mstsc.exe PID 1684 wrote to memory of 276 1684 mstsc.exe cmd.exe PID 1684 wrote to memory of 276 1684 mstsc.exe cmd.exe PID 1684 wrote to memory of 276 1684 mstsc.exe cmd.exe PID 1684 wrote to memory of 276 1684 mstsc.exe cmd.exe PID 276 wrote to memory of 1088 276 cmd.exe attrib.exe PID 276 wrote to memory of 1088 276 cmd.exe attrib.exe PID 276 wrote to memory of 1088 276 cmd.exe attrib.exe PID 276 wrote to memory of 1088 276 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe"C:\Users\Admin\AppData\Local\Temp\0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\mstsc.exeC:\Windows\System32\mstsc.exe "C:\Users\Admin\AppData\Local\Temp\0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7068888.bat" "C:\Users\Admin\AppData\Local\Temp\0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe""3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\0ca397cd9b4dd05d04216e1511fcfb820e91383d82f34dc003698f4fc3f11744.exe"4⤵
- Views/modifies file attributes
PID:1088
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD523f946bb0307e2aa6413e2e5408142c9
SHA107883e1ef7048e542c316f7b7e10d3fe472fd845
SHA2567324573fc38d6f074587bd6f50e3f6d4d4fa99b32eff3cefec7841ba38edbbcb
SHA5125b4958fcc817347e476a716a3c79ed2a2b76538e64385ef527046196919f21dc5100e2c9a2eba548e7a21b8abe317bdc3a3ef91a5b5d40313080754b7a2e6986