Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-07-2022 08:50
Static task
static1
Behavioral task
behavioral1
Sample
4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe
Resource
win10v2004-20220414-en
General
-
Target
4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe
-
Size
165KB
-
MD5
567cb2370a3c5521b1c343cce23126ac
-
SHA1
8fff0c1f83a78165d15711dc9dc6746c10299edf
-
SHA256
4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e
-
SHA512
fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b
Malware Config
Extracted
buer
frrn8--_tgp_qsnnmpr,gldm86.6.-
cook5**\qdm\npkkjmo)diaj53+3+*
Signatures
-
resource yara_rule behavioral1/memory/1688-61-0x00000000002A0000-0x00000000002A9000-memory.dmp buer behavioral1/memory/1688-62-0x0000000040000000-0x0000000041000000-memory.dmp buer behavioral1/memory/776-71-0x0000000040000000-0x0000000041000000-memory.dmp buer behavioral1/memory/776-82-0x0000000040000000-0x0000000041000000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 776 manager.exe -
Deletes itself 1 IoCs
pid Process 776 manager.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe 1688 4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 776 manager.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1688 wrote to memory of 776 1688 4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe 27 PID 1688 wrote to memory of 776 1688 4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe 27 PID 1688 wrote to memory of 776 1688 4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe 27 PID 1688 wrote to memory of 776 1688 4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe 27 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28 PID 776 wrote to memory of 1980 776 manager.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe"C:\Users\Admin\AppData\Local\Temp\4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\4bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵PID:1980
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD5567cb2370a3c5521b1c343cce23126ac
SHA18fff0c1f83a78165d15711dc9dc6746c10299edf
SHA2564bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e
SHA512fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b
-
Filesize
165KB
MD5567cb2370a3c5521b1c343cce23126ac
SHA18fff0c1f83a78165d15711dc9dc6746c10299edf
SHA2564bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e
SHA512fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b
-
Filesize
165KB
MD5567cb2370a3c5521b1c343cce23126ac
SHA18fff0c1f83a78165d15711dc9dc6746c10299edf
SHA2564bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e
SHA512fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b
-
Filesize
165KB
MD5567cb2370a3c5521b1c343cce23126ac
SHA18fff0c1f83a78165d15711dc9dc6746c10299edf
SHA2564bc5903e3f847e2c0944215a52168fb4e7db034eb5724e2840b3396029cdfb0e
SHA512fed721ecf3d5f68e5cfe79466bf02ed8d0e4830cac60efee1af0ba8eba84f25651f041391aec37dfc6e84e454b56f4167d84c3df425e9441433be7d3b3a0c94b