Analysis
-
max time kernel
146s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe
Resource
win10v2004-20220812-en
General
-
Target
bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe
-
Size
295KB
-
MD5
a14af4090402ebf401341ea892a73996
-
SHA1
709ae1754821921eaa9570b77ef56bc8fdbcda37
-
SHA256
bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816
-
SHA512
45fe13f4383af42935539694320a5791e9e05aa7faab1d81d83f4caa671e8a59de818c9538bcbf750d5f13e9e8a14b5c9199da1fcc4507b379fff5d270f06cde
-
SSDEEP
6144:XFOXUAadJYiZo0/pitBvvmpsmwRog2ZBG1ScCGp3Fkh4:XAXU/n/o0/pitBmpsmwR4ZB4CGp3Fk
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1360 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe 28 PID 2012 wrote to memory of 1360 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe 28 PID 2012 wrote to memory of 1360 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe 28 PID 2012 wrote to memory of 1360 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe 28 PID 2012 wrote to memory of 1360 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe 28 PID 2012 wrote to memory of 1360 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe 28 PID 2012 wrote to memory of 1360 2012 bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe"C:\Users\Admin\AppData\Local\Temp\bd1b0207b0431c94627254179e1c44cd116e24af9c8b3fb7b55aa3adc7b83816.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD50c1b3a560336a2da0b1b085da65033ff
SHA1f1464b49f243c8930d94bab899a16b03014a2bad
SHA256953483217e070698e56f6e98afbff4d895ee0ca3312dd5c38875428275afd039
SHA512d97806a470013edaac05dde1c6b8be49391e4069993364dc3291b7428665e4e07a80b55509cd69d2f6905ca95c193bf0f7a064fb3f0c808a1a9a35f5644ff646
-
Filesize
237KB
MD50c1b3a560336a2da0b1b085da65033ff
SHA1f1464b49f243c8930d94bab899a16b03014a2bad
SHA256953483217e070698e56f6e98afbff4d895ee0ca3312dd5c38875428275afd039
SHA512d97806a470013edaac05dde1c6b8be49391e4069993364dc3291b7428665e4e07a80b55509cd69d2f6905ca95c193bf0f7a064fb3f0c808a1a9a35f5644ff646
-
Filesize
237KB
MD50c1b3a560336a2da0b1b085da65033ff
SHA1f1464b49f243c8930d94bab899a16b03014a2bad
SHA256953483217e070698e56f6e98afbff4d895ee0ca3312dd5c38875428275afd039
SHA512d97806a470013edaac05dde1c6b8be49391e4069993364dc3291b7428665e4e07a80b55509cd69d2f6905ca95c193bf0f7a064fb3f0c808a1a9a35f5644ff646
-
Filesize
237KB
MD50c1b3a560336a2da0b1b085da65033ff
SHA1f1464b49f243c8930d94bab899a16b03014a2bad
SHA256953483217e070698e56f6e98afbff4d895ee0ca3312dd5c38875428275afd039
SHA512d97806a470013edaac05dde1c6b8be49391e4069993364dc3291b7428665e4e07a80b55509cd69d2f6905ca95c193bf0f7a064fb3f0c808a1a9a35f5644ff646
-
Filesize
237KB
MD50c1b3a560336a2da0b1b085da65033ff
SHA1f1464b49f243c8930d94bab899a16b03014a2bad
SHA256953483217e070698e56f6e98afbff4d895ee0ca3312dd5c38875428275afd039
SHA512d97806a470013edaac05dde1c6b8be49391e4069993364dc3291b7428665e4e07a80b55509cd69d2f6905ca95c193bf0f7a064fb3f0c808a1a9a35f5644ff646
-
Filesize
237KB
MD50c1b3a560336a2da0b1b085da65033ff
SHA1f1464b49f243c8930d94bab899a16b03014a2bad
SHA256953483217e070698e56f6e98afbff4d895ee0ca3312dd5c38875428275afd039
SHA512d97806a470013edaac05dde1c6b8be49391e4069993364dc3291b7428665e4e07a80b55509cd69d2f6905ca95c193bf0f7a064fb3f0c808a1a9a35f5644ff646