Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe
Resource
win10v2004-20220812-en
General
-
Target
7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe
-
Size
330KB
-
MD5
764772ca64e7b13b950a836fd0929d02
-
SHA1
705776f233dba5d236a09da19f0947c3c20c6d56
-
SHA256
7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9
-
SHA512
1f2558a68bd7a77aa1c7ec35493fb1fff4dcf1085158bb3014a1a514039b4e7c5df86c12f305336efeb5639f862e177b1e2d7efbc9a11b7949e77a5a75e52235
-
SSDEEP
6144:7YjQLUDaUgfygVpaUhxt2U+e029uBVUSFa8Bt2RsDT3XorSvVnBvVE69+lg:7XUDa5fhPa4EdqkVUSPdorS9BtE69Mg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1128 system32.exe 2020 system32.exe -
resource yara_rule behavioral1/memory/864-55-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/864-57-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/864-61-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/864-62-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/864-63-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/864-79-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2020-82-0x0000000000400000-0x00000000004FA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Data Serivce = "system32.exe" 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1504 set thread context of 864 1504 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 28 PID 1128 set thread context of 2020 1128 system32.exe 30 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system32.exe 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe File opened for modification C:\Windows\system32.exe 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1504 wrote to memory of 864 1504 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 28 PID 1504 wrote to memory of 864 1504 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 28 PID 1504 wrote to memory of 864 1504 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 28 PID 1504 wrote to memory of 864 1504 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 28 PID 1504 wrote to memory of 864 1504 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 28 PID 1504 wrote to memory of 864 1504 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 28 PID 1504 wrote to memory of 864 1504 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 28 PID 1504 wrote to memory of 864 1504 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 28 PID 864 wrote to memory of 1128 864 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 29 PID 864 wrote to memory of 1128 864 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 29 PID 864 wrote to memory of 1128 864 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 29 PID 864 wrote to memory of 1128 864 7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe 29 PID 1128 wrote to memory of 2020 1128 system32.exe 30 PID 1128 wrote to memory of 2020 1128 system32.exe 30 PID 1128 wrote to memory of 2020 1128 system32.exe 30 PID 1128 wrote to memory of 2020 1128 system32.exe 30 PID 1128 wrote to memory of 2020 1128 system32.exe 30 PID 1128 wrote to memory of 2020 1128 system32.exe 30 PID 1128 wrote to memory of 2020 1128 system32.exe 30 PID 1128 wrote to memory of 2020 1128 system32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe"C:\Users\Admin\AppData\Local\Temp\7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe"C:\Users\Admin\AppData\Local\Temp\7f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\system32.exe"C:\Windows\system32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32.exe"C:\Windows\system32.exe"4⤵
- Executes dropped EXE
PID:2020
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330KB
MD5764772ca64e7b13b950a836fd0929d02
SHA1705776f233dba5d236a09da19f0947c3c20c6d56
SHA2567f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9
SHA5121f2558a68bd7a77aa1c7ec35493fb1fff4dcf1085158bb3014a1a514039b4e7c5df86c12f305336efeb5639f862e177b1e2d7efbc9a11b7949e77a5a75e52235
-
Filesize
330KB
MD5764772ca64e7b13b950a836fd0929d02
SHA1705776f233dba5d236a09da19f0947c3c20c6d56
SHA2567f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9
SHA5121f2558a68bd7a77aa1c7ec35493fb1fff4dcf1085158bb3014a1a514039b4e7c5df86c12f305336efeb5639f862e177b1e2d7efbc9a11b7949e77a5a75e52235
-
Filesize
330KB
MD5764772ca64e7b13b950a836fd0929d02
SHA1705776f233dba5d236a09da19f0947c3c20c6d56
SHA2567f157376267eef65c918cb71945bcd8baf23715fc22815d2de3457c6e024d3a9
SHA5121f2558a68bd7a77aa1c7ec35493fb1fff4dcf1085158bb3014a1a514039b4e7c5df86c12f305336efeb5639f862e177b1e2d7efbc9a11b7949e77a5a75e52235