Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 20:39
Static task
static1
Behavioral task
behavioral1
Sample
1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe
Resource
win10v2004-20220812-en
General
-
Target
1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe
-
Size
56KB
-
MD5
f64ccbc901901c142778923c42a6e582
-
SHA1
214ec7d3082028bcf42a2f7e86917c2d40b9611b
-
SHA256
1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136
-
SHA512
6571b0c2590b9f60b86515a03ca05bbcfbce3d5f01243b91e4870d465439823551ac4129c4fb520215347b96a1a9223faa5aaffceaa0a4fdbe50cdd7a62e08d9
-
SSDEEP
768:huxJmUepbOSJr8UzFr4DhlWerv1NwF326QI2:hqJtLUzNehlWQ1CM6P
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
dwm.exepid process 4968 dwm.exe -
Loads dropped DLL 2 IoCs
Processes:
1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exepid process 1092 1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe 1092 1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
mstsc.exedescription ioc process File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\F: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\N: mstsc.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
mstsc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\TSRedirFlags mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Device Parameters mstsc.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
mstsc.exepid process 808 mstsc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
mstsc.exepid process 808 mstsc.exe 808 mstsc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exemstsc.exepid process 1092 1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe 808 mstsc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exemstsc.exedescription pid process target process PID 1092 wrote to memory of 4044 1092 1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe mstsc.exe PID 1092 wrote to memory of 4044 1092 1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe mstsc.exe PID 1092 wrote to memory of 4044 1092 1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe mstsc.exe PID 4044 wrote to memory of 808 4044 mstsc.exe mstsc.exe PID 4044 wrote to memory of 808 4044 mstsc.exe mstsc.exe PID 1092 wrote to memory of 4968 1092 1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe dwm.exe PID 1092 wrote to memory of 4968 1092 1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe dwm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe"C:\Users\Admin\AppData\Local\Temp\1720e833db94e2388213e8dbfd8589819ddc8525295c9e2e6df61c2c6446f136.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\mstsc.exemstsc.exe /v:122.128.123.178:3389 /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mstsc.exemstsc.exe /v:122.128.123.178:3389 /f3⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\users\Public\documents\dwm.exeC://users/Public/documents/dwm.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\Documents\RDSv1.dllFilesize
24KB
MD536f3b718deda0cebb65487b2a0b56678
SHA15a9a0c523641184d2829155100bd875491be1f5a
SHA2562fca90ac0ae35ef4dd9a99451dc4754bcd53c59ba97c121ffd3e62034b1ecefa
SHA512a30fddfe2526673b2eec78eab91b0a0afcf34e061fee4a3202262a830f94205ecd6d89cdb604abd4ae18027cc122ec2bd8495060a810262e6728f7aac2233e5c
-
C:\Users\Public\Documents\Text.txtFilesize
109KB
MD581fdb130a76c6315ce98a28e2caea772
SHA1f2965c3571ec298193a02bf7aa126af4faa8b846
SHA2562900531b2df0712e1687ebc17901d5a6d90e8ff2d47650056d748344fc3d467a
SHA512f5e701737121341223caebd1e8ed05a2ef71d2c8f3bce0b673bbd316d928ae3083e8fe2684efa45c5593777f912ab3dac9d3f76a75bda02e5d1d4c64b0d8d04d
-
C:\Users\Public\Documents\calc.dllFilesize
87KB
MD5225d9c27f41c841980c170d65b4d31dd
SHA12b1381e305c05660b26dd7c571d9b02df88a3f4d
SHA2560d82363a422c876fae84ca27b2b72ab3286ffdf8a2632350bc64680cb8d36de9
SHA5127eca920d383de3e3440225a5ca5930f130bba1f5155dc37920654493130ae3f3073a1eec731eed1b56355700a18d74cf0901b627226350d4d40224e2e5265966
-
C:\Users\Public\Documents\dwm.exeFilesize
6KB
MD568288c9c86bcd4dbad9f93294926b29b
SHA19b177ba5a3d22eaf89cb94b3cacf47b6dcdb4496
SHA256720f10d44aa351453f0cc1fbe463de79e4a6f148bbad369dd1295b1b416b07bc
SHA51248fa5027527d9f139440cb9ef355bca906d654d7b20ad0a98eb89924f12e7fcae0f041afba8c300e62cc79ce6aaf32f4116b88ebd37397c79a873a8ff6942ee6
-
C:\users\Public\documents\ClassLibrary2.dllFilesize
5KB
MD5ea309f547d484a9506978a64b46e1759
SHA15487372323411688d34d5137627c1c5d32d42974
SHA256ea02454269f1059e6d9157a1914e60c2f739d5e185801aeb713dc9eafc4ba9d7
SHA51296328f93e81a8a930bb65f9266f0fd700db5e01a9dcc28c37be49df76733d01d74ee2437d3b1fa4d7aa70baf75a7dffc7d598cc8f2ce581aa030dcb23983988f
-
C:\users\Public\documents\dwm.exeFilesize
6KB
MD568288c9c86bcd4dbad9f93294926b29b
SHA19b177ba5a3d22eaf89cb94b3cacf47b6dcdb4496
SHA256720f10d44aa351453f0cc1fbe463de79e4a6f148bbad369dd1295b1b416b07bc
SHA51248fa5027527d9f139440cb9ef355bca906d654d7b20ad0a98eb89924f12e7fcae0f041afba8c300e62cc79ce6aaf32f4116b88ebd37397c79a873a8ff6942ee6
-
memory/808-133-0x0000000000000000-mapping.dmp
-
memory/4044-132-0x0000000000000000-mapping.dmp
-
memory/4968-138-0x00000254720D0000-0x00000254720D6000-memory.dmpFilesize
24KB
-
memory/4968-141-0x00000254724B0000-0x00000254724B8000-memory.dmpFilesize
32KB
-
memory/4968-139-0x00007FFD0F580000-0x00007FFD10041000-memory.dmpFilesize
10.8MB
-
memory/4968-143-0x00000254724E0000-0x00000254724F5000-memory.dmpFilesize
84KB
-
memory/4968-135-0x0000000000000000-mapping.dmp
-
memory/4968-145-0x00007FFD0F580000-0x00007FFD10041000-memory.dmpFilesize
10.8MB