Analysis
-
max time kernel
146s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe
Resource
win10v2004-20220812-en
General
-
Target
f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe
-
Size
285KB
-
MD5
6e6851c9594165890afaf9d93fb47960
-
SHA1
0aed3543cf1b79bc5556207ba63b0b8a47e03868
-
SHA256
f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4
-
SHA512
a8f741321d2c9f3a3895f20609b25cd532e34db58c7b5e733792b8b32966092171e4b08f722b03d4270774a36230a6e1eee50972161040bf291c11c365e50767
-
SSDEEP
6144:aMqylurv771DBjuaoLuY+P2H8ah1JTIhGpa2oywFgVyR10GZKV6NkyS8:5lurv771DBVdeHzLTIYkywFcyVZKkTS8
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe 1828 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1828 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe 27 PID 1044 wrote to memory of 1828 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe 27 PID 1044 wrote to memory of 1828 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe 27 PID 1044 wrote to memory of 1828 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe 27 PID 1044 wrote to memory of 1828 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe 27 PID 1044 wrote to memory of 1828 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe 27 PID 1044 wrote to memory of 1828 1044 f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe"C:\Users\Admin\AppData\Local\Temp\f058c7f9ed93c1ad07db32b6bf56de33f564e63861a4d36d1475c2109fbf04d4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD5ac20ad8ae05c31994cecba7f7ebb8ff9
SHA18a5635c14d03945c8feac2323bc856ddb3d94612
SHA256c111220c83fb1c676012c82d000c24f2c407b1f93272380ff38fe66ded9edbe6
SHA51275f5c1fa0dbe4e404c2f9fc7b7167ff8af64632f57f598d79f6094752d7bb67de14987f42e4d9c31338767af6247d8d91feabc9fdc7236036c45bdcc751a6ee1
-
Filesize
233KB
MD5ac20ad8ae05c31994cecba7f7ebb8ff9
SHA18a5635c14d03945c8feac2323bc856ddb3d94612
SHA256c111220c83fb1c676012c82d000c24f2c407b1f93272380ff38fe66ded9edbe6
SHA51275f5c1fa0dbe4e404c2f9fc7b7167ff8af64632f57f598d79f6094752d7bb67de14987f42e4d9c31338767af6247d8d91feabc9fdc7236036c45bdcc751a6ee1
-
Filesize
233KB
MD5ac20ad8ae05c31994cecba7f7ebb8ff9
SHA18a5635c14d03945c8feac2323bc856ddb3d94612
SHA256c111220c83fb1c676012c82d000c24f2c407b1f93272380ff38fe66ded9edbe6
SHA51275f5c1fa0dbe4e404c2f9fc7b7167ff8af64632f57f598d79f6094752d7bb67de14987f42e4d9c31338767af6247d8d91feabc9fdc7236036c45bdcc751a6ee1
-
Filesize
233KB
MD5ac20ad8ae05c31994cecba7f7ebb8ff9
SHA18a5635c14d03945c8feac2323bc856ddb3d94612
SHA256c111220c83fb1c676012c82d000c24f2c407b1f93272380ff38fe66ded9edbe6
SHA51275f5c1fa0dbe4e404c2f9fc7b7167ff8af64632f57f598d79f6094752d7bb67de14987f42e4d9c31338767af6247d8d91feabc9fdc7236036c45bdcc751a6ee1
-
Filesize
233KB
MD5ac20ad8ae05c31994cecba7f7ebb8ff9
SHA18a5635c14d03945c8feac2323bc856ddb3d94612
SHA256c111220c83fb1c676012c82d000c24f2c407b1f93272380ff38fe66ded9edbe6
SHA51275f5c1fa0dbe4e404c2f9fc7b7167ff8af64632f57f598d79f6094752d7bb67de14987f42e4d9c31338767af6247d8d91feabc9fdc7236036c45bdcc751a6ee1
-
Filesize
233KB
MD5ac20ad8ae05c31994cecba7f7ebb8ff9
SHA18a5635c14d03945c8feac2323bc856ddb3d94612
SHA256c111220c83fb1c676012c82d000c24f2c407b1f93272380ff38fe66ded9edbe6
SHA51275f5c1fa0dbe4e404c2f9fc7b7167ff8af64632f57f598d79f6094752d7bb67de14987f42e4d9c31338767af6247d8d91feabc9fdc7236036c45bdcc751a6ee1