Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe
Resource
win10v2004-20220812-en
General
-
Target
5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe
-
Size
312KB
-
MD5
67bc86f02b6929d370de725725b5e760
-
SHA1
6bf07fe2a9eb04ce87ac2c9cda55d66a99529f8d
-
SHA256
5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2
-
SHA512
8960ca118d9ea76082188bb9ae786caf79b3cb85d43e51364534047a86a24416200bf04f3c1c3ed07e4734daffd6535383f9e9fe40f46766dddde0b99c3ad14e
-
SSDEEP
6144:jNnaDL1uSxPnczLgOSp6swEluxZMRSfZci/H:jNnOL1VxPnTOSk1COThci/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1504 typo.exe -
Deletes itself 1 IoCs
pid Process 1080 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run typo.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{91C05068-4FEF-AD4D-7F1F-8FEC7D0BACF1} = "C:\\Users\\Admin\\AppData\\Roaming\\Odiwc\\typo.exe" typo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 748 set thread context of 1080 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe 1504 typo.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 748 wrote to memory of 1504 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 27 PID 748 wrote to memory of 1504 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 27 PID 748 wrote to memory of 1504 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 27 PID 748 wrote to memory of 1504 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 27 PID 1504 wrote to memory of 1180 1504 typo.exe 15 PID 1504 wrote to memory of 1180 1504 typo.exe 15 PID 1504 wrote to memory of 1180 1504 typo.exe 15 PID 1504 wrote to memory of 1180 1504 typo.exe 15 PID 1504 wrote to memory of 1180 1504 typo.exe 15 PID 1504 wrote to memory of 1320 1504 typo.exe 13 PID 1504 wrote to memory of 1320 1504 typo.exe 13 PID 1504 wrote to memory of 1320 1504 typo.exe 13 PID 1504 wrote to memory of 1320 1504 typo.exe 13 PID 1504 wrote to memory of 1320 1504 typo.exe 13 PID 1504 wrote to memory of 1368 1504 typo.exe 14 PID 1504 wrote to memory of 1368 1504 typo.exe 14 PID 1504 wrote to memory of 1368 1504 typo.exe 14 PID 1504 wrote to memory of 1368 1504 typo.exe 14 PID 1504 wrote to memory of 1368 1504 typo.exe 14 PID 1504 wrote to memory of 748 1504 typo.exe 26 PID 1504 wrote to memory of 748 1504 typo.exe 26 PID 1504 wrote to memory of 748 1504 typo.exe 26 PID 1504 wrote to memory of 748 1504 typo.exe 26 PID 1504 wrote to memory of 748 1504 typo.exe 26 PID 748 wrote to memory of 1080 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 28 PID 748 wrote to memory of 1080 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 28 PID 748 wrote to memory of 1080 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 28 PID 748 wrote to memory of 1080 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 28 PID 748 wrote to memory of 1080 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 28 PID 748 wrote to memory of 1080 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 28 PID 748 wrote to memory of 1080 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 28 PID 748 wrote to memory of 1080 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 28 PID 748 wrote to memory of 1080 748 5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe 28
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1320
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe"C:\Users\Admin\AppData\Local\Temp\5dfc02397f5f91ae72948b5d4e25f9c535f1c7132de126de333f5f99e8f448b2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Roaming\Odiwc\typo.exe"C:\Users\Admin\AppData\Roaming\Odiwc\typo.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp44b06474.bat"3⤵
- Deletes itself
PID:1080
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5d6c00371a58ea04b4de0ae1637128de2
SHA1b84b8bb56321c9be2182b2044b785708c69ee478
SHA256a67ac3851f26b56fddf54328662af6a4531015cf06d8c4dacd79a1f370028c30
SHA512db7950c11a7cf69df36503edbb98d95eeca2974e90f1df074e3393510f3c0fb67fde43151473c2fa448ba14140b8a45e3d9a5c2454bc22b4bf4c36688f902eeb
-
Filesize
312KB
MD5b4c76adf39e32c7d87145d35b74e3816
SHA15041d4304e9fc88485426354076934fbf7a3c491
SHA2568b6de132dc4947b66a8c1053dd6db8360e0a48531f10d0e072b013424883acf3
SHA512aaf4114946b798881f613f60c5cb908eed795971d6ea286f5e8a221becdc1931b14d3a77563ae5f7f85fb7224a4205443a0fcfb15af5344fab76a351a0fce17c
-
Filesize
312KB
MD5b4c76adf39e32c7d87145d35b74e3816
SHA15041d4304e9fc88485426354076934fbf7a3c491
SHA2568b6de132dc4947b66a8c1053dd6db8360e0a48531f10d0e072b013424883acf3
SHA512aaf4114946b798881f613f60c5cb908eed795971d6ea286f5e8a221becdc1931b14d3a77563ae5f7f85fb7224a4205443a0fcfb15af5344fab76a351a0fce17c
-
Filesize
312KB
MD5b4c76adf39e32c7d87145d35b74e3816
SHA15041d4304e9fc88485426354076934fbf7a3c491
SHA2568b6de132dc4947b66a8c1053dd6db8360e0a48531f10d0e072b013424883acf3
SHA512aaf4114946b798881f613f60c5cb908eed795971d6ea286f5e8a221becdc1931b14d3a77563ae5f7f85fb7224a4205443a0fcfb15af5344fab76a351a0fce17c
-
Filesize
312KB
MD5b4c76adf39e32c7d87145d35b74e3816
SHA15041d4304e9fc88485426354076934fbf7a3c491
SHA2568b6de132dc4947b66a8c1053dd6db8360e0a48531f10d0e072b013424883acf3
SHA512aaf4114946b798881f613f60c5cb908eed795971d6ea286f5e8a221becdc1931b14d3a77563ae5f7f85fb7224a4205443a0fcfb15af5344fab76a351a0fce17c