Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe
Resource
win10v2004-20220812-en
General
-
Target
01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe
-
Size
172KB
-
MD5
49207d20d1dc9dc6c9bb2f04cc82b170
-
SHA1
a43a619031d3b24f6e02d628ce1952d361cb0209
-
SHA256
01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c
-
SHA512
494fbe9a555b67aad2f44116e311e7c1e77f6374052a7429c7718b10200d326a7f1b7a558df847f582efc9d2c330cd945f86adb0690d507b7de68a6bdebef064
-
SSDEEP
3072:sNf3wRqQxKvxnsRcaCncxLqMoxOOnw7SJiu3:8PeyxTneuCCjJH
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000c0000000054a8-55.dat aspack_v212_v242 behavioral1/files/0x000c0000000054a8-62.dat aspack_v212_v242 behavioral1/files/0x0008000000013473-63.dat aspack_v212_v242 behavioral1/files/0x000900000001339d-67.dat aspack_v212_v242 behavioral1/files/0x000900000001339d-66.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1044 64f34b0f.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 64f34b0f.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-55.dat upx behavioral1/memory/1044-59-0x00000000008E0000-0x0000000000904000-memory.dmp upx behavioral1/memory/1044-60-0x00000000008E0000-0x0000000000904000-memory.dmp upx behavioral1/memory/1044-61-0x00000000008E0000-0x0000000000904000-memory.dmp upx behavioral1/files/0x000c0000000054a8-62.dat upx behavioral1/files/0x0008000000013473-63.dat upx behavioral1/files/0x000900000001339d-67.dat upx behavioral1/files/0x000900000001339d-66.dat upx behavioral1/memory/1044-73-0x00000000008E0000-0x0000000000904000-memory.dmp upx behavioral1/memory/1996-72-0x00000000745B0000-0x00000000745D4000-memory.dmp upx behavioral1/memory/1996-69-0x00000000745B0000-0x00000000745D4000-memory.dmp upx behavioral1/memory/1996-70-0x00000000745B0000-0x00000000745D4000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1044 64f34b0f.exe 1996 Svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 64f34b0f.exe File opened for modification C:\Windows\SysWOW64\0B2C04BC.tmp 64f34b0f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1044 64f34b0f.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1688 01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1044 1688 01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe 27 PID 1688 wrote to memory of 1044 1688 01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe 27 PID 1688 wrote to memory of 1044 1688 01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe 27 PID 1688 wrote to memory of 1044 1688 01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe"C:\Users\Admin\AppData\Local\Temp\01f2a8eb3c200b222db79b94bbb2832f0ba7d4a32b444879f890488752a7662c.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\64f34b0f.exeC:\64f34b0f.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD59cabe44b5e98c63f8bb3ff4d8d9817e2
SHA1755a0133e241f8f5bcde22eadad4ef5e28ed34b3
SHA2565c35db27e9ca73b498a9dfaf420e41181afc3fc808403619d840f3cd96faa11d
SHA51221fd9c19a5e464b8d62a9274af72e4a5210e37cfda79863b76d21f74ba61dd6b89c7762933b702733e4fd0c985c49a0d5590468eaa3a220edf44f3be65e18e69
-
Filesize
83KB
MD59cabe44b5e98c63f8bb3ff4d8d9817e2
SHA1755a0133e241f8f5bcde22eadad4ef5e28ed34b3
SHA2565c35db27e9ca73b498a9dfaf420e41181afc3fc808403619d840f3cd96faa11d
SHA51221fd9c19a5e464b8d62a9274af72e4a5210e37cfda79863b76d21f74ba61dd6b89c7762933b702733e4fd0c985c49a0d5590468eaa3a220edf44f3be65e18e69
-
Filesize
720B
MD5f9c1d91e89bdb4f403c263e72c2819bf
SHA1421a94072a7ac2260c30d2ec8ab5f074fa55196d
SHA256b5f6be20b38b1d2f088d1b84bc659b57db8791d6140b4e87e07a06f40b8913fa
SHA512c005597da33641d9b4bbe96366ab8117607775b181fe5339685cd34765f325b8baa56954c5005b23039a40beb8eaf168da831391816a3b6aaf616529ef5c506e
-
Filesize
83KB
MD54bc05b71b4eeb891c11682cd1a620f85
SHA141de966411f3fb76f0fb56e9892087c31a9639bd
SHA25605b6b201708b9ee65918deb0fc98c9cab898fecdfccccac06742dd507a6a3a65
SHA512ea50d434c795cb42c131e6e7b5011c34baac2ca73cf59cd5d77dcb17581ec38b2d451b65039ec1bd9036d030ad63105075a85cdaa7cce39065b601b88068e7d3
-
Filesize
83KB
MD54bc05b71b4eeb891c11682cd1a620f85
SHA141de966411f3fb76f0fb56e9892087c31a9639bd
SHA25605b6b201708b9ee65918deb0fc98c9cab898fecdfccccac06742dd507a6a3a65
SHA512ea50d434c795cb42c131e6e7b5011c34baac2ca73cf59cd5d77dcb17581ec38b2d451b65039ec1bd9036d030ad63105075a85cdaa7cce39065b601b88068e7d3
-
Filesize
83KB
MD54bc05b71b4eeb891c11682cd1a620f85
SHA141de966411f3fb76f0fb56e9892087c31a9639bd
SHA25605b6b201708b9ee65918deb0fc98c9cab898fecdfccccac06742dd507a6a3a65
SHA512ea50d434c795cb42c131e6e7b5011c34baac2ca73cf59cd5d77dcb17581ec38b2d451b65039ec1bd9036d030ad63105075a85cdaa7cce39065b601b88068e7d3