Analysis
-
max time kernel
156s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 12:19
Static task
static1
Behavioral task
behavioral1
Sample
51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe
Resource
win10v2004-20220901-en
General
-
Target
51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe
-
Size
290KB
-
MD5
63f1f8abfb03a0ce9328910205ebc52b
-
SHA1
36a6e61dcf713a43d041e09d174cb448274ccd96
-
SHA256
51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3
-
SHA512
85e4da5d8cfd6e6a378b6872c01bab2dcec455dbfeebd558fe29b2214c4f1b6d6a99d2bbbc4a68c5edc52e685793a3d0d9802501e5a9ac9f7bee59ee73afa874
-
SSDEEP
6144:i4mQH55dX3X7HOThSLBFZkjjJNGsyriSiAVEkE6cJHCco1:i4NX7HOmajlksyrlCkpcpC
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe 940 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1696 wrote to memory of 940 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe 27 PID 1696 wrote to memory of 940 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe 27 PID 1696 wrote to memory of 940 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe 27 PID 1696 wrote to memory of 940 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe 27 PID 1696 wrote to memory of 940 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe 27 PID 1696 wrote to memory of 940 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe 27 PID 1696 wrote to memory of 940 1696 51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe"C:\Users\Admin\AppData\Local\Temp\51c3623eebe7c4b8bc7e4d96e7bb2c461b54d43f1561bdbc1df319eda8a8d9a3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD50e0b2c468eee35d227c083cd9b3fc5d4
SHA1f53d7e882c723f0db3c9ced447e820e1fe170759
SHA25608536ffef4e1b48662cff075da77c4e3c9f8d859f305407459e9aa4b6183ed3e
SHA51224d41ace12ab7d657e4cc50cbb634deeb5e91f9f06885eafeef9dcc81923cd18ff9b81b54de5a7484c4a6f27319438de1b11f127b07f50cc40be0a91ec0198fa
-
Filesize
235KB
MD50e0b2c468eee35d227c083cd9b3fc5d4
SHA1f53d7e882c723f0db3c9ced447e820e1fe170759
SHA25608536ffef4e1b48662cff075da77c4e3c9f8d859f305407459e9aa4b6183ed3e
SHA51224d41ace12ab7d657e4cc50cbb634deeb5e91f9f06885eafeef9dcc81923cd18ff9b81b54de5a7484c4a6f27319438de1b11f127b07f50cc40be0a91ec0198fa
-
Filesize
235KB
MD50e0b2c468eee35d227c083cd9b3fc5d4
SHA1f53d7e882c723f0db3c9ced447e820e1fe170759
SHA25608536ffef4e1b48662cff075da77c4e3c9f8d859f305407459e9aa4b6183ed3e
SHA51224d41ace12ab7d657e4cc50cbb634deeb5e91f9f06885eafeef9dcc81923cd18ff9b81b54de5a7484c4a6f27319438de1b11f127b07f50cc40be0a91ec0198fa
-
Filesize
235KB
MD50e0b2c468eee35d227c083cd9b3fc5d4
SHA1f53d7e882c723f0db3c9ced447e820e1fe170759
SHA25608536ffef4e1b48662cff075da77c4e3c9f8d859f305407459e9aa4b6183ed3e
SHA51224d41ace12ab7d657e4cc50cbb634deeb5e91f9f06885eafeef9dcc81923cd18ff9b81b54de5a7484c4a6f27319438de1b11f127b07f50cc40be0a91ec0198fa
-
Filesize
235KB
MD50e0b2c468eee35d227c083cd9b3fc5d4
SHA1f53d7e882c723f0db3c9ced447e820e1fe170759
SHA25608536ffef4e1b48662cff075da77c4e3c9f8d859f305407459e9aa4b6183ed3e
SHA51224d41ace12ab7d657e4cc50cbb634deeb5e91f9f06885eafeef9dcc81923cd18ff9b81b54de5a7484c4a6f27319438de1b11f127b07f50cc40be0a91ec0198fa
-
Filesize
235KB
MD50e0b2c468eee35d227c083cd9b3fc5d4
SHA1f53d7e882c723f0db3c9ced447e820e1fe170759
SHA25608536ffef4e1b48662cff075da77c4e3c9f8d859f305407459e9aa4b6183ed3e
SHA51224d41ace12ab7d657e4cc50cbb634deeb5e91f9f06885eafeef9dcc81923cd18ff9b81b54de5a7484c4a6f27319438de1b11f127b07f50cc40be0a91ec0198fa