Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 16:01
Static task
static1
Behavioral task
behavioral1
Sample
f29606a222dac3eb2c51876a7ae1dcad383215bbbafbbbc034bb5787ca741174.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f29606a222dac3eb2c51876a7ae1dcad383215bbbafbbbc034bb5787ca741174.exe
Resource
win10v2004-20220812-en
General
-
Target
f29606a222dac3eb2c51876a7ae1dcad383215bbbafbbbc034bb5787ca741174.exe
-
Size
192KB
-
MD5
6042db3e9e1f5addf7967395e10650ef
-
SHA1
22c75b185e69831b94a4902dcc57e55eb72083ac
-
SHA256
f29606a222dac3eb2c51876a7ae1dcad383215bbbafbbbc034bb5787ca741174
-
SHA512
25918b60ea7aa49d51b6abf3a671399335eacd9cb5db9b6551826ba71ad4297c4409dcf815ce72c15aa1dd426207551042c76d03880f6e0aaed76fa78af35448
-
SSDEEP
3072:T4bdx7JIo+HNjpMEDJMdR/dBFOcYFbsJpPMTsuZfh:8JMo4iENKzpYFgJpPMwuZ5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1276 nxxdpf.exe -
Deletes itself 1 IoCs
pid Process 1352 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1352 cmd.exe 1352 cmd.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell nxxdpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID nxxdpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} nxxdpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\lpzcw\\command nxxdpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node nxxdpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\lpzcw nxxdpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\lpzcw nxxdpf.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 276 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1352 1600 f29606a222dac3eb2c51876a7ae1dcad383215bbbafbbbc034bb5787ca741174.exe 27 PID 1600 wrote to memory of 1352 1600 f29606a222dac3eb2c51876a7ae1dcad383215bbbafbbbc034bb5787ca741174.exe 27 PID 1600 wrote to memory of 1352 1600 f29606a222dac3eb2c51876a7ae1dcad383215bbbafbbbc034bb5787ca741174.exe 27 PID 1600 wrote to memory of 1352 1600 f29606a222dac3eb2c51876a7ae1dcad383215bbbafbbbc034bb5787ca741174.exe 27 PID 1352 wrote to memory of 1276 1352 cmd.exe 29 PID 1352 wrote to memory of 1276 1352 cmd.exe 29 PID 1352 wrote to memory of 1276 1352 cmd.exe 29 PID 1352 wrote to memory of 1276 1352 cmd.exe 29 PID 1352 wrote to memory of 276 1352 cmd.exe 30 PID 1352 wrote to memory of 276 1352 cmd.exe 30 PID 1352 wrote to memory of 276 1352 cmd.exe 30 PID 1352 wrote to memory of 276 1352 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f29606a222dac3eb2c51876a7ae1dcad383215bbbafbbbc034bb5787ca741174.exe"C:\Users\Admin\AppData\Local\Temp\f29606a222dac3eb2c51876a7ae1dcad383215bbbafbbbc034bb5787ca741174.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ltwgovs.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\nxxdpf.exe"C:\Users\Admin\AppData\Local\Temp\nxxdpf.exe"3⤵
- Executes dropped EXE
- Modifies registry class
PID:1276
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:276
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD5f487c0d05b0bffc4a92645d7bb213633
SHA19edc4037aa5214d7350b29e3f8e4d2bf1652a9eb
SHA256fe7ca85cb30f49a021afdc2df478e9cda3bd4f5b2455448fcc5bad3ae329eb37
SHA512025c58c88c9c6931a8362de659f5a13e96d12ae87e78f9419a557f1277f714d26e8116da9ddb7f2e68c44031b4f44d62bd03c9af4810794eadc56ea85cbf1d62
-
Filesize
144KB
MD566756710121df712b26a9681d270f5cd
SHA199748ec15ccde33db267841e4e1fa3fb29b5f0c3
SHA256cc4d02221ca5195dbb36488527ae21cca8d2889c96928facb6760fc2f240a3b7
SHA51277ce5da0953b13891341cf59042e1fe0dd04d63472ee2f595daa8b8b4dad82d380da3ee4ab9aad52959fbea9914d356a06feb8cf6ad6e91011a8cb7123b24931
-
Filesize
144KB
MD566756710121df712b26a9681d270f5cd
SHA199748ec15ccde33db267841e4e1fa3fb29b5f0c3
SHA256cc4d02221ca5195dbb36488527ae21cca8d2889c96928facb6760fc2f240a3b7
SHA51277ce5da0953b13891341cf59042e1fe0dd04d63472ee2f595daa8b8b4dad82d380da3ee4ab9aad52959fbea9914d356a06feb8cf6ad6e91011a8cb7123b24931
-
Filesize
188B
MD59716ff5024bc13b6f60959d6f46d2d9e
SHA1c3c7e60a59bda0e2eb3e5005d48e0f4888aea57c
SHA25646c74eadc6982f1a991ef008383da2e8511ef3eb931e4d75eef68f0d8565e9f3
SHA512668be30ac792a8a0bfb9db8fcf0f70125fc2022eb7443cd98ca264944d4ba6cf7e0c13ba799293a8f0bccad9d19dff712feac2a4d96c157abaa9b55b5b76ad48
-
Filesize
144KB
MD566756710121df712b26a9681d270f5cd
SHA199748ec15ccde33db267841e4e1fa3fb29b5f0c3
SHA256cc4d02221ca5195dbb36488527ae21cca8d2889c96928facb6760fc2f240a3b7
SHA51277ce5da0953b13891341cf59042e1fe0dd04d63472ee2f595daa8b8b4dad82d380da3ee4ab9aad52959fbea9914d356a06feb8cf6ad6e91011a8cb7123b24931
-
Filesize
144KB
MD566756710121df712b26a9681d270f5cd
SHA199748ec15ccde33db267841e4e1fa3fb29b5f0c3
SHA256cc4d02221ca5195dbb36488527ae21cca8d2889c96928facb6760fc2f240a3b7
SHA51277ce5da0953b13891341cf59042e1fe0dd04d63472ee2f595daa8b8b4dad82d380da3ee4ab9aad52959fbea9914d356a06feb8cf6ad6e91011a8cb7123b24931