Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 22:30
Static task
static1
Behavioral task
behavioral1
Sample
d23d19798b1868435fd6dfa7feda07637c844f4f4789b0ded9671c196cbfdd25.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d23d19798b1868435fd6dfa7feda07637c844f4f4789b0ded9671c196cbfdd25.exe
Resource
win10v2004-20220901-en
General
-
Target
d23d19798b1868435fd6dfa7feda07637c844f4f4789b0ded9671c196cbfdd25.exe
-
Size
176KB
-
MD5
6817c82b02ff1a2e19d80bcd0e3e927c
-
SHA1
07f4ac6b268ddd6972e95b18ed4a4fcccf17ae26
-
SHA256
d23d19798b1868435fd6dfa7feda07637c844f4f4789b0ded9671c196cbfdd25
-
SHA512
c6579e30e37472a400d727f88bdfd6867276ffbe89e08202235c45dd8741d19ba2ebd83b1cfebde74e68d990ff35312f1f5be638da9951cc0e4b599cc777b7f9
-
SSDEEP
3072:7xbUV/7421tvlPytmjw8YdNuuIN+ZL5mEvnESuifG+3vw+XOSYtVZoAN:8D4EtvlPytm05dPfnBuH+3o+9
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0005000000022dc8-134.dat aspack_v212_v242 behavioral2/files/0x0005000000022dc8-133.dat aspack_v212_v242 behavioral2/files/0x0003000000022df7-141.dat aspack_v212_v242 behavioral2/files/0x0003000000022df7-140.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 5040 762e2b52.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 762e2b52.exe -
resource yara_rule behavioral2/files/0x0005000000022dc8-134.dat upx behavioral2/files/0x0005000000022dc8-133.dat upx behavioral2/memory/5040-136-0x0000000000040000-0x0000000000066000-memory.dmp upx behavioral2/memory/5040-137-0x0000000000040000-0x0000000000066000-memory.dmp upx behavioral2/memory/5040-138-0x0000000000040000-0x0000000000066000-memory.dmp upx behavioral2/files/0x0003000000022df7-141.dat upx behavioral2/files/0x0003000000022df7-140.dat upx behavioral2/memory/4952-142-0x0000000074E00000-0x0000000074E26000-memory.dmp upx behavioral2/memory/4952-143-0x0000000074E00000-0x0000000074E26000-memory.dmp upx behavioral2/memory/4952-144-0x0000000074E00000-0x0000000074E26000-memory.dmp upx behavioral2/memory/5040-147-0x0000000000040000-0x0000000000066000-memory.dmp upx behavioral2/memory/4952-146-0x0000000074E00000-0x0000000074E26000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 4952 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\41EF0C14.tmp 762e2b52.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 762e2b52.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5040 762e2b52.exe 5040 762e2b52.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3752 d23d19798b1868435fd6dfa7feda07637c844f4f4789b0ded9671c196cbfdd25.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3752 wrote to memory of 5040 3752 d23d19798b1868435fd6dfa7feda07637c844f4f4789b0ded9671c196cbfdd25.exe 83 PID 3752 wrote to memory of 5040 3752 d23d19798b1868435fd6dfa7feda07637c844f4f4789b0ded9671c196cbfdd25.exe 83 PID 3752 wrote to memory of 5040 3752 d23d19798b1868435fd6dfa7feda07637c844f4f4789b0ded9671c196cbfdd25.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d23d19798b1868435fd6dfa7feda07637c844f4f4789b0ded9671c196cbfdd25.exe"C:\Users\Admin\AppData\Local\Temp\d23d19798b1868435fd6dfa7feda07637c844f4f4789b0ded9671c196cbfdd25.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\762e2b52.exeC:\762e2b52.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:4952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD56b222c20acbdc5a0919ced7d62ae127e
SHA1e5548137ef1150423b571fa0e7ceeb62c7190f56
SHA256582dd6d194571b1399686acd934336238108d1e18e0756223d318d552539bf5a
SHA51297cb5023f43c91ecc3577f270c54f486fb1246970f019a88eb7e2ee77d94b2e37a85a20b70989aca85ca7c18661346f5499e46d8a069f1ef2ad4b9d0233cb815
-
Filesize
90KB
MD56b222c20acbdc5a0919ced7d62ae127e
SHA1e5548137ef1150423b571fa0e7ceeb62c7190f56
SHA256582dd6d194571b1399686acd934336238108d1e18e0756223d318d552539bf5a
SHA51297cb5023f43c91ecc3577f270c54f486fb1246970f019a88eb7e2ee77d94b2e37a85a20b70989aca85ca7c18661346f5499e46d8a069f1ef2ad4b9d0233cb815
-
Filesize
720B
MD5ce61bc60c94df10aa09593e2cb9ccd43
SHA1ee957dc5df0dca836d2fd16283de707de03c8cdc
SHA256455e02d7c49abce0b53bdbb013af6abcd4161ba8f86a57bafa8ddfbb8e28f7c3
SHA512e9cb2e91632f463320bbafcf31dbedc7f9af5cd73a7c063379da9ab1bb4c310f33c5ef68d69a0939581097d8eb50070afb10a45f951ce42f2f7d01f7abada837
-
Filesize
90KB
MD5d9c481df51944891331899940034a2fd
SHA11d86eeec53bc1a4a5e28b69e3faec885dd48fdfa
SHA256e5d4623258e0c70c13ecc444f811c587e7b8191aaefef7773095d082be94737f
SHA5123a3673a3e10d3c4aa74eb902ad3eebc9e20df739b6b5b3c58922e37271a5deff92f6a4c4c790e1e0ba2d3db3f2e920a3253fddf33250fede8aa46552ec3b427a
-
Filesize
90KB
MD5d9c481df51944891331899940034a2fd
SHA11d86eeec53bc1a4a5e28b69e3faec885dd48fdfa
SHA256e5d4623258e0c70c13ecc444f811c587e7b8191aaefef7773095d082be94737f
SHA5123a3673a3e10d3c4aa74eb902ad3eebc9e20df739b6b5b3c58922e37271a5deff92f6a4c4c790e1e0ba2d3db3f2e920a3253fddf33250fede8aa46552ec3b427a