Analysis
-
max time kernel
164s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe
Resource
win10v2004-20220812-en
General
-
Target
f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe
-
Size
59KB
-
MD5
a224082e1b6e1c84405ff64798586bfe
-
SHA1
2179df0219384c4b1eb158553725a6fd2d6d3ee3
-
SHA256
f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2
-
SHA512
43845d3a6de0195cce665efa27ddb2d869d8e9a042f3a33d1699cce670901e1ffee7073a4e37c9be07c3c5ad6e308ee7aaec5402dcbb8936bb6f1312337cdef2
-
SSDEEP
1536:xEhhiul08b2lWB2A/SnK/ibILzbB2EEdeKrx+X6d:xEhh5JbhBv/S4LXBBkke
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 2 IoCs
pid Process 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 2044 RunDll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\System Windows Share = "RunDll32 \"C:\\Windows\\Offline Web Pages\\logmssvc.dll\",Init" f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Recovery\hostsrv.dll f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe File created C:\Windows\SysWOW64\Recovery\hostsrv.dll f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Offline Web Pages\logmssvc.dll f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe File opened for modification C:\Windows\Offline Web Pages\logmssvc.dll f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe File created C:\Windows\Offline Web Pages\hostupup.dll f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe File opened for modification C:\Windows\Offline Web Pages\hostupup.dll f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2044 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 28 PID 1668 wrote to memory of 2044 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 28 PID 1668 wrote to memory of 2044 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 28 PID 1668 wrote to memory of 2044 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 28 PID 1668 wrote to memory of 2044 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 28 PID 1668 wrote to memory of 2044 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 28 PID 1668 wrote to memory of 2044 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 28 PID 1668 wrote to memory of 1140 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 15 PID 1668 wrote to memory of 1140 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 15 PID 1668 wrote to memory of 1208 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 14 PID 1668 wrote to memory of 1208 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 14 PID 1668 wrote to memory of 1256 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 13 PID 1668 wrote to memory of 1256 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 13 PID 1668 wrote to memory of 2044 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 28 PID 1668 wrote to memory of 2044 1668 f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe"C:\Users\Admin\AppData\Local\Temp\f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32 "C:\Users\Admin\AppData\Local\Temp\6604.tmp",Init2⤵
- Loads dropped DLL
PID:2044
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1208
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5dd8105723c29404a405c3faa00ecdd57
SHA12545315d4607edbcc6d44fd4e3d6131ea3a54b5c
SHA25644a620d7a537f1d061e9c33264cec9187530cbf29fca04e2765c14a6fc618e3b
SHA5129900ee5d9b32d272b1aed24c760b85a511d962401cffbe1726b3b16dfa0853b05ab2aa5df9d96951f98bc979a2e71ffd1c4171b99613b5c9d2bf01be7654f1c0
-
Filesize
56KB
MD5dd8105723c29404a405c3faa00ecdd57
SHA12545315d4607edbcc6d44fd4e3d6131ea3a54b5c
SHA25644a620d7a537f1d061e9c33264cec9187530cbf29fca04e2765c14a6fc618e3b
SHA5129900ee5d9b32d272b1aed24c760b85a511d962401cffbe1726b3b16dfa0853b05ab2aa5df9d96951f98bc979a2e71ffd1c4171b99613b5c9d2bf01be7654f1c0
-
Filesize
56KB
MD5dd8105723c29404a405c3faa00ecdd57
SHA12545315d4607edbcc6d44fd4e3d6131ea3a54b5c
SHA25644a620d7a537f1d061e9c33264cec9187530cbf29fca04e2765c14a6fc618e3b
SHA5129900ee5d9b32d272b1aed24c760b85a511d962401cffbe1726b3b16dfa0853b05ab2aa5df9d96951f98bc979a2e71ffd1c4171b99613b5c9d2bf01be7654f1c0