Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe
Resource
win10v2004-20220812-en
General
-
Target
c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe
-
Size
412KB
-
MD5
554b5fcbc2ead0aa00d2a0026be825d0
-
SHA1
4238f35d21b27ba86a71cf672f3e472948999b1e
-
SHA256
c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c
-
SHA512
12f17193933a7dcecae48da957d17f6514c412a866f884483d86369cbfba55368fc0f1b907b11c01e84f2d5287d7b785a0a4da1f20582b3689e1500b741a6477
-
SSDEEP
6144:TzASNI9UuWoxdqLaFHAyq/0FR7RthyKU/l7kKBI1HaYVfdyJefiQyY8yzAS:Ptc9RxMIHAkhyKyVkKB0HaXY3
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\lsass.exe c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe File created C:\Windows\SysWOW64\drivers\lsass.exe lsass.exe -
Executes dropped EXE 2 IoCs
pid Process 1612 lsass.exe 1768 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.~tmp -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~.pif lsass.exe -
Loads dropped DLL 3 IoCs
pid Process 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: lsass.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 1612 lsass.exe 1612 lsass.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1612 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 27 PID 1672 wrote to memory of 1612 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 27 PID 1672 wrote to memory of 1612 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 27 PID 1672 wrote to memory of 1612 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 27 PID 1672 wrote to memory of 1768 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 28 PID 1672 wrote to memory of 1768 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 28 PID 1672 wrote to memory of 1768 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 28 PID 1672 wrote to memory of 1768 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 28 PID 1672 wrote to memory of 1768 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 28 PID 1672 wrote to memory of 1768 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 28 PID 1672 wrote to memory of 1768 1672 c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe"C:\Users\Admin\AppData\Local\Temp\c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\drivers\lsass.exe"C:\Windows\system32\drivers\lsass.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops startup file
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.~tmp"C:\Users\Admin\AppData\Local\Temp\c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.~tmp "2⤵
- Executes dropped EXE
PID:1768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.~tmp
Filesize348KB
MD58b35018697829325b0d60573e65498ad
SHA1c3619cbb436741aef57ae0cff9541e30ed259854
SHA25685141c647d4898666d378a69e2a2b62982f4640b32619997b48267beb90124c6
SHA51239c416d2fbb3927f618e03dffa70d52d6425d86b7227a4dcbc38d5fff3b511405dde0b1a4ded7064d6fec6137df804f71a69d53b5e152e58ceed53d179289c03
-
Filesize
32KB
MD5669ffd1dd6fb7a0e4ddbc3ad3b76507b
SHA1372820d6b9350ad629a489d49876d8bd422b8f31
SHA2567dc487e762e55ffa601480c4bc7948f85fcd4f025665ff599060ec1f81d7e986
SHA512cd69694ad3316c768dbe0d1514060870568c67a50785b38d402eb16e94740c5ae351eb6d47284630a2505fac50c9777bedef85608571c85385b1b9c1f12d73f5
-
Filesize
32KB
MD5669ffd1dd6fb7a0e4ddbc3ad3b76507b
SHA1372820d6b9350ad629a489d49876d8bd422b8f31
SHA2567dc487e762e55ffa601480c4bc7948f85fcd4f025665ff599060ec1f81d7e986
SHA512cd69694ad3316c768dbe0d1514060870568c67a50785b38d402eb16e94740c5ae351eb6d47284630a2505fac50c9777bedef85608571c85385b1b9c1f12d73f5
-
\Users\Admin\AppData\Local\Temp\c186a3eedefd429f850a34287cee4504f3818549be701a53e2574ed1e13a529c.~tmp
Filesize348KB
MD58b35018697829325b0d60573e65498ad
SHA1c3619cbb436741aef57ae0cff9541e30ed259854
SHA25685141c647d4898666d378a69e2a2b62982f4640b32619997b48267beb90124c6
SHA51239c416d2fbb3927f618e03dffa70d52d6425d86b7227a4dcbc38d5fff3b511405dde0b1a4ded7064d6fec6137df804f71a69d53b5e152e58ceed53d179289c03
-
Filesize
32KB
MD5669ffd1dd6fb7a0e4ddbc3ad3b76507b
SHA1372820d6b9350ad629a489d49876d8bd422b8f31
SHA2567dc487e762e55ffa601480c4bc7948f85fcd4f025665ff599060ec1f81d7e986
SHA512cd69694ad3316c768dbe0d1514060870568c67a50785b38d402eb16e94740c5ae351eb6d47284630a2505fac50c9777bedef85608571c85385b1b9c1f12d73f5
-
Filesize
32KB
MD5669ffd1dd6fb7a0e4ddbc3ad3b76507b
SHA1372820d6b9350ad629a489d49876d8bd422b8f31
SHA2567dc487e762e55ffa601480c4bc7948f85fcd4f025665ff599060ec1f81d7e986
SHA512cd69694ad3316c768dbe0d1514060870568c67a50785b38d402eb16e94740c5ae351eb6d47284630a2505fac50c9777bedef85608571c85385b1b9c1f12d73f5