Analysis
-
max time kernel
148s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe
Resource
win10v2004-20220812-en
General
-
Target
16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe
-
Size
207KB
-
MD5
818b6ca7f19a09cedc7dbc19d7e007c0
-
SHA1
7f156d38a0e190d8fb0642af04f076b894d3f79f
-
SHA256
16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6
-
SHA512
115b73235467603bbf831ca380b65dd13fe39e68aa4490702e0cbf724f0d41e660af026ee3e79733063b7e2c5a1dbb19d0c8f11d0c912fa03e093f3e359ba8ea
-
SSDEEP
3072:uamgNBfISNsu4vjjjGqaZLVpELqof6xAKFwXFgFVPlSNarvwHLHM:vB1SJvjjjtaZLVpELDKFaoroHLH
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe 1448 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 832 wrote to memory of 1448 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe 28 PID 832 wrote to memory of 1448 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe 28 PID 832 wrote to memory of 1448 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe 28 PID 832 wrote to memory of 1448 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe 28 PID 832 wrote to memory of 1448 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe 28 PID 832 wrote to memory of 1448 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe 28 PID 832 wrote to memory of 1448 832 16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe"C:\Users\Admin\AppData\Local\Temp\16a7320de7930d21f1443ecb3c9797e29530a29a9dcf810ae13d781ac13095e6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
171KB
MD517b0fc9a19753be8871c8698db7b5fda
SHA166f6fc2684c03193496fbc2543c4b78c71b9ce6d
SHA25617a504e09f4c1f4c7115af2a09b141dac9a3fe7de4b65af7608f843360aa1d0f
SHA512b5101cb6abd4484cab37af7517a3a1b2dfc3a1606f3845cfea557a69f5e80c971bfc9865b86d3688a5387c787e264fb2d581d737aaa0fb03d74151287a576c57
-
Filesize
171KB
MD517b0fc9a19753be8871c8698db7b5fda
SHA166f6fc2684c03193496fbc2543c4b78c71b9ce6d
SHA25617a504e09f4c1f4c7115af2a09b141dac9a3fe7de4b65af7608f843360aa1d0f
SHA512b5101cb6abd4484cab37af7517a3a1b2dfc3a1606f3845cfea557a69f5e80c971bfc9865b86d3688a5387c787e264fb2d581d737aaa0fb03d74151287a576c57
-
Filesize
171KB
MD517b0fc9a19753be8871c8698db7b5fda
SHA166f6fc2684c03193496fbc2543c4b78c71b9ce6d
SHA25617a504e09f4c1f4c7115af2a09b141dac9a3fe7de4b65af7608f843360aa1d0f
SHA512b5101cb6abd4484cab37af7517a3a1b2dfc3a1606f3845cfea557a69f5e80c971bfc9865b86d3688a5387c787e264fb2d581d737aaa0fb03d74151287a576c57
-
Filesize
171KB
MD517b0fc9a19753be8871c8698db7b5fda
SHA166f6fc2684c03193496fbc2543c4b78c71b9ce6d
SHA25617a504e09f4c1f4c7115af2a09b141dac9a3fe7de4b65af7608f843360aa1d0f
SHA512b5101cb6abd4484cab37af7517a3a1b2dfc3a1606f3845cfea557a69f5e80c971bfc9865b86d3688a5387c787e264fb2d581d737aaa0fb03d74151287a576c57
-
Filesize
171KB
MD517b0fc9a19753be8871c8698db7b5fda
SHA166f6fc2684c03193496fbc2543c4b78c71b9ce6d
SHA25617a504e09f4c1f4c7115af2a09b141dac9a3fe7de4b65af7608f843360aa1d0f
SHA512b5101cb6abd4484cab37af7517a3a1b2dfc3a1606f3845cfea557a69f5e80c971bfc9865b86d3688a5387c787e264fb2d581d737aaa0fb03d74151287a576c57
-
Filesize
171KB
MD517b0fc9a19753be8871c8698db7b5fda
SHA166f6fc2684c03193496fbc2543c4b78c71b9ce6d
SHA25617a504e09f4c1f4c7115af2a09b141dac9a3fe7de4b65af7608f843360aa1d0f
SHA512b5101cb6abd4484cab37af7517a3a1b2dfc3a1606f3845cfea557a69f5e80c971bfc9865b86d3688a5387c787e264fb2d581d737aaa0fb03d74151287a576c57