Analysis
-
max time kernel
151s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 07:01
Static task
static1
Behavioral task
behavioral1
Sample
35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe
Resource
win10v2004-20220812-en
General
-
Target
35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe
-
Size
148KB
-
MD5
711f41ac03480ba625a43b90b8c87abf
-
SHA1
48b48aeb263f4991785bbed777eaa1fc8326e42c
-
SHA256
35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a
-
SHA512
bbce59f530729e5d57a09c744d3329813b2fbbb62a2f57bee9ece1e1f71181fb603f50dbd33dbc1baab9320c420f76873120bf1a0b3d9a92d99b627076f107c7
-
SSDEEP
3072:4NYD0o7ELVWeIrnt/Jb03S8Me2lqO7Z/n18wzA0HFIy:DYueIrndei82nh18wsi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1976 Mmutia.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run Mmutia.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\5GUTNY6MFK = "C:\\Windows\\Mmutia.exe" Mmutia.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Mmutia.exe 35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe File created C:\Windows\Mmutia.exe 35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International Mmutia.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main Mmutia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe 1976 Mmutia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1976 1376 35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe 28 PID 1376 wrote to memory of 1976 1376 35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe 28 PID 1376 wrote to memory of 1976 1376 35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe 28 PID 1376 wrote to memory of 1976 1376 35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe"C:\Users\Admin\AppData\Local\Temp\35ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\Mmutia.exeC:\Windows\Mmutia.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5711f41ac03480ba625a43b90b8c87abf
SHA148b48aeb263f4991785bbed777eaa1fc8326e42c
SHA25635ce78fb2c8cecbef71bbb2f938e4fea099f46648aaeb057cdc9a92cb10d696a
SHA512bbce59f530729e5d57a09c744d3329813b2fbbb62a2f57bee9ece1e1f71181fb603f50dbd33dbc1baab9320c420f76873120bf1a0b3d9a92d99b627076f107c7
-
Filesize
408B
MD5015e3455849c9c855f6c31aa1a005caf
SHA18f4bd2516d8a24982479805ad790875d1d7c9ebc
SHA256614084c29781dfc4d027b615cfddb39165f2bfc6bd974286b1c3ce42748868d3
SHA512b9aa1178e31b9446362063f6a6d824d57b4e813e545f241b831492647f12c80412c32625a58bb471434c214d622f4945d047524f6dbba0ef5814d953934a9f78