Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe
Resource
win10v2004-20220812-en
General
-
Target
789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe
-
Size
134KB
-
MD5
441ed591e99f522a1c5c83d3d16158f0
-
SHA1
d2c03745ed364c355b4e3d66b9453a18c67543d9
-
SHA256
789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506
-
SHA512
87a919811d1be58f66dba4bfc23f137924b59b166ffe92026758f7c21d5350efbbf1180df7aa2457952fdb3f66211d7dae166831c911e9c4879f9103329723ff
-
SSDEEP
3072:S9ZufRZHR4++Tz3saVFJjO6cbsCuCsywO/FzdXr:S9ZurG/zjO6HWo+X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1640 Prosua.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\W1WIWQ1NPG = "C:\\Windows\\Prosua.exe" Prosua.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Prosua.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe File created C:\Windows\Prosua.exe 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe File opened for modification C:\Windows\Prosua.exe 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main Prosua.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\International Prosua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe 1640 Prosua.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1640 1064 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe 27 PID 1064 wrote to memory of 1640 1064 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe 27 PID 1064 wrote to memory of 1640 1064 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe 27 PID 1064 wrote to memory of 1640 1064 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe 27 PID 1064 wrote to memory of 1640 1064 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe 27 PID 1064 wrote to memory of 1640 1064 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe 27 PID 1064 wrote to memory of 1640 1064 789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe"C:\Users\Admin\AppData\Local\Temp\789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\Prosua.exeC:\Windows\Prosua.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5441ed591e99f522a1c5c83d3d16158f0
SHA1d2c03745ed364c355b4e3d66b9453a18c67543d9
SHA256789de9032e977804c546f0b65041b00ae2e1842e97570747397e0165a8448506
SHA51287a919811d1be58f66dba4bfc23f137924b59b166ffe92026758f7c21d5350efbbf1180df7aa2457952fdb3f66211d7dae166831c911e9c4879f9103329723ff
-
Filesize
408B
MD56a35d9c4b28570d692b739b23f5255f5
SHA14b21e085d8b8bf44385731af39266a13c6fd8e20
SHA256bbd89ef91b53ec90bc4268c014a5ba4d94bd3e76a2bedcaaf219a5c8132ef3b3
SHA512f63b209eee61a63d562f38b6e1a1180928789132ba34a6d15b32e9dd0db193325a54347e7e67d2b606c364eeb3c929c911954925edecd29b4823d0d18cac5cfb