Analysis
-
max time kernel
582s -
max time network
595s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 04:50
Static task
static1
Behavioral task
behavioral1
Sample
0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe
Resource
win10v2004-20220812-en
General
-
Target
0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe
-
Size
113KB
-
MD5
7089d78869a3d8e56a9c25d99beace21
-
SHA1
a8904ead1b344e6bf12368dbb3a151282acc1ebb
-
SHA256
0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb
-
SHA512
09de8f75ae3ba42f03200d4795458462ddb7a15154483c7906d55f75558427ff184a0ec58fd477db115d4b64043c6f1ecf5408e571ca6039a26274c244565af2
-
SSDEEP
3072:BZjg7oWMNfVEwslMwDrgsLLRtQH+TKSY:/YeVEwsRrgEQHOKS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1684 windrv.exe -
Loads dropped DLL 2 IoCs
pid Process 1652 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe 1652 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Driver = "C:\\Windows\\M-505002805264850268057427545920\\windrv.exe" 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Driver = "C:\\Windows\\M-505002805264850268057427545920\\windrv.exe" 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-505002805264850268057427545920\windrv.exe 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe File opened for modification C:\Windows\M-505002805264850268057427545920\windrv.exe 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe File opened for modification C:\Windows\M-505002805264850268057427545920 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1684 1652 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe 28 PID 1652 wrote to memory of 1684 1652 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe 28 PID 1652 wrote to memory of 1684 1652 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe 28 PID 1652 wrote to memory of 1684 1652 0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe"C:\Users\Admin\AppData\Local\Temp\0e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\M-505002805264850268057427545920\windrv.exeC:\Windows\M-505002805264850268057427545920\windrv.exe2⤵
- Executes dropped EXE
PID:1684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD57089d78869a3d8e56a9c25d99beace21
SHA1a8904ead1b344e6bf12368dbb3a151282acc1ebb
SHA2560e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb
SHA51209de8f75ae3ba42f03200d4795458462ddb7a15154483c7906d55f75558427ff184a0ec58fd477db115d4b64043c6f1ecf5408e571ca6039a26274c244565af2
-
Filesize
113KB
MD57089d78869a3d8e56a9c25d99beace21
SHA1a8904ead1b344e6bf12368dbb3a151282acc1ebb
SHA2560e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb
SHA51209de8f75ae3ba42f03200d4795458462ddb7a15154483c7906d55f75558427ff184a0ec58fd477db115d4b64043c6f1ecf5408e571ca6039a26274c244565af2
-
Filesize
113KB
MD57089d78869a3d8e56a9c25d99beace21
SHA1a8904ead1b344e6bf12368dbb3a151282acc1ebb
SHA2560e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb
SHA51209de8f75ae3ba42f03200d4795458462ddb7a15154483c7906d55f75558427ff184a0ec58fd477db115d4b64043c6f1ecf5408e571ca6039a26274c244565af2
-
Filesize
113KB
MD57089d78869a3d8e56a9c25d99beace21
SHA1a8904ead1b344e6bf12368dbb3a151282acc1ebb
SHA2560e82206694057d79df3f511210307767bea8d1d0c4d4deafb6757fcbceda0fbb
SHA51209de8f75ae3ba42f03200d4795458462ddb7a15154483c7906d55f75558427ff184a0ec58fd477db115d4b64043c6f1ecf5408e571ca6039a26274c244565af2