Analysis
-
max time kernel
111s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 23:20
Behavioral task
behavioral1
Sample
7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe
Resource
win10v2004-20220901-en
General
-
Target
7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe
-
Size
133KB
-
MD5
84670a7444524a0976ac9b4e68054d1d
-
SHA1
7a81c0382423e0b3c0a424c12ecfb2a4e01b16f2
-
SHA256
7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3
-
SHA512
f1eb71a888ef0d2c55a84fae67a98b24442d8cd649dc34660be49f51d90af7282a36ba93d6e14ede4497faecc724ec7a6f8e42ca57a7f6dd919e6527fcb7344f
-
SSDEEP
3072:QYaAMtTy3tKlMWa4kmW6i2nzHxWPkLJ+ia8ppR7:AAiM54k/6fxWWJ9aY
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1688-55-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run 7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\NtWqIVLZEWZU = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe" 7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{BBAEAEAF-1275-40e2-BD6C-BC8F88BD114A}.job 7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe File opened for modification C:\Windows\Tasks\{BBAEAEAF-1275-40e2-BD6C-BC8F88BD114A}.job 7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\International 7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1688 7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe 1688 7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1164 wrote to memory of 1104 1164 taskeng.exe 29 PID 1164 wrote to memory of 1104 1164 taskeng.exe 29 PID 1164 wrote to memory of 1104 1164 taskeng.exe 29 PID 1164 wrote to memory of 1104 1164 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe"C:\Users\Admin\AppData\Local\Temp\7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
C:\Windows\system32\taskeng.exetaskeng.exe {F65ED324-CC95-4885-A111-F8DAC215C566} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exeC:\Users\Admin\AppData\Local\Temp\7310a5cfe0578d541465e288497268b4a6a33af5cd094c5af5d7bedd2b0c45b3.exe2⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:1104
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD5556e36e19813e80a5b7502342b8c09a6
SHA1a98867ffe528b543ac685ef592efacd2731d25e4
SHA256ed43ae6fe2199330fd18aad067289806854a88cda799c6edd5d3f0430e02fdd0
SHA512accde6329b64cab4787f7431ad0be2bc4d80460a213226ea68ebebb13f76ae4fd5a99453c7369c623da78dcfd7fef0c38375a02a83532b8d012d69f9d9e49f82