Analysis
-
max time kernel
147s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 18:51
Behavioral task
behavioral1
Sample
57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe
Resource
win10v2004-20220812-en
General
-
Target
57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe
-
Size
95KB
-
MD5
a35f9acfb1d0e109582c4a489d8fd890
-
SHA1
94d55fbd5e169c882d5cd58c262fcaf73be6bbb5
-
SHA256
57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c
-
SHA512
201395205f83736cb2ece2bc0ce74fcd07249b863aa172f067d88bb2b322068cd9f865f2a3ba5ceae4b35bf0e892618dd1444885fad66aada82745c3c7012d33
-
SSDEEP
1536:zaYQxWlDtiw/L+LCC6nQXqw4QO/2jIy3v5BW4ntGcKe1R+1EVwliV0JX17:mYFkGC6nQXqw4L2R/WCtFU1gV0JX17
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0007000000005c50-60.dat aspack_v212_v242 behavioral1/files/0x0007000000005c50-58.dat aspack_v212_v242 behavioral1/files/0x0007000000005c50-57.dat aspack_v212_v242 behavioral1/files/0x0007000000005c50-63.dat aspack_v212_v242 behavioral1/files/0x00070000000139e4-64.dat aspack_v212_v242 behavioral1/files/0x00070000000139e4-66.dat aspack_v212_v242 -
Executes dropped EXE 3 IoCs
pid Process 1620 MSWDM.EXE 1956 MSWDM.EXE 1944 MSWDM.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe File opened for modification C:\Windows\dev737C.tmp 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe File opened for modification C:\Windows\dev737C.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1956 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1620 1612 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe 26 PID 1612 wrote to memory of 1620 1612 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe 26 PID 1612 wrote to memory of 1620 1612 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe 26 PID 1612 wrote to memory of 1620 1612 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe 26 PID 1612 wrote to memory of 1956 1612 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe 27 PID 1612 wrote to memory of 1956 1612 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe 27 PID 1612 wrote to memory of 1956 1612 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe 27 PID 1612 wrote to memory of 1956 1612 57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe 27 PID 1956 wrote to memory of 1944 1956 MSWDM.EXE 28 PID 1956 wrote to memory of 1944 1956 MSWDM.EXE 28 PID 1956 wrote to memory of 1944 1956 MSWDM.EXE 28 PID 1956 wrote to memory of 1944 1956 MSWDM.EXE 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe"C:\Users\Admin\AppData\Local\Temp\57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1620
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev737C.tmp!C:\Users\Admin\AppData\Local\Temp\57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev737C.tmp!C:\Users\Admin\AppData\Local\Temp\57DA2B6CE84340199C7586EF8DEDF503DACD7607C9A3D163D87ACE54394F194C.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1944
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\57DA2B6CE84340199C7586EF8DEDF503DACD7607C9A3D163D87ACE54394F194C.EXE
Filesize95KB
MD5d86713571ced7f2e44d7b5c70216aa10
SHA1910e3d9fdec0e28be4b593c16d2244382fecde58
SHA25601db0a62043681e9639e26b95febee487e0fb0f6373d9c40d9bbbdd3a55078b1
SHA512a711c761541c16f9511f912a7228caa39002f376a922776bae1ed18a13364da6ab98bec8b62adf9768a52e2b81da907df9cffcfd1c52b197ad3c4cbb39545415
-
C:\Users\Admin\AppData\Local\Temp\57DA2B6CE84340199C7586EF8DEDF503DACD7607C9A3D163D87ACE54394F194C.EXE
Filesize95KB
MD5d86713571ced7f2e44d7b5c70216aa10
SHA1910e3d9fdec0e28be4b593c16d2244382fecde58
SHA25601db0a62043681e9639e26b95febee487e0fb0f6373d9c40d9bbbdd3a55078b1
SHA512a711c761541c16f9511f912a7228caa39002f376a922776bae1ed18a13364da6ab98bec8b62adf9768a52e2b81da907df9cffcfd1c52b197ad3c4cbb39545415
-
Filesize
80KB
MD53ad717b5da6b9cfc84e997a440411b84
SHA19ee65c7f726bf9bfbac347e41434fcf7446f7bc1
SHA2560a1f11aa676e9077e466256eac57ba30eafa57c8fb9201d05b1aef2aa1b0bbf6
SHA512a4d9d5670bbb6a5c93c159f83d43d41207281cfe37273292ba2e6e73efd98319742a9c3d52593f1cd98365bd4808858839fe83bed95b6b80f658ec207cf655db
-
Filesize
80KB
MD53ad717b5da6b9cfc84e997a440411b84
SHA19ee65c7f726bf9bfbac347e41434fcf7446f7bc1
SHA2560a1f11aa676e9077e466256eac57ba30eafa57c8fb9201d05b1aef2aa1b0bbf6
SHA512a4d9d5670bbb6a5c93c159f83d43d41207281cfe37273292ba2e6e73efd98319742a9c3d52593f1cd98365bd4808858839fe83bed95b6b80f658ec207cf655db
-
Filesize
80KB
MD53ad717b5da6b9cfc84e997a440411b84
SHA19ee65c7f726bf9bfbac347e41434fcf7446f7bc1
SHA2560a1f11aa676e9077e466256eac57ba30eafa57c8fb9201d05b1aef2aa1b0bbf6
SHA512a4d9d5670bbb6a5c93c159f83d43d41207281cfe37273292ba2e6e73efd98319742a9c3d52593f1cd98365bd4808858839fe83bed95b6b80f658ec207cf655db
-
Filesize
80KB
MD53ad717b5da6b9cfc84e997a440411b84
SHA19ee65c7f726bf9bfbac347e41434fcf7446f7bc1
SHA2560a1f11aa676e9077e466256eac57ba30eafa57c8fb9201d05b1aef2aa1b0bbf6
SHA512a4d9d5670bbb6a5c93c159f83d43d41207281cfe37273292ba2e6e73efd98319742a9c3d52593f1cd98365bd4808858839fe83bed95b6b80f658ec207cf655db
-
Filesize
15KB
MD5b3e875aa5bc8a616eb056e6980f476bc
SHA164ba0e739860ee28d93865846a932e36d9b41e29
SHA256f147270269d91748da1dddd07d6f7248cca65dc11b8084d10f147f18624a21a5
SHA512a4698569314cd01ba06103d79c9c742a39fd3d142bb54b1a2bbab85a91ba4a39ce85863de87069915e5276dc8077f940a741439bd44b14257d54adb8888be3dc