Analysis
-
max time kernel
169s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 18:51
Static task
static1
Behavioral task
behavioral1
Sample
00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe
Resource
win10v2004-20220812-en
General
-
Target
00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe
-
Size
175KB
-
MD5
a36af6f6c153f389108c6f75fba0a000
-
SHA1
ff94af7ab590026001971625b94ec5a12ce16034
-
SHA256
00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7
-
SHA512
0af6a54b8821dcac71443d266f0f2c191e35f43827e0381dcd5eede698bb235f101f0fbafc601a2b056eb145e7d09cec6aeca2156f80e04d1cbebd5b300bf4bc
-
SSDEEP
3072:wQVG4urzuVGp8rojCJ37y1KqPL1/7w6ZZ+Jb29iCsD:woezrKMUyL+J5
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1772 MSWDM.EXE 3504 MSWDM.EXE 4780 MSWDM.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe MSWDM.EXE -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe File opened for modification C:\Windows\dev540.tmp 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe File opened for modification C:\Windows\dev540.tmp MSWDM.EXE File opened for modification C:\Windows\die58E.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3504 MSWDM.EXE 3504 MSWDM.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4668 wrote to memory of 1772 4668 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe 80 PID 4668 wrote to memory of 1772 4668 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe 80 PID 4668 wrote to memory of 1772 4668 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe 80 PID 4668 wrote to memory of 3504 4668 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe 81 PID 4668 wrote to memory of 3504 4668 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe 81 PID 4668 wrote to memory of 3504 4668 00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe 81 PID 3504 wrote to memory of 4780 3504 MSWDM.EXE 82 PID 3504 wrote to memory of 4780 3504 MSWDM.EXE 82 PID 3504 wrote to memory of 4780 3504 MSWDM.EXE 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe"C:\Users\Admin\AppData\Local\Temp\00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1772
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev540.tmp!C:\Users\Admin\AppData\Local\Temp\00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev540.tmp!C:\Users\Admin\AppData\Local\Temp\00875B5A08144E28B8FAE64A425F7F598FD5C276DEC726DA780AFC2E1AA3E3A7.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\00875B5A08144E28B8FAE64A425F7F598FD5C276DEC726DA780AFC2E1AA3E3A7.EXE
Filesize175KB
MD564b8f209fec2b60c49c4ddfc25ba81e5
SHA1180851c707b900ef2c1826c50befa5cd9627c2e2
SHA256510661f77d48f5ef1af0a5484b10797b6c594da79e538250ee6e9865926b061a
SHA5126ef9e0269244f7342d8f30ea4326a4840e94fa8d5cd7a422258473c4c25e04cc2b70c531265104de64132eca353d3b338c2741539aa49aeaaa17c1cb3e8a32c3
-
C:\Users\Admin\AppData\Local\Temp\00875B5A08144E28B8FAE64A425F7F598FD5C276DEC726DA780AFC2E1AA3E3A7.EXE
Filesize175KB
MD564b8f209fec2b60c49c4ddfc25ba81e5
SHA1180851c707b900ef2c1826c50befa5cd9627c2e2
SHA256510661f77d48f5ef1af0a5484b10797b6c594da79e538250ee6e9865926b061a
SHA5126ef9e0269244f7342d8f30ea4326a4840e94fa8d5cd7a422258473c4c25e04cc2b70c531265104de64132eca353d3b338c2741539aa49aeaaa17c1cb3e8a32c3
-
Filesize
128KB
MD52865f575487ebb3cd3a0feeb69c8c5c1
SHA13f4545160bb698cf33b3f497555ca7cafcd3be55
SHA256faeb4c15832b84805829da3d627a68523224ba5007ceac6b1ebcac9660bb3c6b
SHA512e23c2eb00413f056e934284f8dae5e3a33f3514d586c0070380656ee676a9ff9160a55aed2bd75b1a5f79e577cc7def2a0aedea5c3db0f1f0a13ce84ce651dd6
-
Filesize
128KB
MD52865f575487ebb3cd3a0feeb69c8c5c1
SHA13f4545160bb698cf33b3f497555ca7cafcd3be55
SHA256faeb4c15832b84805829da3d627a68523224ba5007ceac6b1ebcac9660bb3c6b
SHA512e23c2eb00413f056e934284f8dae5e3a33f3514d586c0070380656ee676a9ff9160a55aed2bd75b1a5f79e577cc7def2a0aedea5c3db0f1f0a13ce84ce651dd6
-
Filesize
128KB
MD52865f575487ebb3cd3a0feeb69c8c5c1
SHA13f4545160bb698cf33b3f497555ca7cafcd3be55
SHA256faeb4c15832b84805829da3d627a68523224ba5007ceac6b1ebcac9660bb3c6b
SHA512e23c2eb00413f056e934284f8dae5e3a33f3514d586c0070380656ee676a9ff9160a55aed2bd75b1a5f79e577cc7def2a0aedea5c3db0f1f0a13ce84ce651dd6
-
Filesize
128KB
MD52865f575487ebb3cd3a0feeb69c8c5c1
SHA13f4545160bb698cf33b3f497555ca7cafcd3be55
SHA256faeb4c15832b84805829da3d627a68523224ba5007ceac6b1ebcac9660bb3c6b
SHA512e23c2eb00413f056e934284f8dae5e3a33f3514d586c0070380656ee676a9ff9160a55aed2bd75b1a5f79e577cc7def2a0aedea5c3db0f1f0a13ce84ce651dd6
-
Filesize
47KB
MD551e1c3c29b536bf2f238dc899f807f49
SHA1d42bbd9ff653e6c57bdecd5e572cee94cbc5d8c6
SHA256cdad66faf00bdb8a68425d537c12ceae853ad38dc50ae15cf70080fb34511a8a
SHA512a011acaf08b7fa7bcf6551d0bebad6ab5fe27af96243f0cbc5836e09b49275a63ed39fdd02301d5cd1af7e8e7fd686f11d91ee80bc49b3e5f1d8c36d908974ad