Analysis
-
max time kernel
150s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe
Resource
win10v2004-20220901-en
General
-
Target
a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe
-
Size
63KB
-
MD5
843bde15d124d8a04c1ff5c84fd0f9aa
-
SHA1
625e2391ee83e2096c967958249e2babbafd4236
-
SHA256
a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687
-
SHA512
0a1867c507411b1050a543135fccf3f12ec427e2f0d1562794aef5ad1016d37665fcc4be6db4cae5356b803e3497fecb583c37896c1586e91ba10c99f66b8474
-
SSDEEP
1536:xuZsjJoF95XAhTxE7o96EgfAvybHD1MVrjjd4h7:xzYH7o96zvj1MVrj5S7
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 2 IoCs
pid Process 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 1520 RunDll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\System Share = "RunDll32 \"C:\\Windows\\Offline Web Pages\\ethostms.dll\",Init" a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\srvsvcup.dll a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe File opened for modification C:\Program Files (x86)\Common Files\srvsvcup.dll a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Offline Web Pages\ethostms.dll a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe File opened for modification C:\Windows\Offline Web Pages\ethostms.dll a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe File created C:\Windows\upsvclog.dll a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe File opened for modification C:\Windows\upsvclog.dll a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1520 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 27 PID 1720 wrote to memory of 1520 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 27 PID 1720 wrote to memory of 1520 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 27 PID 1720 wrote to memory of 1520 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 27 PID 1720 wrote to memory of 1520 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 27 PID 1720 wrote to memory of 1520 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 27 PID 1720 wrote to memory of 1520 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 27 PID 1720 wrote to memory of 1132 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 17 PID 1720 wrote to memory of 1132 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 17 PID 1720 wrote to memory of 1224 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 16 PID 1720 wrote to memory of 1224 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 16 PID 1720 wrote to memory of 1260 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 10 PID 1720 wrote to memory of 1260 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 10 PID 1720 wrote to memory of 1520 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 27 PID 1720 wrote to memory of 1520 1720 a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe 27
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe"C:\Users\Admin\AppData\Local\Temp\a8e7c1f9e632f436a9f5d9d34b8a9af0ebdae7ff33820b5631311fb3ba8cc687.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32 "C:\Users\Admin\AppData\Local\Temp\401D.tmp",Init3⤵
- Loads dropped DLL
PID:1520
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1224
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5e864a3fd42fc12182420c318b7524b14
SHA1406e596899b2cc168ba40c8c848811480dc05e9d
SHA256d21a206ff670a5ab1e05432b2c840f4535f76b898c00f9fe891a694cddde89ce
SHA5123702c21868f2d5e39094d4d6d7c02ede9420152efe550c17d1e71e68a2617666f75223a3622e30ab241673b1aaab32d09c9cf0f8a2a146cf81cd0c33395e3b8f
-
Filesize
60KB
MD5e864a3fd42fc12182420c318b7524b14
SHA1406e596899b2cc168ba40c8c848811480dc05e9d
SHA256d21a206ff670a5ab1e05432b2c840f4535f76b898c00f9fe891a694cddde89ce
SHA5123702c21868f2d5e39094d4d6d7c02ede9420152efe550c17d1e71e68a2617666f75223a3622e30ab241673b1aaab32d09c9cf0f8a2a146cf81cd0c33395e3b8f
-
Filesize
60KB
MD5e864a3fd42fc12182420c318b7524b14
SHA1406e596899b2cc168ba40c8c848811480dc05e9d
SHA256d21a206ff670a5ab1e05432b2c840f4535f76b898c00f9fe891a694cddde89ce
SHA5123702c21868f2d5e39094d4d6d7c02ede9420152efe550c17d1e71e68a2617666f75223a3622e30ab241673b1aaab32d09c9cf0f8a2a146cf81cd0c33395e3b8f