Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 20:41
Behavioral task
behavioral1
Sample
e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
Resource
win10v2004-20220812-en
General
-
Target
e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
-
Size
275KB
-
MD5
a3c31329eb8239a8b1b2a388adb31230
-
SHA1
66b25fe652814c98e48245096296b4510837fcea
-
SHA256
e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526
-
SHA512
0b2f67873a30612ecf1e4003af7201981917f329ba0d90796e92a37dfa322f76108b2830e7874abf8b4fe131011ff04d8f42599126b05bb75bad3f5c73a5e584
-
SSDEEP
3072:86jI9XJy7rIC88KuCHBTTZJ/bxKOzCJhVnCMkoU97Qe5HZB5ksrHFZqTTeTTTfq/:fUZyb83nLbxKVJ3nCMkQe5HZAsHFZlxQ
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00140000000054ab-59.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-57.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-55.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-72.dat aspack_v212_v242 behavioral1/files/0x00070000000131fd-74.dat aspack_v212_v242 -
Executes dropped EXE 4 IoCs
pid Process 1780 MSWDM.EXE 2040 MSWDM.EXE 1340 E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE 1708 MSWDM.EXE -
Loads dropped DLL 4 IoCs
pid Process 2040 MSWDM.EXE 1340 E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE 1340 E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE 1340 E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe File opened for modification C:\Windows\devFC69.tmp e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe File opened for modification C:\Windows\devFC69.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2040 MSWDM.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1784 wrote to memory of 1780 1784 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 28 PID 1784 wrote to memory of 1780 1784 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 28 PID 1784 wrote to memory of 1780 1784 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 28 PID 1784 wrote to memory of 1780 1784 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 28 PID 1784 wrote to memory of 2040 1784 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 29 PID 1784 wrote to memory of 2040 1784 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 29 PID 1784 wrote to memory of 2040 1784 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 29 PID 1784 wrote to memory of 2040 1784 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 29 PID 2040 wrote to memory of 1340 2040 MSWDM.EXE 30 PID 2040 wrote to memory of 1340 2040 MSWDM.EXE 30 PID 2040 wrote to memory of 1340 2040 MSWDM.EXE 30 PID 2040 wrote to memory of 1340 2040 MSWDM.EXE 30 PID 2040 wrote to memory of 1340 2040 MSWDM.EXE 30 PID 2040 wrote to memory of 1340 2040 MSWDM.EXE 30 PID 2040 wrote to memory of 1340 2040 MSWDM.EXE 30 PID 2040 wrote to memory of 1708 2040 MSWDM.EXE 31 PID 2040 wrote to memory of 1708 2040 MSWDM.EXE 31 PID 2040 wrote to memory of 1708 2040 MSWDM.EXE 31 PID 2040 wrote to memory of 1708 2040 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe"C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1780
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devFC69.tmp!C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE
- Executes dropped EXE
- Loads dropped DLL
PID:1340
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devFC69.tmp!C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1708
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE
Filesize275KB
MD5a68e9be956187a33cd38e7ebadf5b5d8
SHA11858ff56c227229e3364ba6302c33c0b56f18b91
SHA256658770a101a90b2aae0491d1358ceeb81724dcfdca601084a4121110a99d0d6a
SHA5120808bf7aa7d1d23ff2bb896d46abf8b9124b7655366d0e6126dfea69cb0227b28e1e52b0069d6dca6958f3bfa461b531ec7f39b9b50f62230139af7362875a2a
-
C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
Filesize
39KB
MD5834329cc204fdd1ec364bfc1bf8e1b8c
SHA1fa7f4df8ba394b3e5e18e8d3f83d487150636188
SHA25650099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6
SHA512d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1
-
Filesize
39KB
MD5834329cc204fdd1ec364bfc1bf8e1b8c
SHA1fa7f4df8ba394b3e5e18e8d3f83d487150636188
SHA25650099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6
SHA512d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1
-
Filesize
39KB
MD5834329cc204fdd1ec364bfc1bf8e1b8c
SHA1fa7f4df8ba394b3e5e18e8d3f83d487150636188
SHA25650099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6
SHA512d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1
-
Filesize
39KB
MD5834329cc204fdd1ec364bfc1bf8e1b8c
SHA1fa7f4df8ba394b3e5e18e8d3f83d487150636188
SHA25650099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6
SHA512d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1
-
Filesize
236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a