Analysis
-
max time kernel
87s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 20:41
Behavioral task
behavioral1
Sample
e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
Resource
win10v2004-20220812-en
General
-
Target
e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
-
Size
275KB
-
MD5
a3c31329eb8239a8b1b2a388adb31230
-
SHA1
66b25fe652814c98e48245096296b4510837fcea
-
SHA256
e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526
-
SHA512
0b2f67873a30612ecf1e4003af7201981917f329ba0d90796e92a37dfa322f76108b2830e7874abf8b4fe131011ff04d8f42599126b05bb75bad3f5c73a5e584
-
SSDEEP
3072:86jI9XJy7rIC88KuCHBTTZJ/bxKOzCJhVnCMkoU97Qe5HZB5ksrHFZqTTeTTTfq/:fUZyb83nLbxKVJ3nCMkQe5HZAsHFZlxQ
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000a000000022e27-135.dat aspack_v212_v242 behavioral2/files/0x000a000000022e27-134.dat aspack_v212_v242 behavioral2/files/0x000a000000022e27-137.dat aspack_v212_v242 behavioral2/files/0x000a000000022e27-143.dat aspack_v212_v242 behavioral2/files/0x0007000000022e33-144.dat aspack_v212_v242 behavioral2/files/0x0007000000022e33-146.dat aspack_v212_v242 -
Executes dropped EXE 4 IoCs
pid Process 3692 MSWDM.EXE 4796 MSWDM.EXE 1124 E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE 2236 MSWDM.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\devA24F.tmp MSWDM.EXE File opened for modification C:\Windows\dieA26F.tmp MSWDM.EXE File created C:\WINDOWS\MSWDM.EXE e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe File opened for modification C:\Windows\devA24F.tmp e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4796 MSWDM.EXE 4796 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4372 wrote to memory of 3692 4372 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 81 PID 4372 wrote to memory of 3692 4372 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 81 PID 4372 wrote to memory of 3692 4372 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 81 PID 4372 wrote to memory of 4796 4372 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 82 PID 4372 wrote to memory of 4796 4372 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 82 PID 4372 wrote to memory of 4796 4372 e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe 82 PID 4796 wrote to memory of 1124 4796 MSWDM.EXE 83 PID 4796 wrote to memory of 1124 4796 MSWDM.EXE 83 PID 4796 wrote to memory of 1124 4796 MSWDM.EXE 83 PID 4796 wrote to memory of 2236 4796 MSWDM.EXE 84 PID 4796 wrote to memory of 2236 4796 MSWDM.EXE 84 PID 4796 wrote to memory of 2236 4796 MSWDM.EXE 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe"C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:3692
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devA24F.tmp!C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE
- Executes dropped EXE
PID:1124
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devA24F.tmp!C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2236
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE
Filesize275KB
MD51f22952b19665391bd64a6aab537f178
SHA1a174402a75c546ac5a5ab238ddd0e41159a7c63c
SHA256cd36dd9bdc8c441081864aee7b2699b47c0846de1d4a7c83238b1c0f5b7a95bc
SHA5124bb7fd4ed9c344f860cd84dcce806463ab40ea026f9baca9ad6969231dead9a6c51a6b6e361c8e153d164b1e94acf7374e9ec4cb779d4759241e073c0602788c
-
C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE
Filesize275KB
MD51f22952b19665391bd64a6aab537f178
SHA1a174402a75c546ac5a5ab238ddd0e41159a7c63c
SHA256cd36dd9bdc8c441081864aee7b2699b47c0846de1d4a7c83238b1c0f5b7a95bc
SHA5124bb7fd4ed9c344f860cd84dcce806463ab40ea026f9baca9ad6969231dead9a6c51a6b6e361c8e153d164b1e94acf7374e9ec4cb779d4759241e073c0602788c
-
C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
Filesize
39KB
MD5834329cc204fdd1ec364bfc1bf8e1b8c
SHA1fa7f4df8ba394b3e5e18e8d3f83d487150636188
SHA25650099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6
SHA512d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1
-
Filesize
39KB
MD5834329cc204fdd1ec364bfc1bf8e1b8c
SHA1fa7f4df8ba394b3e5e18e8d3f83d487150636188
SHA25650099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6
SHA512d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1
-
Filesize
39KB
MD5834329cc204fdd1ec364bfc1bf8e1b8c
SHA1fa7f4df8ba394b3e5e18e8d3f83d487150636188
SHA25650099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6
SHA512d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1
-
Filesize
39KB
MD5834329cc204fdd1ec364bfc1bf8e1b8c
SHA1fa7f4df8ba394b3e5e18e8d3f83d487150636188
SHA25650099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6
SHA512d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1
-
Filesize
236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a