Analysis
-
max time kernel
139s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 22:51
Static task
static1
Behavioral task
behavioral1
Sample
b36d502eae3680fdd25acaf8c072e4e8c604860c34ba21bdd2ebafa845eff5f4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b36d502eae3680fdd25acaf8c072e4e8c604860c34ba21bdd2ebafa845eff5f4.exe
Resource
win10v2004-20220812-en
General
-
Target
b36d502eae3680fdd25acaf8c072e4e8c604860c34ba21bdd2ebafa845eff5f4.exe
-
Size
160KB
-
MD5
a24c3942c7f5c15c99c5a8c34c8f6a1f
-
SHA1
dfc3416e030e9b84e883d82fadbd0ee300c66464
-
SHA256
b36d502eae3680fdd25acaf8c072e4e8c604860c34ba21bdd2ebafa845eff5f4
-
SHA512
d1e82664679636eeadd831b4d29814f97055f5418a532ab0192fde0c8d293a5ad3ceadd72a403f41c7c52cc7d92407a7fe565c866a882719a9150d36c862a2ed
-
SSDEEP
3072:eqPL1/7w6ZAs+VBKbp6v7ag0Z2rDk7gkVzNJz:rQVAp6ja74Dksk7J
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000d000000022e3a-134.dat aspack_v212_v242 behavioral2/files/0x000d000000022e3a-135.dat aspack_v212_v242 behavioral2/files/0x0006000000022e47-140.dat aspack_v212_v242 behavioral2/files/0x0006000000022e47-141.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 4480 25c05025.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 25c05025.exe -
resource yara_rule behavioral2/files/0x000d000000022e3a-134.dat upx behavioral2/files/0x000d000000022e3a-135.dat upx behavioral2/memory/4480-136-0x00000000005C0000-0x00000000005E3000-memory.dmp upx behavioral2/memory/4480-137-0x00000000005C0000-0x00000000005E3000-memory.dmp upx behavioral2/memory/4480-138-0x00000000005C0000-0x00000000005E3000-memory.dmp upx behavioral2/files/0x0006000000022e47-140.dat upx behavioral2/memory/380-143-0x00000000750C0000-0x00000000750E3000-memory.dmp upx behavioral2/memory/380-145-0x00000000750C0000-0x00000000750E3000-memory.dmp upx behavioral2/memory/380-142-0x00000000750C0000-0x00000000750E3000-memory.dmp upx behavioral2/files/0x0006000000022e47-141.dat upx -
Loads dropped DLL 1 IoCs
pid Process 380 Svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\03A9089C.tmp 25c05025.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 25c05025.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4480 25c05025.exe 4480 25c05025.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2500 wrote to memory of 4480 2500 b36d502eae3680fdd25acaf8c072e4e8c604860c34ba21bdd2ebafa845eff5f4.exe 80 PID 2500 wrote to memory of 4480 2500 b36d502eae3680fdd25acaf8c072e4e8c604860c34ba21bdd2ebafa845eff5f4.exe 80 PID 2500 wrote to memory of 4480 2500 b36d502eae3680fdd25acaf8c072e4e8c604860c34ba21bdd2ebafa845eff5f4.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\b36d502eae3680fdd25acaf8c072e4e8c604860c34ba21bdd2ebafa845eff5f4.exe"C:\Users\Admin\AppData\Local\Temp\b36d502eae3680fdd25acaf8c072e4e8c604860c34ba21bdd2ebafa845eff5f4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\25c05025.exeC:\25c05025.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5f9eb547d634c2b2532b103b3c1e4f9fe
SHA1609d34725a0d254853141738320ef92c39685ecc
SHA256783c7a9830466d9f94a06382a25622a6b26349a2545c6f9eacb6529584497cf8
SHA5126aa64760d9a90d4d0ff46d13c0491b9a32b0f0edeea74ffcce13d45d031b54d09b29c05c5110f73ca63a253fcb0900d9722a600917497b8eff5ba4c45cdd07a8
-
Filesize
80KB
MD5f9eb547d634c2b2532b103b3c1e4f9fe
SHA1609d34725a0d254853141738320ef92c39685ecc
SHA256783c7a9830466d9f94a06382a25622a6b26349a2545c6f9eacb6529584497cf8
SHA5126aa64760d9a90d4d0ff46d13c0491b9a32b0f0edeea74ffcce13d45d031b54d09b29c05c5110f73ca63a253fcb0900d9722a600917497b8eff5ba4c45cdd07a8
-
Filesize
720B
MD502f66b1f34829f6b9cbbad8aad6f30a6
SHA15d9bc86c87f0c243d3974bf2784bf59c85d024c4
SHA256d95951a1d88553773d91bd52af5c0392983ec43f801db6ad0a0e75bfa7f02e44
SHA5126d73d097f131e901319af63f8dd082605d10eff30f6d956eb0c5c629df2d1db4f3083ff454425c0e09698502e32f8fff81c4301eef433b5e4da0841398d09247
-
Filesize
80KB
MD51b7d880628fce43d3db181b77983e17a
SHA18d98ec65f3e305af44a3d6fb3db8c325a2fcbd50
SHA2566b4c32b802614fe24832c11be0d650e8a5d21ba692704418849a82e98092d554
SHA5123ade907facda6676e9714aa03c7e84e4c8d9bc40cacdb9945d750d25a83fd2f8e94f35333e64d4256ee3204b3c29deb97772ff1ac49638541a11488dab7a6c62
-
Filesize
80KB
MD51b7d880628fce43d3db181b77983e17a
SHA18d98ec65f3e305af44a3d6fb3db8c325a2fcbd50
SHA2566b4c32b802614fe24832c11be0d650e8a5d21ba692704418849a82e98092d554
SHA5123ade907facda6676e9714aa03c7e84e4c8d9bc40cacdb9945d750d25a83fd2f8e94f35333e64d4256ee3204b3c29deb97772ff1ac49638541a11488dab7a6c62