Analysis
-
max time kernel
132s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 02:27
Static task
static1
Behavioral task
behavioral1
Sample
d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17.exe
Resource
win10v2004-20220812-en
General
-
Target
d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17.exe
-
Size
176KB
-
MD5
a300bd3280be27d97dbe84965e573130
-
SHA1
5071489d1f9a96a97feae0bf2d94e08290f12d25
-
SHA256
d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17
-
SHA512
516c3c690252a1edb0457f47e04ce3b444b7a61039dc1038e32fe7d584b6a8946e19aebf346e70889d796c1b9e8a8840aeff980d1905bc96ce22b184453df0d2
-
SSDEEP
3072:nNf3wRqQxKvxnsRcaCynRUgh2MFi3pKZY51YtNJg/:NPeyxTUlhB0ZIY4PJg
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0008000000022e14-133.dat aspack_v212_v242 behavioral2/files/0x0008000000022e14-134.dat aspack_v212_v242 behavioral2/files/0x000d000000022e10-140.dat aspack_v212_v242 behavioral2/files/0x000d000000022e10-141.dat aspack_v212_v242 behavioral2/files/0x0007000000022e1f-150.dat aspack_v212_v242 behavioral2/files/0x0007000000022e1f-148.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2740 4b167819.exe -
Sets DLL path for service in the registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 4b167819.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 4b167819.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 4b167819.exe -
resource yara_rule behavioral2/files/0x0008000000022e14-133.dat upx behavioral2/files/0x0008000000022e14-134.dat upx behavioral2/memory/2740-136-0x0000000000680000-0x00000000006A5000-memory.dmp upx behavioral2/memory/2740-137-0x0000000000680000-0x00000000006A5000-memory.dmp upx behavioral2/memory/2740-138-0x0000000000680000-0x00000000006A5000-memory.dmp upx behavioral2/files/0x000d000000022e10-140.dat upx behavioral2/files/0x000d000000022e10-141.dat upx behavioral2/memory/4788-142-0x00000000752A0000-0x00000000752C5000-memory.dmp upx behavioral2/memory/4788-143-0x00000000752A0000-0x00000000752C5000-memory.dmp upx behavioral2/memory/4788-145-0x00000000752A0000-0x00000000752C5000-memory.dmp upx behavioral2/memory/2740-149-0x0000000000680000-0x00000000006A5000-memory.dmp upx behavioral2/memory/1724-151-0x00000000752A0000-0x00000000752C5000-memory.dmp upx behavioral2/memory/1724-152-0x00000000752A0000-0x00000000752C5000-memory.dmp upx behavioral2/files/0x0007000000022e1f-150.dat upx behavioral2/files/0x0007000000022e1f-148.dat upx behavioral2/memory/4788-147-0x00000000752A0000-0x00000000752C5000-memory.dmp upx behavioral2/memory/1724-153-0x00000000752A0000-0x00000000752C5000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 4788 Svchost.exe 1724 Svchost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Irmon.dll 4b167819.exe File opened for modification C:\Windows\SysWOW64\14DA0A10.tmp 4b167819.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 4b167819.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 4b167819.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2740 4b167819.exe 2740 4b167819.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2084 d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2740 2084 d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17.exe 81 PID 2084 wrote to memory of 2740 2084 d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17.exe 81 PID 2084 wrote to memory of 2740 2084 d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17.exe"C:\Users\Admin\AppData\Local\Temp\d1a0b545312e8cef38e89869c641edf2d7b6fa465ca27feedb29eb332b85db17.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\4b167819.exeC:\4b167819.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:4788
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
PID:1724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD54f64150027ef95e311ddedeb266edf47
SHA1a386c4b2fe25edc78b5e12434b6205061b12ff4f
SHA256fcab76c8513c63f5a8f158f3758e7abb91f2dff3436302ff77fed68b34444c70
SHA512bbf81485f0098830d9b56c6e13174de3fe81d79f24f4d23db81d4032f14ca72de130e7257a003c0e34d95f34325903ff914e22eb144ac39d21aaadb3cebe2375
-
Filesize
84KB
MD54f64150027ef95e311ddedeb266edf47
SHA1a386c4b2fe25edc78b5e12434b6205061b12ff4f
SHA256fcab76c8513c63f5a8f158f3758e7abb91f2dff3436302ff77fed68b34444c70
SHA512bbf81485f0098830d9b56c6e13174de3fe81d79f24f4d23db81d4032f14ca72de130e7257a003c0e34d95f34325903ff914e22eb144ac39d21aaadb3cebe2375
-
Filesize
720B
MD5fb464ffd8619ebfc9d7cea8ffc2ac65d
SHA1e8e49665c68e2c77d51d99bdb5c56060db72c628
SHA256f581522cbb50383f914e4cd194ae639934667d66a035fa5c942a0f5e05d30f70
SHA51237de177750a94c3b3ba7baff2dbc447703983b04f58287fb73c582cc0fb5a7fc756210cb80b44db40b4df969a3075351c869f4782f056864b883413b07f8ce92
-
Filesize
84KB
MD532872c6531e576a67060607c2164d171
SHA1c42662ef6fb61c556b63acae1e6979bd0e18970b
SHA256bd7779ec20ac4e5b3321cd6ec9b0662d8dccfe9fb98046a7c3cbf2db314af813
SHA512a23892645f554c2b748f4a415d915b77fe5308f8ad9e85962a808039c9ed5a6bbf4011af3080a1ee8a16625da07b0a74c4dc36e3fc493b0210bb665a1d597c16
-
Filesize
84KB
MD532872c6531e576a67060607c2164d171
SHA1c42662ef6fb61c556b63acae1e6979bd0e18970b
SHA256bd7779ec20ac4e5b3321cd6ec9b0662d8dccfe9fb98046a7c3cbf2db314af813
SHA512a23892645f554c2b748f4a415d915b77fe5308f8ad9e85962a808039c9ed5a6bbf4011af3080a1ee8a16625da07b0a74c4dc36e3fc493b0210bb665a1d597c16
-
Filesize
84KB
MD532872c6531e576a67060607c2164d171
SHA1c42662ef6fb61c556b63acae1e6979bd0e18970b
SHA256bd7779ec20ac4e5b3321cd6ec9b0662d8dccfe9fb98046a7c3cbf2db314af813
SHA512a23892645f554c2b748f4a415d915b77fe5308f8ad9e85962a808039c9ed5a6bbf4011af3080a1ee8a16625da07b0a74c4dc36e3fc493b0210bb665a1d597c16
-
Filesize
84KB
MD532872c6531e576a67060607c2164d171
SHA1c42662ef6fb61c556b63acae1e6979bd0e18970b
SHA256bd7779ec20ac4e5b3321cd6ec9b0662d8dccfe9fb98046a7c3cbf2db314af813
SHA512a23892645f554c2b748f4a415d915b77fe5308f8ad9e85962a808039c9ed5a6bbf4011af3080a1ee8a16625da07b0a74c4dc36e3fc493b0210bb665a1d597c16