Analysis
-
max time kernel
150s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe
Resource
win10v2004-20220812-en
General
-
Target
a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe
-
Size
244KB
-
MD5
9276df420e6422f4489dd1404fe82921
-
SHA1
a118392762aa738abbfacc0c923af48a457cd881
-
SHA256
a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a
-
SHA512
c260b5f77df747806cc7e507bb1660650e535bf87dcf6e3337341eeb0a5242c8b66f38d9a5ce9ed0a07520e4bcc40885f9a83e24348746f975a1a67a41dfac86
-
SSDEEP
6144:+0cN3KeKxnPXKV9XsWvw88XDJQ3f5vBWzG1Tk3h3gvgH1b:+083l6ybXt38cv31A3h3dHZ
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe 2036 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2036 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe 27 PID 1672 wrote to memory of 2036 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe 27 PID 1672 wrote to memory of 2036 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe 27 PID 1672 wrote to memory of 2036 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe 27 PID 1672 wrote to memory of 2036 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe 27 PID 1672 wrote to memory of 2036 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe 27 PID 1672 wrote to memory of 2036 1672 a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe"C:\Users\Admin\AppData\Local\Temp\a73c7109748231e8b5299b7f71f4f3df9d91e284a078cd66fd3de65a64c7382a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
533KB
MD5f459ab29f59f51828e0880c1ffe7c7b9
SHA1262bc768e5afc48bcad8357df3fb13d176d6f790
SHA2563d57ca9bfb09d66e73ed2ebb646526233b3d14fb6c6b58fef17f553dad49602a
SHA512b6565b9e902e8523175acf5a6d17da073d8a1197dfb001ec8143ed940fcdd4abd322b8a4a7cac9db082f4ce2d167b9cf80787669727ca28c748ed5d0db799097
-
Filesize
533KB
MD5f459ab29f59f51828e0880c1ffe7c7b9
SHA1262bc768e5afc48bcad8357df3fb13d176d6f790
SHA2563d57ca9bfb09d66e73ed2ebb646526233b3d14fb6c6b58fef17f553dad49602a
SHA512b6565b9e902e8523175acf5a6d17da073d8a1197dfb001ec8143ed940fcdd4abd322b8a4a7cac9db082f4ce2d167b9cf80787669727ca28c748ed5d0db799097
-
Filesize
533KB
MD5f459ab29f59f51828e0880c1ffe7c7b9
SHA1262bc768e5afc48bcad8357df3fb13d176d6f790
SHA2563d57ca9bfb09d66e73ed2ebb646526233b3d14fb6c6b58fef17f553dad49602a
SHA512b6565b9e902e8523175acf5a6d17da073d8a1197dfb001ec8143ed940fcdd4abd322b8a4a7cac9db082f4ce2d167b9cf80787669727ca28c748ed5d0db799097
-
Filesize
533KB
MD5f459ab29f59f51828e0880c1ffe7c7b9
SHA1262bc768e5afc48bcad8357df3fb13d176d6f790
SHA2563d57ca9bfb09d66e73ed2ebb646526233b3d14fb6c6b58fef17f553dad49602a
SHA512b6565b9e902e8523175acf5a6d17da073d8a1197dfb001ec8143ed940fcdd4abd322b8a4a7cac9db082f4ce2d167b9cf80787669727ca28c748ed5d0db799097
-
Filesize
533KB
MD5f459ab29f59f51828e0880c1ffe7c7b9
SHA1262bc768e5afc48bcad8357df3fb13d176d6f790
SHA2563d57ca9bfb09d66e73ed2ebb646526233b3d14fb6c6b58fef17f553dad49602a
SHA512b6565b9e902e8523175acf5a6d17da073d8a1197dfb001ec8143ed940fcdd4abd322b8a4a7cac9db082f4ce2d167b9cf80787669727ca28c748ed5d0db799097
-
Filesize
533KB
MD5f459ab29f59f51828e0880c1ffe7c7b9
SHA1262bc768e5afc48bcad8357df3fb13d176d6f790
SHA2563d57ca9bfb09d66e73ed2ebb646526233b3d14fb6c6b58fef17f553dad49602a
SHA512b6565b9e902e8523175acf5a6d17da073d8a1197dfb001ec8143ed940fcdd4abd322b8a4a7cac9db082f4ce2d167b9cf80787669727ca28c748ed5d0db799097