Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 13:34
Static task
static1
Behavioral task
behavioral1
Sample
0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe
Resource
win10v2004-20220812-en
General
-
Target
0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe
-
Size
296KB
-
MD5
932ef2674fb6aab6a96746d9a47e6c50
-
SHA1
13696b398d5830ffe95334c9bca10eee1624e83b
-
SHA256
0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135
-
SHA512
9bcb6a92127cc0eba6ce6a65fb07efa51668a88579a9cf9b5da705687a6f24add1876b5ce93cdde4118d7d672c43b8449eed1441447636b518eb0509ddf85ec0
-
SSDEEP
6144:k6uSdqQDynGRXeoGVuO4UG4aKYw//AjYqMAkDxb0Q0LQ1m:keDyOXzldUG4aKYIojzM9Jx8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 860 inuxw.exe -
Deletes itself 1 IoCs
pid Process 1264 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Inuxw = "C:\\Users\\Admin\\AppData\\Roaming\\Dain\\inuxw.exe" inuxw.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run inuxw.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1248 set thread context of 1264 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 27 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe 860 inuxw.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1248 wrote to memory of 860 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 26 PID 1248 wrote to memory of 860 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 26 PID 1248 wrote to memory of 860 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 26 PID 1248 wrote to memory of 860 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 26 PID 860 wrote to memory of 1300 860 inuxw.exe 10 PID 860 wrote to memory of 1300 860 inuxw.exe 10 PID 860 wrote to memory of 1300 860 inuxw.exe 10 PID 860 wrote to memory of 1300 860 inuxw.exe 10 PID 860 wrote to memory of 1300 860 inuxw.exe 10 PID 860 wrote to memory of 1404 860 inuxw.exe 9 PID 860 wrote to memory of 1404 860 inuxw.exe 9 PID 860 wrote to memory of 1404 860 inuxw.exe 9 PID 860 wrote to memory of 1404 860 inuxw.exe 9 PID 860 wrote to memory of 1404 860 inuxw.exe 9 PID 860 wrote to memory of 1444 860 inuxw.exe 8 PID 860 wrote to memory of 1444 860 inuxw.exe 8 PID 860 wrote to memory of 1444 860 inuxw.exe 8 PID 860 wrote to memory of 1444 860 inuxw.exe 8 PID 860 wrote to memory of 1444 860 inuxw.exe 8 PID 860 wrote to memory of 1248 860 inuxw.exe 14 PID 860 wrote to memory of 1248 860 inuxw.exe 14 PID 860 wrote to memory of 1248 860 inuxw.exe 14 PID 860 wrote to memory of 1248 860 inuxw.exe 14 PID 860 wrote to memory of 1248 860 inuxw.exe 14 PID 1248 wrote to memory of 1264 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 27 PID 1248 wrote to memory of 1264 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 27 PID 1248 wrote to memory of 1264 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 27 PID 1248 wrote to memory of 1264 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 27 PID 1248 wrote to memory of 1264 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 27 PID 1248 wrote to memory of 1264 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 27 PID 1248 wrote to memory of 1264 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 27 PID 1248 wrote to memory of 1264 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 27 PID 1248 wrote to memory of 1264 1248 0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe 27
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe"C:\Users\Admin\AppData\Local\Temp\0c01a667864e3d3a4919906135f628e1b67ef2fddb5b1f4ef75a9400139a6135.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Roaming\Dain\inuxw.exe"C:\Users\Admin\AppData\Roaming\Dain\inuxw.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\WOK976C.bat"3⤵
- Deletes itself
PID:1264
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1404
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5374d76333971cd546009f1a308fbe7d7
SHA1ed391a56b503f27481edfe5d126aae433bb20032
SHA25666acf9c50a02d96f34e152b540d62b830fbfb8b1ad0c06d719ed4baeb4679890
SHA5127546476e6ea1c6d675df8f206c094ec7b0a565a1a02283cf241f9657cafd5ed13bc300c69bd903029534e74dced67e9ebc458545178f5aab667cfa0a537a74b2
-
Filesize
296KB
MD591b4759800cc1f7373c482210de7b337
SHA14201aaa2afb282d19447f7687db2b67911dfe773
SHA25623ee1ae75d8d59705148c52049507019876a5e8c26e6fa37c4a6f2c61c30debe
SHA512c1cf8fc5983892425a3bedaaf26618caf50c322373e543b209e87dcf0128f11df219ae07f426013ac4a4866db69ac018df564e2c1da9129854af80618e30fe3f
-
Filesize
296KB
MD591b4759800cc1f7373c482210de7b337
SHA14201aaa2afb282d19447f7687db2b67911dfe773
SHA25623ee1ae75d8d59705148c52049507019876a5e8c26e6fa37c4a6f2c61c30debe
SHA512c1cf8fc5983892425a3bedaaf26618caf50c322373e543b209e87dcf0128f11df219ae07f426013ac4a4866db69ac018df564e2c1da9129854af80618e30fe3f
-
Filesize
296KB
MD591b4759800cc1f7373c482210de7b337
SHA14201aaa2afb282d19447f7687db2b67911dfe773
SHA25623ee1ae75d8d59705148c52049507019876a5e8c26e6fa37c4a6f2c61c30debe
SHA512c1cf8fc5983892425a3bedaaf26618caf50c322373e543b209e87dcf0128f11df219ae07f426013ac4a4866db69ac018df564e2c1da9129854af80618e30fe3f
-
Filesize
296KB
MD591b4759800cc1f7373c482210de7b337
SHA14201aaa2afb282d19447f7687db2b67911dfe773
SHA25623ee1ae75d8d59705148c52049507019876a5e8c26e6fa37c4a6f2c61c30debe
SHA512c1cf8fc5983892425a3bedaaf26618caf50c322373e543b209e87dcf0128f11df219ae07f426013ac4a4866db69ac018df564e2c1da9129854af80618e30fe3f