Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe
Resource
win10v2004-20220901-en
General
-
Target
5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe
-
Size
2.3MB
-
MD5
21f907c5a98e33dafae34abb65d3372c
-
SHA1
e25107343cb1c978c7905260b5ac0208e0ee5dd6
-
SHA256
5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82
-
SHA512
8c4242756784040c677e07928de099e15223e1a14509e9a351843eb262a7031cc73f57453f250b212874bd3e72790ae4d4d552ed31a4479e2cfa1a31080b8c4b
-
SSDEEP
49152:tiizCouK9TOi91khWPOmisL3GAGUTMT3x28:T98+CTk8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1952 ntldr.exe -
Loads dropped DLL 6 IoCs
pid Process 1880 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe 1880 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe 2036 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NT4 hosting service = "C:\\Windows\\system32\\ntldr.exe" 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ntldr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NT4 hosting service = "C:\\Windows\\system32\\ntldr.exe" ntldr.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntldr.exe 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe File created C:\Windows\SysWOW64\ntldr.exe 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe File opened for modification C:\Windows\SysWOW64\RCXE92.tmp 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe File opened for modification C:\Windows\SysWOW64\ntldr.exe ntldr.exe File created C:\Windows\SysWOW64\ntldr.exe ntldr.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1116 1880 WerFault.exe 1 2036 1952 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1952 1880 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe 27 PID 1880 wrote to memory of 1952 1880 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe 27 PID 1880 wrote to memory of 1952 1880 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe 27 PID 1880 wrote to memory of 1952 1880 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe 27 PID 1880 wrote to memory of 1116 1880 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe 28 PID 1880 wrote to memory of 1116 1880 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe 28 PID 1880 wrote to memory of 1116 1880 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe 28 PID 1880 wrote to memory of 1116 1880 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe 28 PID 1952 wrote to memory of 2036 1952 ntldr.exe 29 PID 1952 wrote to memory of 2036 1952 ntldr.exe 29 PID 1952 wrote to memory of 2036 1952 ntldr.exe 29 PID 1952 wrote to memory of 2036 1952 ntldr.exe 29 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "0" ntldr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveAutoRun = "0" 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "0" 5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ntldr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveAutoRun = "0" ntldr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe"C:\Users\Admin\AppData\Local\Temp\5fba428837ecfa89ad1008946c8f48be79e3ce5916bfe75772cde5d067828a82.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1880 -
C:\Windows\SysWOW64\ntldr.exe"C:\Windows\system32\ntldr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1163⤵
- Loads dropped DLL
- Program crash
PID:2036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 1162⤵
- Program crash
PID:1116
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f