Analysis
-
max time kernel
41s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe
Resource
win10v2004-20220901-en
General
-
Target
6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe
-
Size
828KB
-
MD5
0619218e04a3d1a17a7e6cebaecc4140
-
SHA1
a2c1a343fb2fdc11bac980cd95d8bf439a2d07d6
-
SHA256
6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7
-
SHA512
d0299801b63aba687abd460af9da0f6415c5ecc694bd7da57a3f5b667b5a74111adc8148a7b7c7e83cfd41a50c23e251280206946ad01d9bdf66927692981e15
-
SSDEEP
12288:fdHJ8EEBe4r1bUgkV0esV/Uf8kCw4DywAsKypnNv6twG3TB0UYnL8of:3hMtUb0q8E4DywAWNCmGjBY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1972 %36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 %36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 %36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1780 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1992 6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1992 6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe 1992 6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe 1972 %36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe 1972 %36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1972 1992 6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe 26 PID 1992 wrote to memory of 1972 1992 6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe 26 PID 1992 wrote to memory of 1972 1992 6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe 26 PID 1992 wrote to memory of 1972 1992 6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe 26 PID 1972 wrote to memory of 1096 1972 %36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe 28 PID 1972 wrote to memory of 1096 1972 %36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe 28 PID 1972 wrote to memory of 1096 1972 %36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe 28 PID 1972 wrote to memory of 1096 1972 %36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe 28 PID 1096 wrote to memory of 1780 1096 cmd.exe 30 PID 1096 wrote to memory of 1780 1096 cmd.exe 30 PID 1096 wrote to memory of 1780 1096 cmd.exe 30 PID 1096 wrote to memory of 1780 1096 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe"C:\Users\Admin\AppData\Local\Temp\6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\%36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exeC:\%36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3&del C:\%36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
PID:1780
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\%36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe
Filesize828KB
MD50619218e04a3d1a17a7e6cebaecc4140
SHA1a2c1a343fb2fdc11bac980cd95d8bf439a2d07d6
SHA2566218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7
SHA512d0299801b63aba687abd460af9da0f6415c5ecc694bd7da57a3f5b667b5a74111adc8148a7b7c7e83cfd41a50c23e251280206946ad01d9bdf66927692981e15
-
C:\%36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe
Filesize828KB
MD50619218e04a3d1a17a7e6cebaecc4140
SHA1a2c1a343fb2fdc11bac980cd95d8bf439a2d07d6
SHA2566218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7
SHA512d0299801b63aba687abd460af9da0f6415c5ecc694bd7da57a3f5b667b5a74111adc8148a7b7c7e83cfd41a50c23e251280206946ad01d9bdf66927692981e15