Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 23:40
Static task
static1
Behavioral task
behavioral1
Sample
146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe
Resource
win10v2004-20221111-en
General
-
Target
146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe
-
Size
192KB
-
MD5
254f08572f194f153b9edc9e45a9cb02
-
SHA1
42adeec00d68b7510f6122bd39363a2dc90703bb
-
SHA256
146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d
-
SHA512
93b21a0669b3d015b82b9eaaff6d17a46ceb316e8632ef160fe05d335a69bec53ee44cf12745952bae9e8da6c6f5e84d61670d932931edab3e5aa9ea6f86b7e8
-
SSDEEP
3072:g58A2cm6J/1NfBjGecJOeYq40FXXWnEFsTsuZfI:gKBqR7cJOYdLFswuZg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
mtmfvl.exepid process 1672 mtmfvl.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2032 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2032 cmd.exe 2032 cmd.exe -
Modifies registry class 7 IoCs
Processes:
mtmfvl.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\gzqej mtmfvl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\gzqej mtmfvl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell mtmfvl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID mtmfvl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} mtmfvl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\gzqej\\command mtmfvl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node mtmfvl.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.execmd.exedescription pid process target process PID 1088 wrote to memory of 2032 1088 146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe cmd.exe PID 1088 wrote to memory of 2032 1088 146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe cmd.exe PID 1088 wrote to memory of 2032 1088 146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe cmd.exe PID 1088 wrote to memory of 2032 1088 146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe cmd.exe PID 2032 wrote to memory of 1672 2032 cmd.exe mtmfvl.exe PID 2032 wrote to memory of 1672 2032 cmd.exe mtmfvl.exe PID 2032 wrote to memory of 1672 2032 cmd.exe mtmfvl.exe PID 2032 wrote to memory of 1672 2032 cmd.exe mtmfvl.exe PID 2032 wrote to memory of 1480 2032 cmd.exe PING.EXE PID 2032 wrote to memory of 1480 2032 cmd.exe PING.EXE PID 2032 wrote to memory of 1480 2032 cmd.exe PING.EXE PID 2032 wrote to memory of 1480 2032 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe"C:\Users\Admin\AppData\Local\Temp\146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\aecjbev.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\mtmfvl.exe"C:\Users\Admin\AppData\Local\Temp\mtmfvl.exe"3⤵
- Executes dropped EXE
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1480
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD5e46cc624418881deae8dd991cf7554ac
SHA12c83bdcdf55462c5a57d331de17382c98fcd8bf3
SHA256704facdbfaec6e393e9f5d8b3e1e7d90294b7b1302f063b0b29126d2a08b9465
SHA5129adff8c3e9274ba44a8748d607d4f0ae8edb65dd0d3acacd16741ae8236d73a7bcfe7662ed12072f05a3c8da39418c432742586a6acc58f195e761cc7695c500
-
Filesize
188B
MD5000dcac74abc27d9c3217573bed1dad7
SHA12b3b9d0d637ccaf1df48a4ef9312561f82167388
SHA2565d39942b216b3a018151e483febbb902bc325ef4e323c01c995a0241df0fa6e2
SHA512fdcbdfb07d408ae3402313633821c9b2fa3218e39ab3559516f3651f43eb34d642302503014f303089783b376ee304ef65e133761a7ed9b9fd8c985975789277
-
Filesize
144KB
MD512c1a85723f2e97f94e84942a7f7563a
SHA12a19b33db0f04e70dc1f346a5d74fb46e8099414
SHA25620f05563ee39d0032de1ad5e28037b2bef4c8a256d008be4920446ea9f2bdaa3
SHA512718b3b89837c4c2f1ee5356f335e31d67500e6bea5f6b06bd530bf373e52fd75ca2da60863e0988e3edb36aa60a48680f6a4598195b881c3b4e7db084c6579de
-
Filesize
144KB
MD512c1a85723f2e97f94e84942a7f7563a
SHA12a19b33db0f04e70dc1f346a5d74fb46e8099414
SHA25620f05563ee39d0032de1ad5e28037b2bef4c8a256d008be4920446ea9f2bdaa3
SHA512718b3b89837c4c2f1ee5356f335e31d67500e6bea5f6b06bd530bf373e52fd75ca2da60863e0988e3edb36aa60a48680f6a4598195b881c3b4e7db084c6579de
-
Filesize
144KB
MD512c1a85723f2e97f94e84942a7f7563a
SHA12a19b33db0f04e70dc1f346a5d74fb46e8099414
SHA25620f05563ee39d0032de1ad5e28037b2bef4c8a256d008be4920446ea9f2bdaa3
SHA512718b3b89837c4c2f1ee5356f335e31d67500e6bea5f6b06bd530bf373e52fd75ca2da60863e0988e3edb36aa60a48680f6a4598195b881c3b4e7db084c6579de
-
Filesize
144KB
MD512c1a85723f2e97f94e84942a7f7563a
SHA12a19b33db0f04e70dc1f346a5d74fb46e8099414
SHA25620f05563ee39d0032de1ad5e28037b2bef4c8a256d008be4920446ea9f2bdaa3
SHA512718b3b89837c4c2f1ee5356f335e31d67500e6bea5f6b06bd530bf373e52fd75ca2da60863e0988e3edb36aa60a48680f6a4598195b881c3b4e7db084c6579de