Analysis
-
max time kernel
180s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 23:40
Static task
static1
Behavioral task
behavioral1
Sample
146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe
Resource
win10v2004-20221111-en
General
-
Target
146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe
-
Size
192KB
-
MD5
254f08572f194f153b9edc9e45a9cb02
-
SHA1
42adeec00d68b7510f6122bd39363a2dc90703bb
-
SHA256
146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d
-
SHA512
93b21a0669b3d015b82b9eaaff6d17a46ceb316e8632ef160fe05d335a69bec53ee44cf12745952bae9e8da6c6f5e84d61670d932931edab3e5aa9ea6f86b7e8
-
SSDEEP
3072:g58A2cm6J/1NfBjGecJOeYq40FXXWnEFsTsuZfI:gKBqR7cJOYdLFswuZg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
hxompw.exepid process 2160 hxompw.exe -
Modifies registry class 7 IoCs
Processes:
hxompw.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\uhxom hxompw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell hxompw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID hxompw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} hxompw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\\shell\\uhxom\\command hxompw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node hxompw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\uhxom hxompw.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.execmd.exedescription pid process target process PID 1704 wrote to memory of 3960 1704 146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe cmd.exe PID 1704 wrote to memory of 3960 1704 146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe cmd.exe PID 1704 wrote to memory of 3960 1704 146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe cmd.exe PID 3960 wrote to memory of 2160 3960 cmd.exe hxompw.exe PID 3960 wrote to memory of 2160 3960 cmd.exe hxompw.exe PID 3960 wrote to memory of 2160 3960 cmd.exe hxompw.exe PID 3960 wrote to memory of 1872 3960 cmd.exe PING.EXE PID 3960 wrote to memory of 1872 3960 cmd.exe PING.EXE PID 3960 wrote to memory of 1872 3960 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe"C:\Users\Admin\AppData\Local\Temp\146cf4871e59eda2f3760af9b31a18021039e1505064fb89412a16cec412236d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\kycxabr.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\hxompw.exe"C:\Users\Admin\AppData\Local\Temp\hxompw.exe"3⤵
- Executes dropped EXE
- Modifies registry class
PID:2160 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD57257fce7bc00f12f68b7271eb6e1ef3c
SHA15d0b411df4d6c55b21343353b06809ab07376778
SHA25661f7727b56280dee99ae466aa23843b8e499d4cdc0924f7979b90242b13a2b7b
SHA51269e29365e60ab61e58fceac608e04747f5536b3077a8a44444d7403d6e4264a667f06bc08c18be249994efdb7830cf4b21ef918ce111529592fc295832b68e7f
-
Filesize
144KB
MD57257fce7bc00f12f68b7271eb6e1ef3c
SHA15d0b411df4d6c55b21343353b06809ab07376778
SHA25661f7727b56280dee99ae466aa23843b8e499d4cdc0924f7979b90242b13a2b7b
SHA51269e29365e60ab61e58fceac608e04747f5536b3077a8a44444d7403d6e4264a667f06bc08c18be249994efdb7830cf4b21ef918ce111529592fc295832b68e7f
-
Filesize
188B
MD50affaa0996a26b84098e8555f995f1f2
SHA13d142044dae6e6dad15ca6968fad0db20b577f33
SHA2562aad20d4b339ef611688c6e66dab07de1f5617ccf278eea49d479878091fe269
SHA51215c3bbd3868d79f275ff5542592bb37ea1c1ccb159145a98c5e6325d4e264e99558d0d55b4deaf1c1390ca402fa374977a67e2b45c67730e171bcd07c405d00b
-
Filesize
124B
MD5c5c10e49fca5ca792268f05f255a134d
SHA12399cea0c72b304f57c467c6424930fa2b82d2b8
SHA2563aae85fbff6a59aefac3640c77cf8c7c44430d4ec7e4deb69e3eac3ee08dda2e
SHA51202cbc53a721dbfa563386db70daa7c1f2fcfffaeb3d7ee5c5906fa58efd2bfc8a70fd5c3d96252fe24204ed402851251a258cd46731760265a8b9cba34f6b54f