Analysis
-
max time kernel
179s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe
Resource
win10v2004-20221111-en
General
-
Target
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe
-
Size
138KB
-
MD5
5bcaa9ea86e49f7da3615a5663797b6f
-
SHA1
b29a79a89d5aec764da4de93b26aec2d37e52083
-
SHA256
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34
-
SHA512
5c73abf6e892636dc13e86a882484919cd6701fabded4629045f2e92392d48852a62e9e5c3d8abf720d394d23c86713b6e5ad5290163b59aa71563b5a941db40
-
SSDEEP
3072:Mydp70Kw0Kgp+33pDmaO+0PDGSXU3HvGG:TdN0sgmnPUXvGG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
hkcmd.exepid process 1328 hkcmd.exe -
Deletes itself 1 IoCs
Processes:
hkcmd.exepid process 1328 hkcmd.exe -
Loads dropped DLL 2 IoCs
Processes:
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exepid process 944 d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe 944 d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exehkcmd.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\hkcmd = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\hkcmd.exe" d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\hkcmd = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\hkcmd.exe" hkcmd.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
hkcmd.exepid process 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe 1328 hkcmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exedescription pid process target process PID 944 wrote to memory of 1328 944 d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe hkcmd.exe PID 944 wrote to memory of 1328 944 d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe hkcmd.exe PID 944 wrote to memory of 1328 944 d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe hkcmd.exe PID 944 wrote to memory of 1328 944 d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe hkcmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe"C:\Users\Admin\AppData\Local\Temp\d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Roaming\Install\hkcmd.exe"C:\Users\Admin\AppData\Roaming\Install\hkcmd.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD55bcaa9ea86e49f7da3615a5663797b6f
SHA1b29a79a89d5aec764da4de93b26aec2d37e52083
SHA256d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34
SHA5125c73abf6e892636dc13e86a882484919cd6701fabded4629045f2e92392d48852a62e9e5c3d8abf720d394d23c86713b6e5ad5290163b59aa71563b5a941db40
-
Filesize
8B
MD56ba7844c26f51c677af26b1b4553d145
SHA148cb0fb380f40cb821240bbfec13c3155229cbd7
SHA25633993a6a11c2731bd37018a76af6690a1dca0bae623e1dd4674b052ca9a4f3cd
SHA5121e4f79413197b3da25859a74a2f8dfdbcdc5f730e661086bb70d6dc9f8f8b0958fddd6122d16f6d49681c2b37af0561cf1dac6860903f75c8f4690e06b300ff9
-
Filesize
138KB
MD55bcaa9ea86e49f7da3615a5663797b6f
SHA1b29a79a89d5aec764da4de93b26aec2d37e52083
SHA256d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34
SHA5125c73abf6e892636dc13e86a882484919cd6701fabded4629045f2e92392d48852a62e9e5c3d8abf720d394d23c86713b6e5ad5290163b59aa71563b5a941db40
-
Filesize
138KB
MD55bcaa9ea86e49f7da3615a5663797b6f
SHA1b29a79a89d5aec764da4de93b26aec2d37e52083
SHA256d4339e45d722343773958d7f893c26126b29c0efef48be926be982f1e5918b34
SHA5125c73abf6e892636dc13e86a882484919cd6701fabded4629045f2e92392d48852a62e9e5c3d8abf720d394d23c86713b6e5ad5290163b59aa71563b5a941db40