Analysis
-
max time kernel
244s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:07
Static task
static1
Behavioral task
behavioral1
Sample
bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe
Resource
win10v2004-20220901-en
General
-
Target
bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe
-
Size
132KB
-
MD5
7695de5d3abfce56ec14068cedbae6eb
-
SHA1
bad114ac6a063ddd49cfa81f9722fa35fc5a3ebb
-
SHA256
bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca
-
SHA512
c415ea3f6a2813c5df0c70213aeee7e29b8163a6212b9dd4afb5ae0d8318d96994932fffa054838d1154820a93455fd9a429a2c7200829de35e0de5ed0b4aff4
-
SSDEEP
3072:dUoyo+WUUyvbBbR379IdYwEjls/e5RHCoF+IMtEy8:Byo9gvr9ICzHC/IM/8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
setdebugnt.exepid process 1708 setdebugnt.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
setdebugnt.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run setdebugnt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft® ActiveX Debugger NT = "\"c:\\windows\\setdebugnt.exe\"" setdebugnt.exe -
Drops file in Windows directory 3 IoCs
Processes:
bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exesetdebugnt.exedescription ioc process File created \??\c:\windows\setdebugnt.exe bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe File opened for modification \??\c:\windows\setdebugnt.exe bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe File created C:\Windows\ieupdate.dat setdebugnt.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exesetdebugnt.exepid process 672 bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe 1708 setdebugnt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exedescription pid process target process PID 672 wrote to memory of 1708 672 bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe setdebugnt.exe PID 672 wrote to memory of 1708 672 bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe setdebugnt.exe PID 672 wrote to memory of 1708 672 bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe setdebugnt.exe PID 672 wrote to memory of 1708 672 bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe setdebugnt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe"C:\Users\Admin\AppData\Local\Temp\bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
\??\c:\windows\setdebugnt.exec:\windows\setdebugnt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD57695de5d3abfce56ec14068cedbae6eb
SHA1bad114ac6a063ddd49cfa81f9722fa35fc5a3ebb
SHA256bea0b76adb64d38547fcf1b782603d3ea553dc40a7bc530d9a86ffc0da112eca
SHA512c415ea3f6a2813c5df0c70213aeee7e29b8163a6212b9dd4afb5ae0d8318d96994932fffa054838d1154820a93455fd9a429a2c7200829de35e0de5ed0b4aff4