Analysis
-
max time kernel
187s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:47
Static task
static1
Behavioral task
behavioral1
Sample
85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe
Resource
win10v2004-20221111-en
General
-
Target
85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe
-
Size
309KB
-
MD5
357dce7de8eaf0697a38d7c08d4283ea
-
SHA1
71e813b63cb582dee2e4729d99ca032d43367d4d
-
SHA256
85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566
-
SHA512
f3b2e191daa046e544ca07462448512ae581e6cd6e82d3cab87dcf1dfea21673fdf1817753a7b1b9e26c99f28bc80e45f73fa53fb33221fc8faf73886d98fdd2
-
SSDEEP
6144:DS6vKkb0M+TPVk22Dy5iuXqXP8cEfpb2hmLctK:DFZYMUNk22GvaXP0pb0mLct
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
SoftwareProtection.exe~A5B2.tmppid process 900 SoftwareProtection.exe 764 ~A5B2.tmp -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 996 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exeSoftwareProtection.exepid process 2008 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe 900 SoftwareProtection.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\forfgMgr = "C:\\Users\\Admin\\AppData\\Roaming\\SoftwareProtection.exe" 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
SoftwareProtection.exeExplorer.EXEpid process 900 SoftwareProtection.exe 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1216 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Explorer.EXEdescription pid process Token: SeShutdownPrivilege 1216 Explorer.EXE -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exeSoftwareProtection.exepid process 2008 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe 900 SoftwareProtection.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exeSoftwareProtection.exe~A5B2.tmpcmd.exedescription pid process target process PID 2008 wrote to memory of 900 2008 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe SoftwareProtection.exe PID 2008 wrote to memory of 900 2008 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe SoftwareProtection.exe PID 2008 wrote to memory of 900 2008 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe SoftwareProtection.exe PID 2008 wrote to memory of 900 2008 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe SoftwareProtection.exe PID 2008 wrote to memory of 996 2008 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe cmd.exe PID 2008 wrote to memory of 996 2008 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe cmd.exe PID 2008 wrote to memory of 996 2008 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe cmd.exe PID 2008 wrote to memory of 996 2008 85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe cmd.exe PID 900 wrote to memory of 764 900 SoftwareProtection.exe ~A5B2.tmp PID 900 wrote to memory of 764 900 SoftwareProtection.exe ~A5B2.tmp PID 900 wrote to memory of 764 900 SoftwareProtection.exe ~A5B2.tmp PID 900 wrote to memory of 764 900 SoftwareProtection.exe ~A5B2.tmp PID 764 wrote to memory of 1216 764 ~A5B2.tmp Explorer.EXE PID 996 wrote to memory of 396 996 cmd.exe attrib.exe PID 996 wrote to memory of 396 996 cmd.exe attrib.exe PID 996 wrote to memory of 396 996 cmd.exe attrib.exe PID 996 wrote to memory of 396 996 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe"C:\Users\Admin\AppData\Local\Temp\85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Roaming\SoftwareProtection.exe"C:\Users\Admin\AppData\Roaming"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\~A5B2.tmp1216 137634 9004⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.exe/C 7119994.cmd3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "85e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566.exe"4⤵
- Views/modifies file attributes
PID:396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285B
MD5a26d09aa744fcdc07492d35414b079a6
SHA15a9bd58765a92d67361e15f37d4eaa12e7cb8824
SHA2567322705d5b889926efa89093ed9e46087f15ca912bb9c625fc419f18b135aa20
SHA51241fc67247124ef91252aa34b32bd9af5616fe66747e7fa6153a4db1d8712c950084e75db970fb9789a23baf2e46929378f47eebd272a7568a3e42b4c6b8741b0
-
Filesize
7KB
MD53be01b4aaf3e553a1b58076f79550d5f
SHA14460dee325cc58a097f5d01a79764979dd07deff
SHA256076eca550cbbb0851012dc0d3cd76c418436d4e57369b0724cef61c1ec83c4b3
SHA512e392028e6a5a4553175f1941d6c6ff3962e0ee95331c8408efed0a5612e222c30e86d9dc7eff01dd8db10eb3c6abcd31ead8ff6982e33c91b72a6278e93a7e55
-
Filesize
309KB
MD5357dce7de8eaf0697a38d7c08d4283ea
SHA171e813b63cb582dee2e4729d99ca032d43367d4d
SHA25685e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566
SHA512f3b2e191daa046e544ca07462448512ae581e6cd6e82d3cab87dcf1dfea21673fdf1817753a7b1b9e26c99f28bc80e45f73fa53fb33221fc8faf73886d98fdd2
-
Filesize
7KB
MD53be01b4aaf3e553a1b58076f79550d5f
SHA14460dee325cc58a097f5d01a79764979dd07deff
SHA256076eca550cbbb0851012dc0d3cd76c418436d4e57369b0724cef61c1ec83c4b3
SHA512e392028e6a5a4553175f1941d6c6ff3962e0ee95331c8408efed0a5612e222c30e86d9dc7eff01dd8db10eb3c6abcd31ead8ff6982e33c91b72a6278e93a7e55
-
Filesize
309KB
MD5357dce7de8eaf0697a38d7c08d4283ea
SHA171e813b63cb582dee2e4729d99ca032d43367d4d
SHA25685e820a74f8c40882f50def7ac61bf97ce3cf12272cf8965208db7fe0c33d566
SHA512f3b2e191daa046e544ca07462448512ae581e6cd6e82d3cab87dcf1dfea21673fdf1817753a7b1b9e26c99f28bc80e45f73fa53fb33221fc8faf73886d98fdd2