Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:20
Static task
static1
Behavioral task
behavioral1
Sample
b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe
Resource
win10v2004-20221111-en
General
-
Target
b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe
-
Size
298KB
-
MD5
0c444fb93a621c9452a59bf4c6e35258
-
SHA1
ad6b37fb06d29ed9a37e51691babadc6ee694455
-
SHA256
b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94
-
SHA512
c70f7ceb4066e6c5ae1d3f81787a46e4e4aaaa2c7ef127b1bc4dcd138440c70ae4a9cd029466e15c7ce47e22c2e5d911f501d08cc9e7199efab8a6538998dbaa
-
SSDEEP
6144:vJaxOE5IKum/RGrouip5PPJsyyKGKGSfr09k/WJ4tqji7f+Y8k:v8D5IK1/RG7i7PP6yFGKGSfyk/WJSCif
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
etbe.exepid process 944 etbe.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1864 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exepid process 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
etbe.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Etbe = "C:\\Users\\Admin\\AppData\\Roaming\\Senupi\\etbe.exe" etbe.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run etbe.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exedescription pid process target process PID 1976 set thread context of 1864 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
etbe.exepid process 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe 944 etbe.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exeetbe.exedescription pid process target process PID 1976 wrote to memory of 944 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe etbe.exe PID 1976 wrote to memory of 944 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe etbe.exe PID 1976 wrote to memory of 944 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe etbe.exe PID 1976 wrote to memory of 944 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe etbe.exe PID 944 wrote to memory of 1128 944 etbe.exe taskhost.exe PID 944 wrote to memory of 1128 944 etbe.exe taskhost.exe PID 944 wrote to memory of 1128 944 etbe.exe taskhost.exe PID 944 wrote to memory of 1128 944 etbe.exe taskhost.exe PID 944 wrote to memory of 1128 944 etbe.exe taskhost.exe PID 944 wrote to memory of 1192 944 etbe.exe Dwm.exe PID 944 wrote to memory of 1192 944 etbe.exe Dwm.exe PID 944 wrote to memory of 1192 944 etbe.exe Dwm.exe PID 944 wrote to memory of 1192 944 etbe.exe Dwm.exe PID 944 wrote to memory of 1192 944 etbe.exe Dwm.exe PID 944 wrote to memory of 1268 944 etbe.exe Explorer.EXE PID 944 wrote to memory of 1268 944 etbe.exe Explorer.EXE PID 944 wrote to memory of 1268 944 etbe.exe Explorer.EXE PID 944 wrote to memory of 1268 944 etbe.exe Explorer.EXE PID 944 wrote to memory of 1268 944 etbe.exe Explorer.EXE PID 944 wrote to memory of 1976 944 etbe.exe b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe PID 944 wrote to memory of 1976 944 etbe.exe b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe PID 944 wrote to memory of 1976 944 etbe.exe b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe PID 944 wrote to memory of 1976 944 etbe.exe b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe PID 944 wrote to memory of 1976 944 etbe.exe b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe PID 1976 wrote to memory of 1864 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe cmd.exe PID 1976 wrote to memory of 1864 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe cmd.exe PID 1976 wrote to memory of 1864 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe cmd.exe PID 1976 wrote to memory of 1864 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe cmd.exe PID 1976 wrote to memory of 1864 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe cmd.exe PID 1976 wrote to memory of 1864 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe cmd.exe PID 1976 wrote to memory of 1864 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe cmd.exe PID 1976 wrote to memory of 1864 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe cmd.exe PID 1976 wrote to memory of 1864 1976 b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe"C:\Users\Admin\AppData\Local\Temp\b29189e7943103a6ae693ba7a53206a8fc66dc7959a41df758e25bd651bb1b94.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\Senupi\etbe.exe"C:\Users\Admin\AppData\Roaming\Senupi\etbe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\LDCD8F7.bat"3⤵
- Deletes itself
PID:1864
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD54669105c30d1cf9d0cd43c8617818aaa
SHA1350392d01e2e5cee0242663fea99f6b6a013b0e0
SHA2560676c0f08c04fbb5a4f4d091f4050772168be0960ad514966fe869b7a9e3fae1
SHA512ad6e282f4d05436148d0bde83a34a977fdfe305e6a6250657df387ff73284742774caae9e530c10bc1bd76e059d431e2a99a9dd80cf034838b733f1e931f321a
-
Filesize
298KB
MD5e824f22721e1041ee61a7d67378e0b33
SHA1367885a19c6f5f6e40bef1e0921a972d59b29a7c
SHA25613f29976e07f42d5db76a394ad3739a3c8b71bbd4e9dc3624079807ad22083d9
SHA512b1c4b1beab93f2b798c7cf4f12ce30bd8dfc83d77a2630052b375bb9198f7871b03e9e510637703621eeed603ce69464f494b8100cb5bbe97582007aa9a0af44
-
Filesize
298KB
MD5e824f22721e1041ee61a7d67378e0b33
SHA1367885a19c6f5f6e40bef1e0921a972d59b29a7c
SHA25613f29976e07f42d5db76a394ad3739a3c8b71bbd4e9dc3624079807ad22083d9
SHA512b1c4b1beab93f2b798c7cf4f12ce30bd8dfc83d77a2630052b375bb9198f7871b03e9e510637703621eeed603ce69464f494b8100cb5bbe97582007aa9a0af44
-
Filesize
298KB
MD5e824f22721e1041ee61a7d67378e0b33
SHA1367885a19c6f5f6e40bef1e0921a972d59b29a7c
SHA25613f29976e07f42d5db76a394ad3739a3c8b71bbd4e9dc3624079807ad22083d9
SHA512b1c4b1beab93f2b798c7cf4f12ce30bd8dfc83d77a2630052b375bb9198f7871b03e9e510637703621eeed603ce69464f494b8100cb5bbe97582007aa9a0af44
-
Filesize
298KB
MD5e824f22721e1041ee61a7d67378e0b33
SHA1367885a19c6f5f6e40bef1e0921a972d59b29a7c
SHA25613f29976e07f42d5db76a394ad3739a3c8b71bbd4e9dc3624079807ad22083d9
SHA512b1c4b1beab93f2b798c7cf4f12ce30bd8dfc83d77a2630052b375bb9198f7871b03e9e510637703621eeed603ce69464f494b8100cb5bbe97582007aa9a0af44