Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:03
Behavioral task
behavioral1
Sample
0270b007e6de08e544cc33308d6fe72f3ceeb653fd9b30025ee92fe057f9d0db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0270b007e6de08e544cc33308d6fe72f3ceeb653fd9b30025ee92fe057f9d0db.exe
Resource
win10v2004-20220901-en
General
-
Target
0270b007e6de08e544cc33308d6fe72f3ceeb653fd9b30025ee92fe057f9d0db.exe
-
Size
639KB
-
MD5
7dfe5c3f939f8afc1afb3df143f9c163
-
SHA1
6a4d73f8d3679bd5cdfc8ab83c3c79c62f52d09f
-
SHA256
0270b007e6de08e544cc33308d6fe72f3ceeb653fd9b30025ee92fe057f9d0db
-
SHA512
ed25c2616461f04975c5d989044ca564bf6b1abe7961e8ed8838ebb8610e2fa1572778f800fa1902a32535bb71ba8cdeacdf991ac66278fa74e8ffdf3d808250
-
SSDEEP
12288:b7147s9Tc5jXJrep2+RfrN1wMknfSvV8EDYSf4lBDDkiu:b7/AJXJreXRfringVZYLlBDDG
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1104 RS1.exe 1208 FTvrst.exe 1972 audidog.exe -
resource yara_rule behavioral1/memory/1296-55-0x0000000000400000-0x0000000000560000-memory.dmp upx behavioral1/memory/1296-61-0x0000000000400000-0x0000000000560000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1104 RS1.exe 1104 RS1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1104 RS1.exe 1104 RS1.exe 1104 RS1.exe 1104 RS1.exe 1104 RS1.exe 1104 RS1.exe 1104 RS1.exe 1104 RS1.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\WINDOWS\DNomb\FTvrst.exe RS1.exe File created C:\WINDOWS\DNomb\audidog.exe RS1.exe File created C:\Windows\DNomb\Mpec.mbt 0270b007e6de08e544cc33308d6fe72f3ceeb653fd9b30025ee92fe057f9d0db.exe File opened for modification C:\Windows\DNomb\Mpec.mbt 0270b007e6de08e544cc33308d6fe72f3ceeb653fd9b30025ee92fe057f9d0db.exe File created C:\WINDOWS\Djltp.txt RS1.exe File created C:\WINDOWS\DNomb\Mpec.mbt RS1.exe File created C:\WINDOWS\DNomb\spolsvt.exe RS1.exe File created C:\WINDOWS\DNomb\FTvrst.exe RS1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1296 0270b007e6de08e544cc33308d6fe72f3ceeb653fd9b30025ee92fe057f9d0db.exe 1296 0270b007e6de08e544cc33308d6fe72f3ceeb653fd9b30025ee92fe057f9d0db.exe 1104 RS1.exe 1104 RS1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1208 1104 RS1.exe 32 PID 1104 wrote to memory of 1208 1104 RS1.exe 32 PID 1104 wrote to memory of 1208 1104 RS1.exe 32 PID 1104 wrote to memory of 1208 1104 RS1.exe 32 PID 1104 wrote to memory of 1208 1104 RS1.exe 32 PID 1104 wrote to memory of 1208 1104 RS1.exe 32 PID 1104 wrote to memory of 1208 1104 RS1.exe 32 PID 1104 wrote to memory of 1972 1104 RS1.exe 33 PID 1104 wrote to memory of 1972 1104 RS1.exe 33 PID 1104 wrote to memory of 1972 1104 RS1.exe 33 PID 1104 wrote to memory of 1972 1104 RS1.exe 33 PID 1104 wrote to memory of 1972 1104 RS1.exe 33 PID 1104 wrote to memory of 1972 1104 RS1.exe 33 PID 1104 wrote to memory of 1972 1104 RS1.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0270b007e6de08e544cc33308d6fe72f3ceeb653fd9b30025ee92fe057f9d0db.exe"C:\Users\Admin\AppData\Local\Temp\0270b007e6de08e544cc33308d6fe72f3ceeb653fd9b30025ee92fe057f9d0db.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1296
-
C:\Users\Public\Documents\123\RS1.exe"C:\Users\Public\Documents\123\RS1.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\WINDOWS\DNomb\FTvrst.exeC:\WINDOWS\DNomb\FTvrst.exe2⤵
- Executes dropped EXE
PID:1208
-
-
C:\WINDOWS\DNomb\audidog.exeC:\WINDOWS\DNomb\audidog.exe2⤵
- Executes dropped EXE
PID:1972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14