Analysis
-
max time kernel
156s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
Resource
win10v2004-20221111-en
General
-
Target
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
-
Size
275KB
-
MD5
43ffeada436ffce3ea901868413f7620
-
SHA1
50054ebc6f88f3ab45771f3f3fb05d13e3019628
-
SHA256
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e
-
SHA512
4bff350d3a683598d2282f7bb7e0832ba2f0db0441a9fcfc0a848f8871394e648314f6d89f2685646b791787d3fac524eb185ee7dd870c82e8f49cbacfc6d56f
-
SSDEEP
3072:86jI9XJy7r9C88KuCHBTTZJ/bxKOzCJhVnCMkoU97Qe5HZB5ksrHFZqTTeTTTfqy:fUZyo83nLbxKVJ3nCMkQe5HZAsHFZlxx
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Windows\MSWDM.EXE aspack_v212_v242 C:\WINDOWS\MSWDM.EXE aspack_v212_v242 C:\Windows\MSWDM.EXE aspack_v212_v242 C:\Windows\MSWDM.EXE aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE aspack_v212_v242 -
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXEA66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXEMSWDM.EXEpid process 1256 MSWDM.EXE 1752 MSWDM.EXE 1996 A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE 1324 MSWDM.EXE -
Loads dropped DLL 4 IoCs
Processes:
MSWDM.EXEA66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXEpid process 1752 MSWDM.EXE 1996 A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE 1996 A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE 1996 A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exeMSWDM.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe -
Drops file in Windows directory 3 IoCs
Processes:
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exeMSWDM.EXEdescription ioc process File created C:\WINDOWS\MSWDM.EXE a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe File opened for modification C:\Windows\dev32D4.tmp a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe File opened for modification C:\Windows\dev32D4.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MSWDM.EXEpid process 1752 MSWDM.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exeMSWDM.EXEdescription pid process target process PID 1964 wrote to memory of 1256 1964 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 1964 wrote to memory of 1256 1964 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 1964 wrote to memory of 1256 1964 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 1964 wrote to memory of 1256 1964 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 1964 wrote to memory of 1752 1964 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 1964 wrote to memory of 1752 1964 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 1964 wrote to memory of 1752 1964 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 1964 wrote to memory of 1752 1964 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 1752 wrote to memory of 1996 1752 MSWDM.EXE A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE PID 1752 wrote to memory of 1996 1752 MSWDM.EXE A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE PID 1752 wrote to memory of 1996 1752 MSWDM.EXE A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE PID 1752 wrote to memory of 1996 1752 MSWDM.EXE A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE PID 1752 wrote to memory of 1996 1752 MSWDM.EXE A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE PID 1752 wrote to memory of 1996 1752 MSWDM.EXE A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE PID 1752 wrote to memory of 1996 1752 MSWDM.EXE A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE PID 1752 wrote to memory of 1324 1752 MSWDM.EXE MSWDM.EXE PID 1752 wrote to memory of 1324 1752 MSWDM.EXE MSWDM.EXE PID 1752 wrote to memory of 1324 1752 MSWDM.EXE MSWDM.EXE PID 1752 wrote to memory of 1324 1752 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe"C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1256 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev32D4.tmp!C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE
- Executes dropped EXE
- Loads dropped DLL
PID:1996 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev32D4.tmp!C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE
Filesize275KB
MD5fd2f225a50053b1cc087be28ba862eaf
SHA1040e39ca6ec08a252c665b76a921da05edab0f07
SHA2564252a32501c0890c33726c961d4ad5b60bcfb1fa11f0c77510c5b0fa8f4c1776
SHA512a1cbd58fd1aac5ae755a0074a756ef81d48f399759a48373c35774777892388b7b47583840253ed5c43e3e1a39aebf42c74ff83bb4042202f569f34015dbf25c
-
C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
Filesize
39KB
MD5da5dbe204364f504e867df8fdde72131
SHA190ddd63ff3746f8367a90a12a58fe23a59aba5fa
SHA256a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea
SHA512334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685
-
Filesize
39KB
MD5da5dbe204364f504e867df8fdde72131
SHA190ddd63ff3746f8367a90a12a58fe23a59aba5fa
SHA256a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea
SHA512334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685
-
Filesize
39KB
MD5da5dbe204364f504e867df8fdde72131
SHA190ddd63ff3746f8367a90a12a58fe23a59aba5fa
SHA256a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea
SHA512334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685
-
Filesize
39KB
MD5da5dbe204364f504e867df8fdde72131
SHA190ddd63ff3746f8367a90a12a58fe23a59aba5fa
SHA256a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea
SHA512334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685
-
Filesize
236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a