Analysis
-
max time kernel
192s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
Resource
win10v2004-20221111-en
General
-
Target
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
-
Size
275KB
-
MD5
43ffeada436ffce3ea901868413f7620
-
SHA1
50054ebc6f88f3ab45771f3f3fb05d13e3019628
-
SHA256
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e
-
SHA512
4bff350d3a683598d2282f7bb7e0832ba2f0db0441a9fcfc0a848f8871394e648314f6d89f2685646b791787d3fac524eb185ee7dd870c82e8f49cbacfc6d56f
-
SSDEEP
3072:86jI9XJy7r9C88KuCHBTTZJ/bxKOzCJhVnCMkoU97Qe5HZB5ksrHFZqTTeTTTfqy:fUZyo83nLbxKVJ3nCMkQe5HZAsHFZlxx
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Windows\MSWDM.EXE aspack_v212_v242 C:\WINDOWS\MSWDM.EXE aspack_v212_v242 C:\Windows\MSWDM.EXE aspack_v212_v242 C:\Windows\MSWDM.EXE aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE aspack_v212_v242 -
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXEA66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXEMSWDM.EXEpid process 3084 MSWDM.EXE 4776 MSWDM.EXE 672 A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE 2768 MSWDM.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exeMSWDM.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Program Files directory 39 IoCs
Processes:
MSWDM.EXEdescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe MSWDM.EXE File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe MSWDM.EXE File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe MSWDM.EXE File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe MSWDM.EXE File opened for modification C:\Program Files\7-Zip\7zG.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe MSWDM.EXE File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe MSWDM.EXE File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe MSWDM.EXE File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe MSWDM.EXE File opened for modification C:\Program Files\7-Zip\7z.exe MSWDM.EXE File opened for modification C:\Program Files\7-Zip\Uninstall.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE MSWDM.EXE File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe MSWDM.EXE File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe MSWDM.EXE File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe MSWDM.EXE File opened for modification C:\Program Files\Internet Explorer\iexplore.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe MSWDM.EXE File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe MSWDM.EXE File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe MSWDM.EXE File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe MSWDM.EXE File opened for modification C:\Program Files\7-Zip\7zFM.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe MSWDM.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE MSWDM.EXE -
Drops file in Windows directory 5 IoCs
Processes:
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exeMSWDM.EXEMSWDM.EXEdescription ioc process File created C:\WINDOWS\MSWDM.EXE a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe File opened for modification C:\Windows\dev4A19.tmp a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe File opened for modification C:\Windows\dev4A19.tmp MSWDM.EXE File opened for modification C:\Windows\die4BDE.tmp MSWDM.EXE File created C:\Windows\die4BDE.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MSWDM.EXEpid process 4776 MSWDM.EXE 4776 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exeMSWDM.EXEdescription pid process target process PID 5008 wrote to memory of 3084 5008 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 5008 wrote to memory of 3084 5008 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 5008 wrote to memory of 3084 5008 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 5008 wrote to memory of 4776 5008 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 5008 wrote to memory of 4776 5008 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 5008 wrote to memory of 4776 5008 a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe MSWDM.EXE PID 4776 wrote to memory of 672 4776 MSWDM.EXE A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE PID 4776 wrote to memory of 672 4776 MSWDM.EXE A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE PID 4776 wrote to memory of 672 4776 MSWDM.EXE A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE PID 4776 wrote to memory of 2768 4776 MSWDM.EXE MSWDM.EXE PID 4776 wrote to memory of 2768 4776 MSWDM.EXE MSWDM.EXE PID 4776 wrote to memory of 2768 4776 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe"C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:3084 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev4A19.tmp!C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE
- Executes dropped EXE
PID:672 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev4A19.tmp!C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE
Filesize275KB
MD54eccbbcd45f7265eddffc5ca0f7fe9bc
SHA158aa92c48b859df78e32b16f6ca6c5caf397849f
SHA2560e048674b10fff28b19cafea5a2195ea05d2a9ae35a28e8007718ba11643c733
SHA51212bce0049bd70cd077b08d1c6998fc86ee40efd7854e2fce742cd48c455d9ad9999c042e50d9691a199dd769bda904c5b72f46cf40ac378a5928c1cd9b4b5b5f
-
C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE
Filesize275KB
MD54eccbbcd45f7265eddffc5ca0f7fe9bc
SHA158aa92c48b859df78e32b16f6ca6c5caf397849f
SHA2560e048674b10fff28b19cafea5a2195ea05d2a9ae35a28e8007718ba11643c733
SHA51212bce0049bd70cd077b08d1c6998fc86ee40efd7854e2fce742cd48c455d9ad9999c042e50d9691a199dd769bda904c5b72f46cf40ac378a5928c1cd9b4b5b5f
-
C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
Filesize236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a
-
Filesize
39KB
MD5da5dbe204364f504e867df8fdde72131
SHA190ddd63ff3746f8367a90a12a58fe23a59aba5fa
SHA256a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea
SHA512334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685
-
Filesize
39KB
MD5da5dbe204364f504e867df8fdde72131
SHA190ddd63ff3746f8367a90a12a58fe23a59aba5fa
SHA256a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea
SHA512334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685
-
Filesize
39KB
MD5da5dbe204364f504e867df8fdde72131
SHA190ddd63ff3746f8367a90a12a58fe23a59aba5fa
SHA256a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea
SHA512334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685
-
Filesize
39KB
MD5da5dbe204364f504e867df8fdde72131
SHA190ddd63ff3746f8367a90a12a58fe23a59aba5fa
SHA256a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea
SHA512334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685
-
Filesize
236KB
MD5d095376682210d6ddcaeb636500eb0cb
SHA1f3ba099deee863c83f78e1814eb345b56560b11a
SHA25606b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71
SHA512546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a