Analysis
-
max time kernel
185s -
max time network
203s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 21:39
Static task
static1
Behavioral task
behavioral1
Sample
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe
Resource
win10v2004-20221111-en
General
-
Target
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe
-
Size
262KB
-
MD5
dd3d297db386103f447b5eed0e62b408
-
SHA1
5685ac2294da0581d3e33037b151709d61a98f4b
-
SHA256
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43
-
SHA512
3feb95985416ca6918e1d7d30bfe848e2019847cbf1ad3db4b194c229747a076945b81c605e368dac10451e0176603320f7d8d835d47fbbc3bc37e4118e4ceaf
-
SSDEEP
6144:A/bILVvWfZc2yUyfi8j4VtyjXP56OS+I1:A0xWfZc2PJZtyjDPa
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-5078860807246347675945\winmgr.exe = "C:\\Users\\Admin\\M-5078860807246347675945\\winmgr.exe:*:Enabled:Microsoft Windows Manager" 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe -
Executes dropped EXE 2 IoCs
Processes:
winmgr.exewinmgr.exepid process 520 winmgr.exe 268 winmgr.exe -
Loads dropped DLL 2 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exepid process 760 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 760 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Users\\Admin\\M-5078860807246347675945\\winmgr.exe" 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exewinmgr.exepid process 964 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 520 winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exewinmgr.exedescription pid process target process PID 964 set thread context of 760 964 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe PID 520 set thread context of 268 520 winmgr.exe winmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exewinmgr.exepid process 964 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 520 winmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exewinmgr.exepid process 964 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 964 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 520 winmgr.exe 520 winmgr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exewinmgr.exedescription pid process target process PID 964 wrote to memory of 760 964 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe PID 964 wrote to memory of 760 964 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe PID 964 wrote to memory of 760 964 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe PID 964 wrote to memory of 760 964 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe PID 760 wrote to memory of 520 760 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe winmgr.exe PID 760 wrote to memory of 520 760 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe winmgr.exe PID 760 wrote to memory of 520 760 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe winmgr.exe PID 760 wrote to memory of 520 760 9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe winmgr.exe PID 520 wrote to memory of 268 520 winmgr.exe winmgr.exe PID 520 wrote to memory of 268 520 winmgr.exe winmgr.exe PID 520 wrote to memory of 268 520 winmgr.exe winmgr.exe PID 520 wrote to memory of 268 520 winmgr.exe winmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe"C:\Users\Admin\AppData\Local\Temp\9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe"C:\Users\Admin\AppData\Local\Temp\9d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\M-5078860807246347675945\winmgr.exeC:\Users\Admin\M-5078860807246347675945\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\M-5078860807246347675945\winmgr.exeC:\Users\Admin\M-5078860807246347675945\winmgr.exe4⤵
- Executes dropped EXE
PID:268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5dd3d297db386103f447b5eed0e62b408
SHA15685ac2294da0581d3e33037b151709d61a98f4b
SHA2569d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43
SHA5123feb95985416ca6918e1d7d30bfe848e2019847cbf1ad3db4b194c229747a076945b81c605e368dac10451e0176603320f7d8d835d47fbbc3bc37e4118e4ceaf
-
Filesize
262KB
MD5dd3d297db386103f447b5eed0e62b408
SHA15685ac2294da0581d3e33037b151709d61a98f4b
SHA2569d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43
SHA5123feb95985416ca6918e1d7d30bfe848e2019847cbf1ad3db4b194c229747a076945b81c605e368dac10451e0176603320f7d8d835d47fbbc3bc37e4118e4ceaf
-
Filesize
262KB
MD5dd3d297db386103f447b5eed0e62b408
SHA15685ac2294da0581d3e33037b151709d61a98f4b
SHA2569d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43
SHA5123feb95985416ca6918e1d7d30bfe848e2019847cbf1ad3db4b194c229747a076945b81c605e368dac10451e0176603320f7d8d835d47fbbc3bc37e4118e4ceaf
-
Filesize
262KB
MD5dd3d297db386103f447b5eed0e62b408
SHA15685ac2294da0581d3e33037b151709d61a98f4b
SHA2569d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43
SHA5123feb95985416ca6918e1d7d30bfe848e2019847cbf1ad3db4b194c229747a076945b81c605e368dac10451e0176603320f7d8d835d47fbbc3bc37e4118e4ceaf
-
Filesize
262KB
MD5dd3d297db386103f447b5eed0e62b408
SHA15685ac2294da0581d3e33037b151709d61a98f4b
SHA2569d085fe596c5223d3250f38f9bbb0585f8555f281cc07f2ce883aeb806d6cf43
SHA5123feb95985416ca6918e1d7d30bfe848e2019847cbf1ad3db4b194c229747a076945b81c605e368dac10451e0176603320f7d8d835d47fbbc3bc37e4118e4ceaf