Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 23:55
Static task
static1
Behavioral task
behavioral1
Sample
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe
Resource
win10v2004-20220812-en
General
-
Target
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe
-
Size
263KB
-
MD5
8719d74154a1f76b0d2ed6646a2685e8
-
SHA1
0a03e8a0a13668f5ccc337811d32b7c6ba3e64ed
-
SHA256
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392
-
SHA512
625e39b5ddcc8bee2ced26f35f5f5665f79969faa7bfe3b93060e401903ee2a89526d5c39583ec89b38ea705781123ac8e1a4f0599731f726aff4421ea460ee6
-
SSDEEP
6144:f/bILVvWfZc2yZXmCX9JPVtyjXP56OS+Is:f0xWfZc2C2C3NtyjDPj
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-5078860807246347675945\winmgr.exe = "C:\\Users\\Admin\\M-5078860807246347675945\\winmgr.exe:*:Enabled:Microsoft Windows Manager" 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe -
Executes dropped EXE 2 IoCs
Processes:
winmgr.exewinmgr.exepid process 1204 winmgr.exe 1256 winmgr.exe -
Loads dropped DLL 2 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exepid process 912 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 912 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Users\\Admin\\M-5078860807246347675945\\winmgr.exe" 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exewinmgr.exepid process 1504 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 1204 winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exewinmgr.exedescription pid process target process PID 1504 set thread context of 912 1504 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe PID 1204 set thread context of 1256 1204 winmgr.exe winmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exewinmgr.exepid process 1504 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 1204 winmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exewinmgr.exepid process 1504 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 1504 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 1204 winmgr.exe 1204 winmgr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exewinmgr.exedescription pid process target process PID 1504 wrote to memory of 912 1504 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe PID 1504 wrote to memory of 912 1504 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe PID 1504 wrote to memory of 912 1504 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe PID 1504 wrote to memory of 912 1504 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe PID 912 wrote to memory of 1204 912 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe winmgr.exe PID 912 wrote to memory of 1204 912 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe winmgr.exe PID 912 wrote to memory of 1204 912 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe winmgr.exe PID 912 wrote to memory of 1204 912 711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe winmgr.exe PID 1204 wrote to memory of 1256 1204 winmgr.exe winmgr.exe PID 1204 wrote to memory of 1256 1204 winmgr.exe winmgr.exe PID 1204 wrote to memory of 1256 1204 winmgr.exe winmgr.exe PID 1204 wrote to memory of 1256 1204 winmgr.exe winmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe"C:\Users\Admin\AppData\Local\Temp\711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe"C:\Users\Admin\AppData\Local\Temp\711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\M-5078860807246347675945\winmgr.exeC:\Users\Admin\M-5078860807246347675945\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\M-5078860807246347675945\winmgr.exeC:\Users\Admin\M-5078860807246347675945\winmgr.exe4⤵
- Executes dropped EXE
PID:1256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD58719d74154a1f76b0d2ed6646a2685e8
SHA10a03e8a0a13668f5ccc337811d32b7c6ba3e64ed
SHA256711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392
SHA512625e39b5ddcc8bee2ced26f35f5f5665f79969faa7bfe3b93060e401903ee2a89526d5c39583ec89b38ea705781123ac8e1a4f0599731f726aff4421ea460ee6
-
Filesize
263KB
MD58719d74154a1f76b0d2ed6646a2685e8
SHA10a03e8a0a13668f5ccc337811d32b7c6ba3e64ed
SHA256711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392
SHA512625e39b5ddcc8bee2ced26f35f5f5665f79969faa7bfe3b93060e401903ee2a89526d5c39583ec89b38ea705781123ac8e1a4f0599731f726aff4421ea460ee6
-
Filesize
263KB
MD58719d74154a1f76b0d2ed6646a2685e8
SHA10a03e8a0a13668f5ccc337811d32b7c6ba3e64ed
SHA256711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392
SHA512625e39b5ddcc8bee2ced26f35f5f5665f79969faa7bfe3b93060e401903ee2a89526d5c39583ec89b38ea705781123ac8e1a4f0599731f726aff4421ea460ee6
-
Filesize
263KB
MD58719d74154a1f76b0d2ed6646a2685e8
SHA10a03e8a0a13668f5ccc337811d32b7c6ba3e64ed
SHA256711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392
SHA512625e39b5ddcc8bee2ced26f35f5f5665f79969faa7bfe3b93060e401903ee2a89526d5c39583ec89b38ea705781123ac8e1a4f0599731f726aff4421ea460ee6
-
Filesize
263KB
MD58719d74154a1f76b0d2ed6646a2685e8
SHA10a03e8a0a13668f5ccc337811d32b7c6ba3e64ed
SHA256711d89a7d93f43663bbee0001a13935444470e9b8abf02a4d82e47b94c4ab392
SHA512625e39b5ddcc8bee2ced26f35f5f5665f79969faa7bfe3b93060e401903ee2a89526d5c39583ec89b38ea705781123ac8e1a4f0599731f726aff4421ea460ee6