Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 03:51
Static task
static1
Behavioral task
behavioral1
Sample
df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe
Resource
win10v2004-20221111-en
General
-
Target
df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe
-
Size
322KB
-
MD5
5cf41cd66c441e6f123e2a6ca31dfc94
-
SHA1
252f08afc054e9ea7772d3509d746a333c852577
-
SHA256
df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3
-
SHA512
35a7eece74c671ca42131f7af4d5717f53c0f0859cb5f55825128c9c16ba45ae2f6de65cf0b80eea24453a1e4e7d62abc4100bbaf8cfcbe553d37433ab2fb456
-
SSDEEP
6144:3KfcmBvK3G/IglKkaeJpM5/TuJ/TdnFMrdi4+OBA6OJieishfSyBmvwEN4Qk:3KEavQHYUeTO7k/TdFMrdi0A6OJie9fL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2008 svchost.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1260 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exepid process 1236 df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\windows\CurrentVersion\Run df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Program Files\\system\\svchost.exe\"" df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe -
Drops file in Program Files directory 3 IoCs
Processes:
df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exedescription ioc process File created C:\Program Files\system\svchost.bat df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe File created C:\Program Files\system\svchost.exe df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe File opened for modification C:\Program Files\system\svchost.exe df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exesvchost.exedescription pid process target process PID 1236 wrote to memory of 2008 1236 df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe svchost.exe PID 1236 wrote to memory of 2008 1236 df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe svchost.exe PID 1236 wrote to memory of 2008 1236 df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe svchost.exe PID 1236 wrote to memory of 2008 1236 df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe svchost.exe PID 2008 wrote to memory of 1000 2008 svchost.exe iexplore.exe PID 2008 wrote to memory of 1000 2008 svchost.exe iexplore.exe PID 2008 wrote to memory of 1000 2008 svchost.exe iexplore.exe PID 2008 wrote to memory of 1000 2008 svchost.exe iexplore.exe PID 1236 wrote to memory of 1260 1236 df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe cmd.exe PID 1236 wrote to memory of 1260 1236 df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe cmd.exe PID 1236 wrote to memory of 1260 1236 df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe cmd.exe PID 1236 wrote to memory of 1260 1236 df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe"C:\Users\Admin\AppData\Local\Temp\df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\system\svchost.exe"C:\Program Files\system\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\system\svchost.bat""2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\system\svchost.batFilesize
254B
MD599328ab5f8dfa3409be286b432e361dd
SHA17f317ce632d252562ea7d1366e5f72d9410f3495
SHA25615c1762901b6ba627b603d60051f9589fd51d393f6915009e57b105aee92b514
SHA5121eb4437554f567fabba96c45def87fa48ab6474b8322ac52f9333e36c8afd97d979cbde39ada543cf50ea4fc47a7e098ad919688e9d73961de3d361eb972b369
-
C:\Program Files\system\svchost.exeFilesize
322KB
MD55cf41cd66c441e6f123e2a6ca31dfc94
SHA1252f08afc054e9ea7772d3509d746a333c852577
SHA256df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3
SHA51235a7eece74c671ca42131f7af4d5717f53c0f0859cb5f55825128c9c16ba45ae2f6de65cf0b80eea24453a1e4e7d62abc4100bbaf8cfcbe553d37433ab2fb456
-
C:\Program Files\system\svchost.exeFilesize
322KB
MD55cf41cd66c441e6f123e2a6ca31dfc94
SHA1252f08afc054e9ea7772d3509d746a333c852577
SHA256df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3
SHA51235a7eece74c671ca42131f7af4d5717f53c0f0859cb5f55825128c9c16ba45ae2f6de65cf0b80eea24453a1e4e7d62abc4100bbaf8cfcbe553d37433ab2fb456
-
\Program Files\system\svchost.exeFilesize
322KB
MD55cf41cd66c441e6f123e2a6ca31dfc94
SHA1252f08afc054e9ea7772d3509d746a333c852577
SHA256df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3
SHA51235a7eece74c671ca42131f7af4d5717f53c0f0859cb5f55825128c9c16ba45ae2f6de65cf0b80eea24453a1e4e7d62abc4100bbaf8cfcbe553d37433ab2fb456
-
memory/1236-69-0x0000000000400000-0x00000000004C781C-memory.dmpFilesize
798KB
-
memory/1236-56-0x0000000000400000-0x00000000004C781C-memory.dmpFilesize
798KB
-
memory/1236-55-0x0000000000400000-0x00000000004C781C-memory.dmpFilesize
798KB
-
memory/1236-57-0x0000000075B11000-0x0000000075B13000-memory.dmpFilesize
8KB
-
memory/1236-58-0x0000000000400000-0x00000000004C781C-memory.dmpFilesize
798KB
-
memory/1236-54-0x0000000000400000-0x00000000004C781C-memory.dmpFilesize
798KB
-
memory/1260-68-0x0000000000000000-mapping.dmp
-
memory/2008-60-0x0000000000000000-mapping.dmp
-
memory/2008-67-0x0000000000400000-0x00000000004C781C-memory.dmpFilesize
798KB