Analysis
-
max time kernel
57s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe
Resource
win10v2004-20221111-en
General
-
Target
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe
-
Size
166KB
-
MD5
1225cf024f08fdf7741a0f8f9aa4e017
-
SHA1
18058c507f8b6a4574405b054b8e8f7b19052d7d
-
SHA256
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
-
SHA512
4f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
SSDEEP
3072:+/LXSE0vf7vHDBDRMxquipkcC3uewF2qH1NcZm7fJOWRwao9OgXcp:8ODRM8uqC35wFx/cZkhOIbOPu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1464 svchost.exe 1440 svchost.exe -
Deletes itself 1 IoCs
pid Process 1464 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1952 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe 1952 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mslivemsn = "C:\\Users\\Admin\\Librarys\\wgesdwx\\svchost.exe" c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1464 1952 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe 27 PID 1952 wrote to memory of 1464 1952 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe 27 PID 1952 wrote to memory of 1464 1952 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe 27 PID 1952 wrote to memory of 1464 1952 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe 27 PID 1464 wrote to memory of 1440 1464 svchost.exe 28 PID 1464 wrote to memory of 1440 1464 svchost.exe 28 PID 1464 wrote to memory of 1440 1464 svchost.exe 28 PID 1464 wrote to memory of 1440 1464 svchost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe"C:\Users\Admin\AppData\Local\Temp\c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\Librarys\wgesdwx\svchost.exeC:\Users\Admin\Librarys\wgesdwx\svchost.exe "C:\Users\Admin\AppData\Local\Temp\c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\Librarys\wgesdwx\svchost.exeC:\Users\Admin\Librarys\wgesdwx\svchost.exe --kk3⤵
- Executes dropped EXE
PID:1440
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4