Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:19
Static task
static1
Behavioral task
behavioral1
Sample
rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe
Resource
win10v2004-20220812-en
General
-
Target
rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe
-
Size
152KB
-
MD5
15626be4593582293a9aea6856d22f26
-
SHA1
bd7aa640faebc07d7ea7b5c6a55835cf37301d3b
-
SHA256
b926f0602ce4636bd7c6cc7ccd7433bed724f9642f148c5edbdbe396ff15f4c4
-
SHA512
1dd94cc323d409289d80ff1fbc480f990aa61a554a9e273f41e2298c5a5b441ac490aace2bb25e6e6b2145211646330d929846ed937cb35103514de4f4f8f6b8
-
SSDEEP
3072:hXUPz54knAIvoWPfEZcpug53Jk3xm+KPSBZ8b+Mf8k3dmnH3aytfROjVmd+zr3/j:tuGknAWoUf7cg5ZkBASB2df8ktmH3afL
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 840 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\gtntglna.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Identities\\gtntglna.exe\"" Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exedescription pid process target process PID 1812 set thread context of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exerechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exeExplorer.EXEpid process 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe 884 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe 884 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 884 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe Token: SeDebugPrivilege 1208 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exepid process 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exerechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exeExplorer.EXEdescription pid process target process PID 1812 wrote to memory of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe PID 1812 wrote to memory of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe PID 1812 wrote to memory of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe PID 1812 wrote to memory of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe PID 1812 wrote to memory of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe PID 1812 wrote to memory of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe PID 1812 wrote to memory of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe PID 1812 wrote to memory of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe PID 1812 wrote to memory of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe PID 1812 wrote to memory of 884 1812 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe PID 884 wrote to memory of 840 884 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe cmd.exe PID 884 wrote to memory of 840 884 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe cmd.exe PID 884 wrote to memory of 840 884 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe cmd.exe PID 884 wrote to memory of 840 884 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe cmd.exe PID 884 wrote to memory of 1208 884 rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe Explorer.EXE PID 1208 wrote to memory of 1108 1208 Explorer.EXE taskhost.exe PID 1208 wrote to memory of 1176 1208 Explorer.EXE Dwm.exe PID 1208 wrote to memory of 840 1208 Explorer.EXE cmd.exe PID 1208 wrote to memory of 840 1208 Explorer.EXE cmd.exe PID 1208 wrote to memory of 1424 1208 Explorer.EXE conhost.exe PID 1208 wrote to memory of 1424 1208 Explorer.EXE conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe"C:\Users\Admin\AppData\Local\Temp\rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exeC:\Users\Admin\AppData\Local\Temp\rechnung_november_2014_0003900028_2014_11_0029302375471_03_444_0039938289.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS4471~1.BAT"3⤵
- Deletes itself
PID:840
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1208
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "64815536018511615631601746720-725023822-1680241175-5817075811272712896425491106"1⤵PID:1424
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD589fc3adf7a46f495b5b4ec7ead7cf066
SHA109e5dbfa7dd9f30eb2c4bb5bdd09d56fe9dd0503
SHA256cb35a69bb57a64ab6271fdcdac1bc14e4027083ca36eb679996d249bdc3098d3
SHA512a3466a0328815f075d68b6ed6521e9b6a3de3d193703ba724b08e8a886bf90a44e91446cff416c3c6c5dd4dc8c4c6a9a67d44a79f6d2598aa436ffd912026599