Analysis
-
max time kernel
187s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:30
Static task
static1
Behavioral task
behavioral1
Sample
fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe
Resource
win10v2004-20220812-en
General
-
Target
fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe
-
Size
554KB
-
MD5
991bba815629d035d6e4af3d5b4f6f18
-
SHA1
b180d589824b926781c7475db571044cfe847aed
-
SHA256
fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a
-
SHA512
64fef690d1ddbcb7b8821f5fbb7df9aa42bbd2400aea3252560d757738338b608f4f5e9f6b6cddf3affdd33e13a6784ddd80cc83a7dc9c66f56689e1389d361d
-
SSDEEP
6144:fmCH17bxxhXJCuJrrRlOQiQOv8VNHqqSbw5o7pHpzmG3kBz6zO6hSWWVH72YUlKz:/B1xhXJxtxC5E5oPmGUgzO6xWVbVal8
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
Processes:
fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-507886724647675945\winmgr.exe = "C:\\Users\\Admin\\M-507886724647675945\\winmgr.exe:*:Enabled:Microsoft Windows Manager" fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe -
Executes dropped EXE 2 IoCs
Processes:
winmgr.exewinmgr.exepid process 1400 winmgr.exe 1736 winmgr.exe -
Loads dropped DLL 2 IoCs
Processes:
fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exepid process 1584 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe 1584 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Users\\Admin\\M-507886724647675945\\winmgr.exe" fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exewinmgr.exedescription pid process target process PID 1516 set thread context of 1584 1516 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe PID 1400 set thread context of 1736 1400 winmgr.exe winmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exewinmgr.exepid process 1516 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe 1516 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe 1400 winmgr.exe 1400 winmgr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exefce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exewinmgr.exedescription pid process target process PID 1516 wrote to memory of 1584 1516 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe PID 1516 wrote to memory of 1584 1516 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe PID 1516 wrote to memory of 1584 1516 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe PID 1516 wrote to memory of 1584 1516 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe PID 1584 wrote to memory of 1400 1584 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe winmgr.exe PID 1584 wrote to memory of 1400 1584 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe winmgr.exe PID 1584 wrote to memory of 1400 1584 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe winmgr.exe PID 1584 wrote to memory of 1400 1584 fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe winmgr.exe PID 1400 wrote to memory of 1736 1400 winmgr.exe winmgr.exe PID 1400 wrote to memory of 1736 1400 winmgr.exe winmgr.exe PID 1400 wrote to memory of 1736 1400 winmgr.exe winmgr.exe PID 1400 wrote to memory of 1736 1400 winmgr.exe winmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe"C:\Users\Admin\AppData\Local\Temp\fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe"C:\Users\Admin\AppData\Local\Temp\fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\M-507886724647675945\winmgr.exeC:\Users\Admin\M-507886724647675945\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\M-507886724647675945\winmgr.exeC:\Users\Admin\M-507886724647675945\winmgr.exe4⤵
- Executes dropped EXE
PID:1736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD5991bba815629d035d6e4af3d5b4f6f18
SHA1b180d589824b926781c7475db571044cfe847aed
SHA256fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a
SHA51264fef690d1ddbcb7b8821f5fbb7df9aa42bbd2400aea3252560d757738338b608f4f5e9f6b6cddf3affdd33e13a6784ddd80cc83a7dc9c66f56689e1389d361d
-
Filesize
554KB
MD5991bba815629d035d6e4af3d5b4f6f18
SHA1b180d589824b926781c7475db571044cfe847aed
SHA256fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a
SHA51264fef690d1ddbcb7b8821f5fbb7df9aa42bbd2400aea3252560d757738338b608f4f5e9f6b6cddf3affdd33e13a6784ddd80cc83a7dc9c66f56689e1389d361d
-
Filesize
554KB
MD5991bba815629d035d6e4af3d5b4f6f18
SHA1b180d589824b926781c7475db571044cfe847aed
SHA256fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a
SHA51264fef690d1ddbcb7b8821f5fbb7df9aa42bbd2400aea3252560d757738338b608f4f5e9f6b6cddf3affdd33e13a6784ddd80cc83a7dc9c66f56689e1389d361d
-
Filesize
554KB
MD5991bba815629d035d6e4af3d5b4f6f18
SHA1b180d589824b926781c7475db571044cfe847aed
SHA256fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a
SHA51264fef690d1ddbcb7b8821f5fbb7df9aa42bbd2400aea3252560d757738338b608f4f5e9f6b6cddf3affdd33e13a6784ddd80cc83a7dc9c66f56689e1389d361d
-
Filesize
554KB
MD5991bba815629d035d6e4af3d5b4f6f18
SHA1b180d589824b926781c7475db571044cfe847aed
SHA256fce155cc805d8de9a0b557a2954d17db42989f32194e8064c5142f84f110a87a
SHA51264fef690d1ddbcb7b8821f5fbb7df9aa42bbd2400aea3252560d757738338b608f4f5e9f6b6cddf3affdd33e13a6784ddd80cc83a7dc9c66f56689e1389d361d