Analysis
-
max time kernel
34s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 02:14
Static task
static1
Behavioral task
behavioral1
Sample
7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe
Resource
win10v2004-20220812-en
General
-
Target
7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe
-
Size
279KB
-
MD5
3b1e58f6f2662454b8ba66c87f6ed8f1
-
SHA1
4e5004b1068bd2b902bea286d8ee36f3fa41e5fe
-
SHA256
7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26
-
SHA512
5d2099cfb94bfedaf9003895ae51180b359dfec192337f63e594b17e5de58c1ecb7f5656f06159edbcd5632f360d8e57e7420abe87f8ffaa2ec39cd35ca367f6
-
SSDEEP
6144:+7Mwh8X4sojU04nDWgRAkPSTQhGQn8xID0DMF5YOGtnjjMcj:Jwh8IcR3PVhGLxe0Dzv8cj
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exedescription ioc process File opened for modification C:\Windows\SysWOW64\drivers\beep.sys 7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe -
Processes:
resource yara_rule \Windows\SysWOW64\NetNtEx.dll vmprotect -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1528 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exepid process 1628 7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe -
Drops file in System32 directory 1 IoCs
Processes:
7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exedescription ioc process File opened for modification C:\Windows\SysWOW64\NetNtEx.dll 7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exedescription pid process Token: SeIncBasePriorityPrivilege 1628 7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exedescription pid process target process PID 1628 wrote to memory of 1528 1628 7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe cmd.exe PID 1628 wrote to memory of 1528 1628 7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe cmd.exe PID 1628 wrote to memory of 1528 1628 7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe cmd.exe PID 1628 wrote to memory of 1528 1628 7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe"C:\Users\Admin\AppData\Local\Temp\7ec79c659b15214692e598fa6c4204c25b291b475ca8e564bfc10c256af71b26.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\7EC79C~1.EXE > nul2⤵
- Deletes itself
PID:1528
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5ecc39696a3c4239244f751eb2ededb4d
SHA1a651ffe7651c23ab31be20cba2b3b0985d1b283e
SHA256289050dfd1e086d7277f2dcf9d410ee54be2f1021c90bee2ba24b5e78948523a
SHA512b41dd9e95938220faf4231967634dd005842947eb0549c05820fd23a997591e8be3519429aae0be60db3914831034ab7094839ed29f3c03b79d2e42b2a2426e6