Analysis
-
max time kernel
155s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 09:02
Static task
static1
Behavioral task
behavioral1
Sample
573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe
Resource
win10v2004-20220812-en
General
-
Target
573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe
-
Size
52KB
-
MD5
2a72c920d64a878511682e43c87e5270
-
SHA1
cbe0118c82ff55d37575d1d0070a1d9cec07c229
-
SHA256
573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585
-
SHA512
24ab2e61fae46dcd384f87458ffef3cc0ae7a558a1e27cfd98d48fa6c322b3de504d6ac0f2a12a7e57e2cc51a74996d24a8688860d3e0385f0c75cac8f13d6ec
-
SSDEEP
768:iMJDmX0vMs3i6EJnXPUWPYf4c/AS3qERQpTn3b:vIX23i6ExX1bOEpv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WinSeven.exepid process 436 WinSeven.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
REG.exeREG.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinShell = "C:\\WinShell\\WinSeven.exe" REG.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinShell = "C:\\WinShell\\WinSeven.exe" REG.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
WinSeven.exedescription ioc process File opened (read-only) \??\I: WinSeven.exe File opened (read-only) \??\O: WinSeven.exe File opened (read-only) \??\R: WinSeven.exe File opened (read-only) \??\Z: WinSeven.exe File opened (read-only) \??\E: WinSeven.exe File opened (read-only) \??\S: WinSeven.exe File opened (read-only) \??\T: WinSeven.exe File opened (read-only) \??\Q: WinSeven.exe File opened (read-only) \??\B: WinSeven.exe File opened (read-only) \??\G: WinSeven.exe File opened (read-only) \??\K: WinSeven.exe File opened (read-only) \??\M: WinSeven.exe File opened (read-only) \??\P: WinSeven.exe File opened (read-only) \??\V: WinSeven.exe File opened (read-only) \??\X: WinSeven.exe File opened (read-only) \??\A: WinSeven.exe File opened (read-only) \??\Y: WinSeven.exe File opened (read-only) \??\H: WinSeven.exe File opened (read-only) \??\J: WinSeven.exe File opened (read-only) \??\L: WinSeven.exe File opened (read-only) \??\N: WinSeven.exe File opened (read-only) \??\U: WinSeven.exe File opened (read-only) \??\W: WinSeven.exe File opened (read-only) \??\F: WinSeven.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WinSeven.exepid process 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe 436 WinSeven.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exeWinSeven.exedescription pid process target process PID 3292 wrote to memory of 2700 3292 573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe REG.exe PID 3292 wrote to memory of 2700 3292 573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe REG.exe PID 3292 wrote to memory of 2700 3292 573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe REG.exe PID 3292 wrote to memory of 436 3292 573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe WinSeven.exe PID 3292 wrote to memory of 436 3292 573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe WinSeven.exe PID 3292 wrote to memory of 436 3292 573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe WinSeven.exe PID 436 wrote to memory of 5064 436 WinSeven.exe REG.exe PID 436 wrote to memory of 5064 436 WinSeven.exe REG.exe PID 436 wrote to memory of 5064 436 WinSeven.exe REG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe"C:\Users\Admin\AppData\Local\Temp\573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinShell /t REG_SZ /d C:\WinShell\WinSeven.exe /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2700
-
-
C:\WinShell\WinSeven.exeC:\WinShell\WinSeven.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinShell /t REG_SZ /d C:\WinShell\WinSeven.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:5064
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD52a72c920d64a878511682e43c87e5270
SHA1cbe0118c82ff55d37575d1d0070a1d9cec07c229
SHA256573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585
SHA51224ab2e61fae46dcd384f87458ffef3cc0ae7a558a1e27cfd98d48fa6c322b3de504d6ac0f2a12a7e57e2cc51a74996d24a8688860d3e0385f0c75cac8f13d6ec
-
Filesize
52KB
MD52a72c920d64a878511682e43c87e5270
SHA1cbe0118c82ff55d37575d1d0070a1d9cec07c229
SHA256573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585
SHA51224ab2e61fae46dcd384f87458ffef3cc0ae7a558a1e27cfd98d48fa6c322b3de504d6ac0f2a12a7e57e2cc51a74996d24a8688860d3e0385f0c75cac8f13d6ec
-
Filesize
52KB
MD52a72c920d64a878511682e43c87e5270
SHA1cbe0118c82ff55d37575d1d0070a1d9cec07c229
SHA256573104c3c9b6716d1dd1f9fc87f205aaf26d8a679cd8e9b360dc84dceb17c585
SHA51224ab2e61fae46dcd384f87458ffef3cc0ae7a558a1e27cfd98d48fa6c322b3de504d6ac0f2a12a7e57e2cc51a74996d24a8688860d3e0385f0c75cac8f13d6ec