Analysis
-
max time kernel
41s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
a2ee84969e3b0452fc4b442fe460db7d52074837ca89082b6d1b5e80b7a207fc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2ee84969e3b0452fc4b442fe460db7d52074837ca89082b6d1b5e80b7a207fc.exe
Resource
win10v2004-20221111-en
General
-
Target
a2ee84969e3b0452fc4b442fe460db7d52074837ca89082b6d1b5e80b7a207fc.exe
-
Size
212KB
-
MD5
c519c452d5ac5246a2f96de849fef4f8
-
SHA1
c097de1b687185e428c12cc63acbce2077332c3f
-
SHA256
a2ee84969e3b0452fc4b442fe460db7d52074837ca89082b6d1b5e80b7a207fc
-
SHA512
d1f9dbed573e37e473478320218c65de05759a96e10b0735072861eeea434f5e111cf46b50d275f67ff949430925e19dfa84a54411f45f73cdb6eb1713f92f67
-
SSDEEP
3072:uqPL1/7w6ZAs+VBKSniXS4Rz+Clmn2tXauPxshFUf8W9tr:7QVAnYWpauPxsRYt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1116 3b615026.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 3b615026.exe -
resource yara_rule behavioral1/files/0x000a000000012738-55.dat upx behavioral1/files/0x000a000000012738-57.dat upx behavioral1/files/0x00080000000133e5-58.dat upx behavioral1/memory/1116-62-0x00000000001B0000-0x00000000001D5000-memory.dmp upx behavioral1/memory/1116-64-0x0000000077000000-0x0000000077060000-memory.dmp upx behavioral1/files/0x000800000001332a-68.dat upx behavioral1/files/0x000800000001332a-69.dat upx behavioral1/memory/1920-72-0x0000000074E30000-0x0000000074E55000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1116 3b615026.exe 1920 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 3b615026.exe File opened for modification C:\Windows\SysWOW64\178004CC.tmp 3b615026.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1116 3b615026.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1116 1792 a2ee84969e3b0452fc4b442fe460db7d52074837ca89082b6d1b5e80b7a207fc.exe 28 PID 1792 wrote to memory of 1116 1792 a2ee84969e3b0452fc4b442fe460db7d52074837ca89082b6d1b5e80b7a207fc.exe 28 PID 1792 wrote to memory of 1116 1792 a2ee84969e3b0452fc4b442fe460db7d52074837ca89082b6d1b5e80b7a207fc.exe 28 PID 1792 wrote to memory of 1116 1792 a2ee84969e3b0452fc4b442fe460db7d52074837ca89082b6d1b5e80b7a207fc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2ee84969e3b0452fc4b442fe460db7d52074837ca89082b6d1b5e80b7a207fc.exe"C:\Users\Admin\AppData\Local\Temp\a2ee84969e3b0452fc4b442fe460db7d52074837ca89082b6d1b5e80b7a207fc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\3b615026.exeC:\3b615026.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5e6f0ea380a2bb37ea1a20983ae18df3a
SHA19fa36c33a5017235715426a590bad849f146ce6e
SHA256bbdfd233ea67ef81fdddfa3730fdb16958e83702706eafe515ac5d148b97e9fe
SHA5120da13733d4078c6b2f0cedd14b8d94401d800e040d24c74f718078c421c78a3f1d6c6c5a1edc8cf08d39c812000778fc489af5d75f3fa7c67f389a807e2f19c7
-
Filesize
134KB
MD5e6f0ea380a2bb37ea1a20983ae18df3a
SHA19fa36c33a5017235715426a590bad849f146ce6e
SHA256bbdfd233ea67ef81fdddfa3730fdb16958e83702706eafe515ac5d148b97e9fe
SHA5120da13733d4078c6b2f0cedd14b8d94401d800e040d24c74f718078c421c78a3f1d6c6c5a1edc8cf08d39c812000778fc489af5d75f3fa7c67f389a807e2f19c7
-
Filesize
720B
MD56490fc614f572b4546610b92834f4ee3
SHA141dc7698b712d81dffa22aa5fdbfd91057ea5cf1
SHA2561a8959910f0a5a9cd0b3d22aa077fa4a5eceb3c79d677cfd41fd2ee0ffa9955e
SHA5126c36f6c4bb9a9b835b0b9e6955325b73b9979b8c67b1582285d98aff0ae6927b29a8e67be722bf273b25e6261c67afea0d11b6a7dcf3eb4884ca51c592338075
-
Filesize
134KB
MD59cb478e6b56f7c556cf3d718361c65a3
SHA18905afb6f4fbce50072b7a54144a2f7fac55caeb
SHA2564738bc0f4c18c2ad7ab4826718919e2329a4ae3ca8749904f9814f738f5ebade
SHA5127bf4570f91d692037f28767e969202d603f6787d72c6c13639999a028b74567668de605ab22d03acfc43bd2a25a6fe57cb2c9765498e7be51e2eb0f32c69204b
-
Filesize
134KB
MD59cb478e6b56f7c556cf3d718361c65a3
SHA18905afb6f4fbce50072b7a54144a2f7fac55caeb
SHA2564738bc0f4c18c2ad7ab4826718919e2329a4ae3ca8749904f9814f738f5ebade
SHA5127bf4570f91d692037f28767e969202d603f6787d72c6c13639999a028b74567668de605ab22d03acfc43bd2a25a6fe57cb2c9765498e7be51e2eb0f32c69204b
-
Filesize
134KB
MD59cb478e6b56f7c556cf3d718361c65a3
SHA18905afb6f4fbce50072b7a54144a2f7fac55caeb
SHA2564738bc0f4c18c2ad7ab4826718919e2329a4ae3ca8749904f9814f738f5ebade
SHA5127bf4570f91d692037f28767e969202d603f6787d72c6c13639999a028b74567668de605ab22d03acfc43bd2a25a6fe57cb2c9765498e7be51e2eb0f32c69204b