Analysis
-
max time kernel
182s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 05:24
Static task
static1
Behavioral task
behavioral1
Sample
8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe
Resource
win10v2004-20220812-en
General
-
Target
8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe
-
Size
300KB
-
MD5
d6989a63a5b4cd8912bf79bc1d54a9bb
-
SHA1
29258abcbf79eb7b39d9539b485bcf03869a70e3
-
SHA256
8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3
-
SHA512
3995fd94f9176a1239be507347c63eab92d7f9a8b936d0a25a7adfc4ea59408f2ed4e2469fddd10fc0140530161506b6d6d0bfd834343a95581610fa723a16e5
-
SSDEEP
6144:97Lkj89csZUR7K94iF0iEaKyq+pwHreSNuQwQ9WigN:VLncsZcMxVqCmaSNP6
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe 588 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 952 wrote to memory of 588 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe 28 PID 952 wrote to memory of 588 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe 28 PID 952 wrote to memory of 588 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe 28 PID 952 wrote to memory of 588 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe 28 PID 952 wrote to memory of 588 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe 28 PID 952 wrote to memory of 588 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe 28 PID 952 wrote to memory of 588 952 8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe"C:\Users\Admin\AppData\Local\Temp\8acfb07170c3c3e85f1743ec31bc248639c0bcbf7c1f613d0d31f6a113b2cfc3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58f6d60416be64d383c1e29e4856aa996
SHA11c5aa445ef5918f56286414d2269eca00516ee16
SHA256e08f3cf58952a845ea5393f00e3e61683fa54e7979aafe47f7b863d45fab7716
SHA51278d70b6d62f9e1852172b6e6b8c21476d254b25eea351af8f8c4b4de36058cc1957085883ac937209d666203bba75cdac36abf78d3be61877dd2c3188296925b
-
Filesize
236KB
MD58f6d60416be64d383c1e29e4856aa996
SHA11c5aa445ef5918f56286414d2269eca00516ee16
SHA256e08f3cf58952a845ea5393f00e3e61683fa54e7979aafe47f7b863d45fab7716
SHA51278d70b6d62f9e1852172b6e6b8c21476d254b25eea351af8f8c4b4de36058cc1957085883ac937209d666203bba75cdac36abf78d3be61877dd2c3188296925b
-
Filesize
236KB
MD58f6d60416be64d383c1e29e4856aa996
SHA11c5aa445ef5918f56286414d2269eca00516ee16
SHA256e08f3cf58952a845ea5393f00e3e61683fa54e7979aafe47f7b863d45fab7716
SHA51278d70b6d62f9e1852172b6e6b8c21476d254b25eea351af8f8c4b4de36058cc1957085883ac937209d666203bba75cdac36abf78d3be61877dd2c3188296925b
-
Filesize
236KB
MD58f6d60416be64d383c1e29e4856aa996
SHA11c5aa445ef5918f56286414d2269eca00516ee16
SHA256e08f3cf58952a845ea5393f00e3e61683fa54e7979aafe47f7b863d45fab7716
SHA51278d70b6d62f9e1852172b6e6b8c21476d254b25eea351af8f8c4b4de36058cc1957085883ac937209d666203bba75cdac36abf78d3be61877dd2c3188296925b
-
Filesize
236KB
MD58f6d60416be64d383c1e29e4856aa996
SHA11c5aa445ef5918f56286414d2269eca00516ee16
SHA256e08f3cf58952a845ea5393f00e3e61683fa54e7979aafe47f7b863d45fab7716
SHA51278d70b6d62f9e1852172b6e6b8c21476d254b25eea351af8f8c4b4de36058cc1957085883ac937209d666203bba75cdac36abf78d3be61877dd2c3188296925b
-
Filesize
236KB
MD58f6d60416be64d383c1e29e4856aa996
SHA11c5aa445ef5918f56286414d2269eca00516ee16
SHA256e08f3cf58952a845ea5393f00e3e61683fa54e7979aafe47f7b863d45fab7716
SHA51278d70b6d62f9e1852172b6e6b8c21476d254b25eea351af8f8c4b4de36058cc1957085883ac937209d666203bba75cdac36abf78d3be61877dd2c3188296925b