Analysis
-
max time kernel
146s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe
Resource
win10v2004-20220901-en
General
-
Target
8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe
-
Size
208KB
-
MD5
3330403836e0825b4fedc773518764cd
-
SHA1
2a778cc113b3def2423489eb6591133e9b7e7f4a
-
SHA256
8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715
-
SHA512
d51190884e8a1e6ce9337e4407de8ab07f4a0335b965871be89e6bee0a42ee901573efd3c42b3cea4093b7c4494f6e42d368c791ee1eb81b51e934d9a59fdb90
-
SSDEEP
3072:j2JPB2a+SQCu8gS530XNYkGHsu0yRVEA1Sby+4KC6HTJYn57W3jiJo30cCe7znzo:jSP/+SwSyYkGhV11SxFda57a/Jjrk
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1116 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe 27 PID 1464 wrote to memory of 1116 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe 27 PID 1464 wrote to memory of 1116 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe 27 PID 1464 wrote to memory of 1116 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe 27 PID 1464 wrote to memory of 1116 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe 27 PID 1464 wrote to memory of 1116 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe 27 PID 1464 wrote to memory of 1116 1464 8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe"C:\Users\Admin\AppData\Local\Temp\8cf8a69bd64972152a3e443c3c1c33d6ea3df7934640a8249a2f0f7ea0419715.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5077e6486675e51b229b09a992e3424b2
SHA1baa931018013e0a8048f1bc6b940649c4611e7ef
SHA2569c9d88027f08eb535d4680051cb0841499056098b2ea506482e5e2f0a3c13b41
SHA5120be9a1c4bd626d0c937b2657184be9f8131c959b02ea7a02f9d7ae80d4c54fa019677678edc130364899aab407073a756f6900c37fc0c0acd1c246a1549e7ed5
-
Filesize
173KB
MD5077e6486675e51b229b09a992e3424b2
SHA1baa931018013e0a8048f1bc6b940649c4611e7ef
SHA2569c9d88027f08eb535d4680051cb0841499056098b2ea506482e5e2f0a3c13b41
SHA5120be9a1c4bd626d0c937b2657184be9f8131c959b02ea7a02f9d7ae80d4c54fa019677678edc130364899aab407073a756f6900c37fc0c0acd1c246a1549e7ed5
-
Filesize
173KB
MD5077e6486675e51b229b09a992e3424b2
SHA1baa931018013e0a8048f1bc6b940649c4611e7ef
SHA2569c9d88027f08eb535d4680051cb0841499056098b2ea506482e5e2f0a3c13b41
SHA5120be9a1c4bd626d0c937b2657184be9f8131c959b02ea7a02f9d7ae80d4c54fa019677678edc130364899aab407073a756f6900c37fc0c0acd1c246a1549e7ed5
-
Filesize
173KB
MD5077e6486675e51b229b09a992e3424b2
SHA1baa931018013e0a8048f1bc6b940649c4611e7ef
SHA2569c9d88027f08eb535d4680051cb0841499056098b2ea506482e5e2f0a3c13b41
SHA5120be9a1c4bd626d0c937b2657184be9f8131c959b02ea7a02f9d7ae80d4c54fa019677678edc130364899aab407073a756f6900c37fc0c0acd1c246a1549e7ed5
-
Filesize
173KB
MD5077e6486675e51b229b09a992e3424b2
SHA1baa931018013e0a8048f1bc6b940649c4611e7ef
SHA2569c9d88027f08eb535d4680051cb0841499056098b2ea506482e5e2f0a3c13b41
SHA5120be9a1c4bd626d0c937b2657184be9f8131c959b02ea7a02f9d7ae80d4c54fa019677678edc130364899aab407073a756f6900c37fc0c0acd1c246a1549e7ed5
-
Filesize
173KB
MD5077e6486675e51b229b09a992e3424b2
SHA1baa931018013e0a8048f1bc6b940649c4611e7ef
SHA2569c9d88027f08eb535d4680051cb0841499056098b2ea506482e5e2f0a3c13b41
SHA5120be9a1c4bd626d0c937b2657184be9f8131c959b02ea7a02f9d7ae80d4c54fa019677678edc130364899aab407073a756f6900c37fc0c0acd1c246a1549e7ed5