Analysis
-
max time kernel
4s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 23:34
Static task
static1
Behavioral task
behavioral1
Sample
ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe
Resource
win10v2004-20220812-en
General
-
Target
ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe
-
Size
144KB
-
MD5
32f41981aa0383a8a68fd985cffa227b
-
SHA1
9fae6e76326ff17cb522703f2da64d4cefbf9efd
-
SHA256
ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324
-
SHA512
f74c20ae72b4237f3fb7d4e8302af63a77cae17a50838226d0662e4cd15e3acca44365385312998a81c776d3b38b3818fc0525c4be33ca8b45fc5fdd00a5f567
-
SSDEEP
3072:9dCLKdYqFfGHAl5uN3+rS8de2z3KUeFbKi:cKd+Hm5ul++k3NeFO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
win24.exepid process 2028 win24.exe -
Loads dropped DLL 2 IoCs
Processes:
ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exepid process 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\runAPI28 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\runAPI97.exe\"" ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exedescription pid process target process PID 1352 set thread context of 2028 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe win24.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exedescription pid process target process PID 1352 wrote to memory of 2028 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe win24.exe PID 1352 wrote to memory of 2028 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe win24.exe PID 1352 wrote to memory of 2028 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe win24.exe PID 1352 wrote to memory of 2028 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe win24.exe PID 1352 wrote to memory of 2028 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe win24.exe PID 1352 wrote to memory of 2028 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe win24.exe PID 1352 wrote to memory of 2028 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe win24.exe PID 1352 wrote to memory of 2028 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe win24.exe PID 1352 wrote to memory of 2028 1352 ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe win24.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe"C:\Users\Admin\AppData\Local\Temp\ab3b1bc7711a4cf1b7805660325035843f551b04172b28270c6e0acb66a7b324.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\win24.exeC:\Users\Admin\AppData\Local\Temp\win24.exe2⤵
- Executes dropped EXE
PID:2028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea