Analysis
-
max time kernel
46s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 09:13
Behavioral task
behavioral1
Sample
1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe
Resource
win10v2004-20221111-en
General
-
Target
1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe
-
Size
38KB
-
MD5
15ceaeedbbca4783b749c953a7b68ad0
-
SHA1
e23c5e4b793ce66965b23c55da8b13c8605ac9b0
-
SHA256
1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db
-
SHA512
6bcb7e13bfe062cd378de21053a7c51024fd27b224821afb3970bc339b0eb3543eb440b4408f7753783081e12e857d0854234c9fc1d2010309e0d756cd6a85eb
-
SSDEEP
384:cjZnMFiEUO3upVp4kSaxr+M81ThIYLXMk3VFXFojx2gKWTYgHndf6j4wJwN:cGsOAp44+MUTXMklFXFcjVf9f6W
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\list\C:\Windows\SysWOW64\svchost.exe = "C:\\Windows\\SysWOW64\\svchost.exe:*:Generic Host Process" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list msiexec.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\list\C:\Windows\SysWOW64\msiexec.exe = "C:\\Windows\\SysWOW64\\msiexec.exe:*:Generic Host Process" msiexec.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\32646 = "c:\\progra~3\\dxhaeo.exe" msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 2036 dxhaeo.exe 1252 dxhaeo.exe -
resource yara_rule behavioral1/memory/1352-54-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1352-62-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000c0000000054a8-67.dat upx behavioral1/files/0x000c0000000054a8-68.dat upx behavioral1/files/0x000c0000000054a8-70.dat upx behavioral1/files/0x000c0000000054a8-74.dat upx behavioral1/files/0x000c0000000054a8-75.dat upx behavioral1/memory/2036-81-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000c0000000054a8-85.dat upx behavioral1/memory/2036-87-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 2024 msiexec.exe -
Loads dropped DLL 3 IoCs
pid Process 2024 msiexec.exe 2024 msiexec.exe 2036 dxhaeo.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum dxhaeo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 dxhaeo.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1352 set thread context of 1600 1352 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 27 PID 2036 set thread context of 1252 2036 dxhaeo.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\progra~3\dxhaeo.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1600 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 1252 dxhaeo.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1600 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 1600 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 1252 dxhaeo.exe 1252 dxhaeo.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1600 1352 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 27 PID 1352 wrote to memory of 1600 1352 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 27 PID 1352 wrote to memory of 1600 1352 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 27 PID 1352 wrote to memory of 1600 1352 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 27 PID 1352 wrote to memory of 1600 1352 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 27 PID 1352 wrote to memory of 1600 1352 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 27 PID 1352 wrote to memory of 1600 1352 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 27 PID 1352 wrote to memory of 1600 1352 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 27 PID 1600 wrote to memory of 2024 1600 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 28 PID 1600 wrote to memory of 2024 1600 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 28 PID 1600 wrote to memory of 2024 1600 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 28 PID 1600 wrote to memory of 2024 1600 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 28 PID 1600 wrote to memory of 2024 1600 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 28 PID 1600 wrote to memory of 2024 1600 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 28 PID 1600 wrote to memory of 2024 1600 1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe 28 PID 2024 wrote to memory of 2036 2024 msiexec.exe 29 PID 2024 wrote to memory of 2036 2024 msiexec.exe 29 PID 2024 wrote to memory of 2036 2024 msiexec.exe 29 PID 2024 wrote to memory of 2036 2024 msiexec.exe 29 PID 2036 wrote to memory of 1252 2036 dxhaeo.exe 30 PID 2036 wrote to memory of 1252 2036 dxhaeo.exe 30 PID 2036 wrote to memory of 1252 2036 dxhaeo.exe 30 PID 2036 wrote to memory of 1252 2036 dxhaeo.exe 30 PID 2036 wrote to memory of 1252 2036 dxhaeo.exe 30 PID 2036 wrote to memory of 1252 2036 dxhaeo.exe 30 PID 2036 wrote to memory of 1252 2036 dxhaeo.exe 30 PID 2036 wrote to memory of 1252 2036 dxhaeo.exe 30 PID 1252 wrote to memory of 1712 1252 dxhaeo.exe 31 PID 1252 wrote to memory of 1712 1252 dxhaeo.exe 31 PID 1252 wrote to memory of 1712 1252 dxhaeo.exe 31 PID 1252 wrote to memory of 1712 1252 dxhaeo.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe"C:\Users\Admin\AppData\Local\Temp\1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1352 -
\??\c:\users\admin\appdata\local\temp\1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe"c:\users\admin\appdata\local\temp\1515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db.exe"2⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Modifies firewall policy service
- Adds policy Run key to start application
- Deletes itself
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\progra~3\dxhaeo.exec:\progra~3\dxhaeo.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\progra~3\dxhaeo.exe"c:\progra~3\dxhaeo.exe"5⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe6⤵
- Modifies firewall policy service
PID:1712
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD515ceaeedbbca4783b749c953a7b68ad0
SHA1e23c5e4b793ce66965b23c55da8b13c8605ac9b0
SHA2561515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db
SHA5126bcb7e13bfe062cd378de21053a7c51024fd27b224821afb3970bc339b0eb3543eb440b4408f7753783081e12e857d0854234c9fc1d2010309e0d756cd6a85eb
-
Filesize
38KB
MD515ceaeedbbca4783b749c953a7b68ad0
SHA1e23c5e4b793ce66965b23c55da8b13c8605ac9b0
SHA2561515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db
SHA5126bcb7e13bfe062cd378de21053a7c51024fd27b224821afb3970bc339b0eb3543eb440b4408f7753783081e12e857d0854234c9fc1d2010309e0d756cd6a85eb
-
Filesize
38KB
MD515ceaeedbbca4783b749c953a7b68ad0
SHA1e23c5e4b793ce66965b23c55da8b13c8605ac9b0
SHA2561515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db
SHA5126bcb7e13bfe062cd378de21053a7c51024fd27b224821afb3970bc339b0eb3543eb440b4408f7753783081e12e857d0854234c9fc1d2010309e0d756cd6a85eb
-
Filesize
38KB
MD515ceaeedbbca4783b749c953a7b68ad0
SHA1e23c5e4b793ce66965b23c55da8b13c8605ac9b0
SHA2561515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db
SHA5126bcb7e13bfe062cd378de21053a7c51024fd27b224821afb3970bc339b0eb3543eb440b4408f7753783081e12e857d0854234c9fc1d2010309e0d756cd6a85eb
-
Filesize
38KB
MD515ceaeedbbca4783b749c953a7b68ad0
SHA1e23c5e4b793ce66965b23c55da8b13c8605ac9b0
SHA2561515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db
SHA5126bcb7e13bfe062cd378de21053a7c51024fd27b224821afb3970bc339b0eb3543eb440b4408f7753783081e12e857d0854234c9fc1d2010309e0d756cd6a85eb
-
Filesize
38KB
MD515ceaeedbbca4783b749c953a7b68ad0
SHA1e23c5e4b793ce66965b23c55da8b13c8605ac9b0
SHA2561515d18b5d018cce45466f042efc2a97b501e9bbdedc4ef36c92e36da2a200db
SHA5126bcb7e13bfe062cd378de21053a7c51024fd27b224821afb3970bc339b0eb3543eb440b4408f7753783081e12e857d0854234c9fc1d2010309e0d756cd6a85eb