Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe
Resource
win10v2004-20221111-en
General
-
Target
ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe
-
Size
210KB
-
MD5
b5747ecf23afe514a9b1e1723d653863
-
SHA1
a1fb1c133f4734a3d2c3da4ec2e095aab76c451b
-
SHA256
ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81
-
SHA512
ba64bcbfcdd0b64f0bbb6d8385484dd81517a0d0f663f6e7bca87b7980c74ba4759cf4b75d2bb0c09d62fe6e4414ea38264b69816412c6dfab9f27122a35c59c
-
SSDEEP
6144:YhrSF7WWSioxgzkfguZU4blKJgdHch2K+yRfZV:WrkWWLoxgz3uSomgR47+eX
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe 944 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1768 wrote to memory of 944 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe 27 PID 1768 wrote to memory of 944 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe 27 PID 1768 wrote to memory of 944 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe 27 PID 1768 wrote to memory of 944 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe 27 PID 1768 wrote to memory of 944 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe 27 PID 1768 wrote to memory of 944 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe 27 PID 1768 wrote to memory of 944 1768 ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe"C:\Users\Admin\AppData\Local\Temp\ba3517dc8d3a1f75bb6b0a64805deabd254ca7656d5ce43792d8e4a706d7ae81.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD5a35d106a091e53ab441ec68acff9a10a
SHA122a3c1569c2cd3f74b2d4ed075a0ca09cdb2616a
SHA25662e25c334f4a72a3ebacc8b3acab9af1e64c95425cdd2694ba4291c8933340b6
SHA512b106e518765c1c92db9bc12b7dc8f1bfb653d71830f5c552381baec65f020a47dd45e8479c9071f8f6fc8c65fdbe213f6ad84fdf2ae8c755808342fe9740a8b6
-
Filesize
171KB
MD5a35d106a091e53ab441ec68acff9a10a
SHA122a3c1569c2cd3f74b2d4ed075a0ca09cdb2616a
SHA25662e25c334f4a72a3ebacc8b3acab9af1e64c95425cdd2694ba4291c8933340b6
SHA512b106e518765c1c92db9bc12b7dc8f1bfb653d71830f5c552381baec65f020a47dd45e8479c9071f8f6fc8c65fdbe213f6ad84fdf2ae8c755808342fe9740a8b6
-
Filesize
171KB
MD5a35d106a091e53ab441ec68acff9a10a
SHA122a3c1569c2cd3f74b2d4ed075a0ca09cdb2616a
SHA25662e25c334f4a72a3ebacc8b3acab9af1e64c95425cdd2694ba4291c8933340b6
SHA512b106e518765c1c92db9bc12b7dc8f1bfb653d71830f5c552381baec65f020a47dd45e8479c9071f8f6fc8c65fdbe213f6ad84fdf2ae8c755808342fe9740a8b6
-
Filesize
171KB
MD5a35d106a091e53ab441ec68acff9a10a
SHA122a3c1569c2cd3f74b2d4ed075a0ca09cdb2616a
SHA25662e25c334f4a72a3ebacc8b3acab9af1e64c95425cdd2694ba4291c8933340b6
SHA512b106e518765c1c92db9bc12b7dc8f1bfb653d71830f5c552381baec65f020a47dd45e8479c9071f8f6fc8c65fdbe213f6ad84fdf2ae8c755808342fe9740a8b6
-
Filesize
171KB
MD5a35d106a091e53ab441ec68acff9a10a
SHA122a3c1569c2cd3f74b2d4ed075a0ca09cdb2616a
SHA25662e25c334f4a72a3ebacc8b3acab9af1e64c95425cdd2694ba4291c8933340b6
SHA512b106e518765c1c92db9bc12b7dc8f1bfb653d71830f5c552381baec65f020a47dd45e8479c9071f8f6fc8c65fdbe213f6ad84fdf2ae8c755808342fe9740a8b6
-
Filesize
171KB
MD5a35d106a091e53ab441ec68acff9a10a
SHA122a3c1569c2cd3f74b2d4ed075a0ca09cdb2616a
SHA25662e25c334f4a72a3ebacc8b3acab9af1e64c95425cdd2694ba4291c8933340b6
SHA512b106e518765c1c92db9bc12b7dc8f1bfb653d71830f5c552381baec65f020a47dd45e8479c9071f8f6fc8c65fdbe213f6ad84fdf2ae8c755808342fe9740a8b6