Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe
Resource
win10v2004-20220901-en
General
-
Target
1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe
-
Size
4.6MB
-
MD5
280a113153bc9fbffc1cf1d90736ffa5
-
SHA1
0b12b4749cb11c7ee95cd380151ee3e54c29921a
-
SHA256
1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668
-
SHA512
543658ff737b4188b0f1be0a44eea66ffe025a919eb5bef163f9263f71eb06a7d669a1986f529e0f0885404717ad9fe22d79a9b644e39e382fdf4fa2edfdb4dc
-
SSDEEP
98304:0lvcl4pianY+1wpgJf6PD3Nmn7AJEgLYXMKUCCCNYzQEr0WO0Yk84rxjyAeg07o:wpw+dJiPD3Nm7AJEgLYX8CNYzQEr0WOo
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\NDXFKWBY\hosts 1c609d2d5KLSL.exe -
Executes dropped EXE 1 IoCs
pid Process 1968 1c609d2d5KLSL.exe -
Loads dropped DLL 2 IoCs
pid Process 1960 1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe 1960 1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1716 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1968 1c609d2d5KLSL.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 1c609d2d5KLSL.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1968 1960 1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe 28 PID 1960 wrote to memory of 1968 1960 1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe 28 PID 1960 wrote to memory of 1968 1960 1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe 28 PID 1960 wrote to memory of 1968 1960 1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe 28 PID 1968 wrote to memory of 1104 1968 1c609d2d5KLSL.exe 29 PID 1968 wrote to memory of 1104 1968 1c609d2d5KLSL.exe 29 PID 1968 wrote to memory of 1104 1968 1c609d2d5KLSL.exe 29 PID 1968 wrote to memory of 1104 1968 1c609d2d5KLSL.exe 29 PID 1104 wrote to memory of 1716 1104 cmd.exe 31 PID 1104 wrote to memory of 1716 1104 cmd.exe 31 PID 1104 wrote to memory of 1716 1104 cmd.exe 31 PID 1104 wrote to memory of 1716 1104 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe"C:\Users\Admin\AppData\Local\Temp\1c609d2d5d3b83555d05a15ac446567596a87e9267b8f3e627079ef2ec6e0668.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\1c609d2d5KLSL.exe-yue2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns3⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns4⤵
- Gathers network information
PID:1716
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD5573734bc793ad6b258c01d5efbf51990
SHA17d12dd2535ba2d3790c4f2e41184dbe0cfdf0488
SHA256a28025f4d4ce0f6c58cd6db6c437fdfe2adb95cc325b1c8048380de4a82ea45f
SHA512a263021dcab0a7d9b2d4e9d3151302c1215c37a80af625ecf7ae889d3896b2bd846d52d4fc39bf6bb270d1cbf73629d41e9ed61a5a6f936bc30d8db55f08bbc3
-
Filesize
4.6MB
MD5573734bc793ad6b258c01d5efbf51990
SHA17d12dd2535ba2d3790c4f2e41184dbe0cfdf0488
SHA256a28025f4d4ce0f6c58cd6db6c437fdfe2adb95cc325b1c8048380de4a82ea45f
SHA512a263021dcab0a7d9b2d4e9d3151302c1215c37a80af625ecf7ae889d3896b2bd846d52d4fc39bf6bb270d1cbf73629d41e9ed61a5a6f936bc30d8db55f08bbc3
-
Filesize
4.6MB
MD5573734bc793ad6b258c01d5efbf51990
SHA17d12dd2535ba2d3790c4f2e41184dbe0cfdf0488
SHA256a28025f4d4ce0f6c58cd6db6c437fdfe2adb95cc325b1c8048380de4a82ea45f
SHA512a263021dcab0a7d9b2d4e9d3151302c1215c37a80af625ecf7ae889d3896b2bd846d52d4fc39bf6bb270d1cbf73629d41e9ed61a5a6f936bc30d8db55f08bbc3