Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe
Resource
win10v2004-20220812-en
General
-
Target
7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe
-
Size
44KB
-
MD5
d74077fa9f63cdebdfae36b6fb01fabf
-
SHA1
534a04bc2f7e98dd84885bcb56ac6ecfec180717
-
SHA256
7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a
-
SHA512
f43675db89d6ea2ff80cd51e70d61debffd030f8c1bb2a43d516842fda88365edb38051fa031d8f5855f09bfc6ae05a341359ef7ef84841cea4626de6adf5fbc
-
SSDEEP
768:75TBRYoWYexSbfbqC2z56vcKuJKqyLohvMGC:7v+vzSjbJ2F/bJKqOBGC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1488 regsvr32.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S}\StubPath = "C:\\Windows\\system32\\OLE32Init.exe" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S} 7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S}\StubPath = "C:\\Windows\\system32\\OLE32Init.exe" 7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\OLE32Init.exe 7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe File opened for modification C:\Windows\SysWOW64\OLE32Init.exe 7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\regsvr32.exe 7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe File created C:\Windows\regsvr32.exe 7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1488 regsvr32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1488 1376 7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe 28 PID 1376 wrote to memory of 1488 1376 7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe 28 PID 1376 wrote to memory of 1488 1376 7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe 28 PID 1376 wrote to memory of 1488 1376 7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe"C:\Users\Admin\AppData\Local\Temp\7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\regsvr32.exeC:\Windows\regsvr32.exe2⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Suspicious behavior: GetForegroundWindowSpam
PID:1488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD54f61b3708cf0b8324b923d36d2a4d369
SHA1f16332b1e2e8dbf3b4f8c25ed5e539322f18ad75
SHA2560c59ce192a97af4c9350ea1b7dcbb40ae55aa83537c82dec28e9d60d2691b704
SHA5124a3ea9c318dc7e76e86c3bdc567a2755e1476a23e8014876c0417b016d8142bc817daa126c9b612311aebfc9f644bc81e590b909d07c743e46cd763c147c7af1
-
Filesize
44KB
MD54f61b3708cf0b8324b923d36d2a4d369
SHA1f16332b1e2e8dbf3b4f8c25ed5e539322f18ad75
SHA2560c59ce192a97af4c9350ea1b7dcbb40ae55aa83537c82dec28e9d60d2691b704
SHA5124a3ea9c318dc7e76e86c3bdc567a2755e1476a23e8014876c0417b016d8142bc817daa126c9b612311aebfc9f644bc81e590b909d07c743e46cd763c147c7af1
-
Filesize
44KB
MD54f61b3708cf0b8324b923d36d2a4d369
SHA1f16332b1e2e8dbf3b4f8c25ed5e539322f18ad75
SHA2560c59ce192a97af4c9350ea1b7dcbb40ae55aa83537c82dec28e9d60d2691b704
SHA5124a3ea9c318dc7e76e86c3bdc567a2755e1476a23e8014876c0417b016d8142bc817daa126c9b612311aebfc9f644bc81e590b909d07c743e46cd763c147c7af1