Analysis
-
max time kernel
152s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 08:48
Behavioral task
behavioral1
Sample
b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe
Resource
win10v2004-20221111-en
General
-
Target
b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe
-
Size
147KB
-
MD5
f12c53bb735ef8b6a89fd03bcf738a6b
-
SHA1
90162122b5aff70843011dff91782b7a29f9b27e
-
SHA256
b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b
-
SHA512
60e05a423735cc798327369dcc745eb9b0d7eb538c3c88cec141c35c05f9a9b6cade75292cc132e4ad13469d49ce9fc0933b5e47d75be1cde48471a1d23698eb
-
SSDEEP
3072:a4f/MwMHjvsMbnrFnioT6eYu1CIFaB34ul+ezrddTSdFEJ3jWO8bCbOLHD7gbO6X:AZzWoT6RA41J7zrddtsbCbcHD7c1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 848 msa.exe -
resource yara_rule behavioral1/memory/1268-55-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1268-57-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1268-58-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/files/0x00080000000132f2-60.dat upx behavioral1/memory/848-63-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1268-64-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/848-65-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/files/0x00080000000132f2-66.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ROUA3O12PW = "C:\\Windows\\msa.exe" msa.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run msa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\msa.exe b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe File created C:\Windows\msa.exe b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\International msa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1268 b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe 848 msa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 848 msa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1268 wrote to memory of 848 1268 b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe 28 PID 1268 wrote to memory of 848 1268 b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe 28 PID 1268 wrote to memory of 848 1268 b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe 28 PID 1268 wrote to memory of 848 1268 b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe"C:\Users\Admin\AppData\Local\Temp\b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\msa.exeC:\Windows\msa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD55663450fcb955bb4df2dac2c5263c0bc
SHA1ed818e73df4583f8c5028e6679dd6489478bd427
SHA2564ef951572bed63fe5f135c6781ba8de03dc43b0f7b9690e6ad418f5cb139d61d
SHA5126068de3e449485df484dc9a6784562721a99c3588b7913f1591cc0fc863797fde4ec876208b27720de3d6a1a725ee9f6b9129923b346ea36961f49c047ea77e1
-
Filesize
147KB
MD5f12c53bb735ef8b6a89fd03bcf738a6b
SHA190162122b5aff70843011dff91782b7a29f9b27e
SHA256b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b
SHA51260e05a423735cc798327369dcc745eb9b0d7eb538c3c88cec141c35c05f9a9b6cade75292cc132e4ad13469d49ce9fc0933b5e47d75be1cde48471a1d23698eb
-
Filesize
147KB
MD5f12c53bb735ef8b6a89fd03bcf738a6b
SHA190162122b5aff70843011dff91782b7a29f9b27e
SHA256b76a1a52ad1776b0e00fad2a61dd6c8c2218792e07e0af1b418eb3f73172ad0b
SHA51260e05a423735cc798327369dcc745eb9b0d7eb538c3c88cec141c35c05f9a9b6cade75292cc132e4ad13469d49ce9fc0933b5e47d75be1cde48471a1d23698eb