Analysis
-
max time kernel
148s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 00:07
Static task
static1
Behavioral task
behavioral1
Sample
a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe
Resource
win10v2004-20221111-en
General
-
Target
a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe
-
Size
689KB
-
MD5
c3e915a89bb35fdaae815721d0efedfd
-
SHA1
348624bf6077a241641d5c6018049c7d0f9edcf3
-
SHA256
a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4
-
SHA512
8c8d9fc4e6059727ad8a3749cfb51f74d11f4727e2eaebc6a2f2343462f28ee07536e81ea693882b2a98604740085d95323def6d7006d56b5ed0aba96bbef69f
-
SSDEEP
12288:gzBSh/buFYgHFYh7P0gA/V0nlA45Uc98D6DGRtT8ZaTzthgA:gwxEYgHI78g+0nHC0aTzUA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 852 usnscv.exe -
Loads dropped DLL 2 IoCs
pid Process 1600 a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe 1600 a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run usnscv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\usnscv.exe = "\"C:\\Users\\Admin\\AppData\\Local\\usnscv.exe\" /background" usnscv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1600 set thread context of 852 1600 a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe 27 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1600 wrote to memory of 852 1600 a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe 27 PID 1600 wrote to memory of 852 1600 a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe 27 PID 1600 wrote to memory of 852 1600 a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe 27 PID 1600 wrote to memory of 852 1600 a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe 27 PID 1600 wrote to memory of 852 1600 a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe 27 PID 1600 wrote to memory of 852 1600 a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe"C:\Users\Admin\AppData\Local\Temp\a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\usnscv.exe"C:\Users\Admin\AppData\Local\usnscv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
689KB
MD5c3e915a89bb35fdaae815721d0efedfd
SHA1348624bf6077a241641d5c6018049c7d0f9edcf3
SHA256a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4
SHA5128c8d9fc4e6059727ad8a3749cfb51f74d11f4727e2eaebc6a2f2343462f28ee07536e81ea693882b2a98604740085d95323def6d7006d56b5ed0aba96bbef69f
-
Filesize
689KB
MD5c3e915a89bb35fdaae815721d0efedfd
SHA1348624bf6077a241641d5c6018049c7d0f9edcf3
SHA256a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4
SHA5128c8d9fc4e6059727ad8a3749cfb51f74d11f4727e2eaebc6a2f2343462f28ee07536e81ea693882b2a98604740085d95323def6d7006d56b5ed0aba96bbef69f
-
Filesize
689KB
MD5c3e915a89bb35fdaae815721d0efedfd
SHA1348624bf6077a241641d5c6018049c7d0f9edcf3
SHA256a6123788bae6b27293feeb3829e57008650f439952acebb95993dba31251a3b4
SHA5128c8d9fc4e6059727ad8a3749cfb51f74d11f4727e2eaebc6a2f2343462f28ee07536e81ea693882b2a98604740085d95323def6d7006d56b5ed0aba96bbef69f