Analysis
-
max time kernel
91s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 07:21
Static task
static1
Behavioral task
behavioral1
Sample
e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e.exe
Resource
win10v2004-20220901-en
General
-
Target
e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e.exe
-
Size
431KB
-
MD5
d0555892523bc2949373e803ed1f1703
-
SHA1
e1e5d5e0440359315dc9e69ee3e3df2dde6af30f
-
SHA256
e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e
-
SHA512
ec071314b4a902fd31060d19d010d19f7f0099788988e069230f758f55d8ccc7c55aca819492d7504c7a12adafe697d25170e16a27c3a96360dc8bf9d5c8568a
-
SSDEEP
12288:xCDebz10dvYQZ45LhjSJhEyOo1hUF3V8C+guFythEeZArV:9W/m5LQJIo4rgguq7qrV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3496 SHOCKW~1.EXE 5116 SHOCKW~1.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3496 set thread context of 5116 3496 SHOCKW~1.EXE 82 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3496 SHOCKW~1.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4376 wrote to memory of 3496 4376 e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e.exe 81 PID 4376 wrote to memory of 3496 4376 e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e.exe 81 PID 4376 wrote to memory of 3496 4376 e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e.exe 81 PID 3496 wrote to memory of 5116 3496 SHOCKW~1.EXE 82 PID 3496 wrote to memory of 5116 3496 SHOCKW~1.EXE 82 PID 3496 wrote to memory of 5116 3496 SHOCKW~1.EXE 82 PID 3496 wrote to memory of 5116 3496 SHOCKW~1.EXE 82 PID 3496 wrote to memory of 5116 3496 SHOCKW~1.EXE 82 PID 3496 wrote to memory of 5116 3496 SHOCKW~1.EXE 82 PID 3496 wrote to memory of 5116 3496 SHOCKW~1.EXE 82 PID 3496 wrote to memory of 5116 3496 SHOCKW~1.EXE 82 PID 3496 wrote to memory of 5116 3496 SHOCKW~1.EXE 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e.exe"C:\Users\Admin\AppData\Local\Temp\e080049a04127c2a5d21343098bbbaed79be0d255bd1862d311bdbc9e137661e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SHOCKW~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SHOCKW~1.EXE2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SHOCKW~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SHOCKW~1.EXE3⤵
- Executes dropped EXE
PID:5116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
588KB
MD593f0b71bd3f91b0aaa25d9ce79788470
SHA172612fb6047ee5fc250dd530d8ce8a76a1e690ec
SHA25639915da99366fa52659211a8e793486859e034763a6ac7c48936d1c1c6da8aeb
SHA512d0015ef597fc669a1855d14ee4d592b24bf7538d98efc2c18cb418bc3c7e8543edee4d5b8f1b3ae115a7bc2497f1fd32e48858958214e62513d4e7cbceb9d2cd
-
Filesize
588KB
MD593f0b71bd3f91b0aaa25d9ce79788470
SHA172612fb6047ee5fc250dd530d8ce8a76a1e690ec
SHA25639915da99366fa52659211a8e793486859e034763a6ac7c48936d1c1c6da8aeb
SHA512d0015ef597fc669a1855d14ee4d592b24bf7538d98efc2c18cb418bc3c7e8543edee4d5b8f1b3ae115a7bc2497f1fd32e48858958214e62513d4e7cbceb9d2cd
-
Filesize
588KB
MD593f0b71bd3f91b0aaa25d9ce79788470
SHA172612fb6047ee5fc250dd530d8ce8a76a1e690ec
SHA25639915da99366fa52659211a8e793486859e034763a6ac7c48936d1c1c6da8aeb
SHA512d0015ef597fc669a1855d14ee4d592b24bf7538d98efc2c18cb418bc3c7e8543edee4d5b8f1b3ae115a7bc2497f1fd32e48858958214e62513d4e7cbceb9d2cd