Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 12:30
Static task
static1
Behavioral task
behavioral1
Sample
a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe
Resource
win10v2004-20220812-en
General
-
Target
a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe
-
Size
202KB
-
MD5
148270bf298fcb4033d6c42c91648176
-
SHA1
6cba9f11e63ecb3289e57cc5712a0147423d40b2
-
SHA256
a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146
-
SHA512
ac7aa90c6d0db79d8702c5ccfa2ad1d5e544108d140a528c70ade071f00a9f1e5367a6e9a4734f979ff259d35a4c7be17fa62516b7fd968385cdecec688ab715
-
SSDEEP
6144:ikG6TWCM3bi3P+KwqGFnoYvTK4XiMz9Hp7gfgT2uwI1k2:06/r/+GYbKc9J78gT2i1
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe 2028 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2028 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe 27 PID 2032 wrote to memory of 2028 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe 27 PID 2032 wrote to memory of 2028 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe 27 PID 2032 wrote to memory of 2028 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe 27 PID 2032 wrote to memory of 2028 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe 27 PID 2032 wrote to memory of 2028 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe 27 PID 2032 wrote to memory of 2028 2032 a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe"C:\Users\Admin\AppData\Local\Temp\a4865ca33b0d587f210d984cbce591c690f59cf2122c62cb9d2eb4a13cc3a146.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
168KB
MD52b78b21016e70b909ee844f754dd30c9
SHA1562bdffe94743b2c38c6f49b2415b6addee208e9
SHA2564ac4c7a95c530228811ec3457fb73fc3614d9c6d36da563a83f5cea1dc26a1cc
SHA512e0c549e7b0c922b67c605e2fd8dd945955111e59b329ea9a285a144f5d34c57b99b3d19e13ea22e96256a1194b56026e96d47a34a76c0d907748d843fbf80d7b
-
Filesize
168KB
MD52b78b21016e70b909ee844f754dd30c9
SHA1562bdffe94743b2c38c6f49b2415b6addee208e9
SHA2564ac4c7a95c530228811ec3457fb73fc3614d9c6d36da563a83f5cea1dc26a1cc
SHA512e0c549e7b0c922b67c605e2fd8dd945955111e59b329ea9a285a144f5d34c57b99b3d19e13ea22e96256a1194b56026e96d47a34a76c0d907748d843fbf80d7b
-
Filesize
168KB
MD52b78b21016e70b909ee844f754dd30c9
SHA1562bdffe94743b2c38c6f49b2415b6addee208e9
SHA2564ac4c7a95c530228811ec3457fb73fc3614d9c6d36da563a83f5cea1dc26a1cc
SHA512e0c549e7b0c922b67c605e2fd8dd945955111e59b329ea9a285a144f5d34c57b99b3d19e13ea22e96256a1194b56026e96d47a34a76c0d907748d843fbf80d7b
-
Filesize
168KB
MD52b78b21016e70b909ee844f754dd30c9
SHA1562bdffe94743b2c38c6f49b2415b6addee208e9
SHA2564ac4c7a95c530228811ec3457fb73fc3614d9c6d36da563a83f5cea1dc26a1cc
SHA512e0c549e7b0c922b67c605e2fd8dd945955111e59b329ea9a285a144f5d34c57b99b3d19e13ea22e96256a1194b56026e96d47a34a76c0d907748d843fbf80d7b
-
Filesize
168KB
MD52b78b21016e70b909ee844f754dd30c9
SHA1562bdffe94743b2c38c6f49b2415b6addee208e9
SHA2564ac4c7a95c530228811ec3457fb73fc3614d9c6d36da563a83f5cea1dc26a1cc
SHA512e0c549e7b0c922b67c605e2fd8dd945955111e59b329ea9a285a144f5d34c57b99b3d19e13ea22e96256a1194b56026e96d47a34a76c0d907748d843fbf80d7b
-
Filesize
168KB
MD52b78b21016e70b909ee844f754dd30c9
SHA1562bdffe94743b2c38c6f49b2415b6addee208e9
SHA2564ac4c7a95c530228811ec3457fb73fc3614d9c6d36da563a83f5cea1dc26a1cc
SHA512e0c549e7b0c922b67c605e2fd8dd945955111e59b329ea9a285a144f5d34c57b99b3d19e13ea22e96256a1194b56026e96d47a34a76c0d907748d843fbf80d7b