Analysis
-
max time kernel
256s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 19:35
Behavioral task
behavioral1
Sample
8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe
Resource
win10v2004-20221111-en
General
-
Target
8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe
-
Size
128KB
-
MD5
8e3f985fde98705c7fde09193b305f7a
-
SHA1
727b21be0878ead527cd8b651b2417a2f5558f92
-
SHA256
8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222
-
SHA512
55039c6b03041fcf0e921aca77c67c0c1b3c510a503519b9bc0d5f25cedc6472a12abfe2e0183640409849778a9a51e36cdf619f15c803a706143aaec6e349db
-
SSDEEP
1536:aZM5GODrwEpkYdZFoVP5mv+dHt8m8c0w2Aeq1KJUYvyxd8ngyKggbcWKIU:aG5GOfwExCk+dN85vdYyK/bW
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe -
resource yara_rule behavioral1/files/0x0008000000012751-55.dat upx behavioral1/memory/556-56-0x0000000000EB0000-0x0000000000ED4000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 556 8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\7BCD04FC.tmp 8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 556 8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe"C:\Users\Admin\AppData\Local\Temp\8f95f1e17a9b34993dfbdf3e51c983a5d49e7b74deaec82bd08910063cbde222.exe"1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5d169c0426e62ebb091045e28faa0622b
SHA1fa99c4ddbced44e7e5d029eba2e010dae61f46c2
SHA256ce565b49bc5a5b19d488855462b64a57ca8ae8645695f47bb6abf94d1f725b0d
SHA512118264fd2451dde7614cea4bc13bf559c842d18e7e9df487e45f83e49a8c1cad8b76da2ba05ca90743b033f2db3f99b5742727bcda31a226b7caabe3bbd0f89d