Analysis
-
max time kernel
171s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe
Resource
win10v2004-20220812-en
General
-
Target
a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe
-
Size
9KB
-
MD5
54027defe0e4f7c43d138ff5437504d9
-
SHA1
09998d7f57ce73e7e1f4efaadfb9672fda0cfdfa
-
SHA256
a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f
-
SHA512
85d81646cc5e711510087952f0ffff7eb961eaf82b0210dd32e3dc8f197fde5564a01ddbe4b71bdca46f4e8de86a8e080394c601f596f5407a06ab46034adab5
-
SSDEEP
192:m5+On7GOu+qlj42MN4GjEeUzCTRrJp6YDvPI8m:m5+O7GOu+qls2MREeUOlrvPIN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5004 ssopure.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{63E16148-3A71-99D9-2524-FE3574645AFF} a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{63E16148-3A71-99D9-2524-FE3574645AFF}\StubPath = "C:\\Windows\\system32\\ssopure.exe" a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ssopure.exe ssopure.exe File created C:\Windows\SysWOW64\ssopure.exe a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe File opened for modification C:\Windows\SysWOW64\ssopure.exe a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2404 wrote to memory of 5004 2404 a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe 80 PID 2404 wrote to memory of 5004 2404 a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe 80 PID 2404 wrote to memory of 5004 2404 a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe 80 PID 5004 wrote to memory of 4696 5004 ssopure.exe 79 PID 5004 wrote to memory of 4696 5004 ssopure.exe 79 PID 5004 wrote to memory of 4696 5004 ssopure.exe 79 PID 2404 wrote to memory of 928 2404 a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe 81 PID 2404 wrote to memory of 928 2404 a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe 81 PID 2404 wrote to memory of 928 2404 a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe"C:\Users\Admin\AppData\Local\Temp\a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\ssopure.exeC:\Windows\system32\ssopure.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f.exe"2⤵PID:928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\ssopure.exe"1⤵PID:4696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD554027defe0e4f7c43d138ff5437504d9
SHA109998d7f57ce73e7e1f4efaadfb9672fda0cfdfa
SHA256a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f
SHA51285d81646cc5e711510087952f0ffff7eb961eaf82b0210dd32e3dc8f197fde5564a01ddbe4b71bdca46f4e8de86a8e080394c601f596f5407a06ab46034adab5
-
Filesize
9KB
MD554027defe0e4f7c43d138ff5437504d9
SHA109998d7f57ce73e7e1f4efaadfb9672fda0cfdfa
SHA256a002d6200a6ff0dc72710939d0032e736343691ddf43112fa5efd31b04e7503f
SHA51285d81646cc5e711510087952f0ffff7eb961eaf82b0210dd32e3dc8f197fde5564a01ddbe4b71bdca46f4e8de86a8e080394c601f596f5407a06ab46034adab5