Analysis
-
max time kernel
134s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe
Resource
win10v2004-20220812-en
General
-
Target
d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe
-
Size
40KB
-
MD5
a6d1f46429028a69831b2a80c9cbfc9b
-
SHA1
c8c426aae47fcdd52a26ca09b7fb2aaed3cbc2a9
-
SHA256
d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa
-
SHA512
203617c1e02c8fd29636540d6d60df6024bf41a5e7fa954aa0f246113c38cbccacd95e35a5907710e182b3ab36f1eec627f3c182912def4e19ac3b39e6b06f47
-
SSDEEP
384:karh4Mb11zmaXmfWveQPaEK2nDvkHrx0Xqnqpyx0b1V9y8zqLBHQiEzc1W:Zdbrlk/DSnDsHkwKyxWLKNHEzS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1996 ntmdm.exe 1492 ntmdm.exe -
resource yara_rule behavioral1/files/0x000b000000012300-54.dat upx behavioral1/files/0x000b000000012300-55.dat upx behavioral1/files/0x000b000000012300-57.dat upx behavioral1/memory/1756-58-0x00000000002D0000-0x00000000002DF000-memory.dmp upx behavioral1/memory/1996-60-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000b000000012300-62.dat upx behavioral1/memory/1996-64-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1492-65-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1492-67-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1756 d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe 1756 d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ntmdm.exe d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat ntmdm.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings ntmdm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ntmdm.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6B75522F-692B-4A46-BADA-465722D8486B}\WpadNetworkName = "Network 2" ntmdm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6B75522F-692B-4A46-BADA-465722D8486B}\76-6a-ab-21-cf-ae ntmdm.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ntmdm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings ntmdm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" ntmdm.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ntmdm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ntmdm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6B75522F-692B-4A46-BADA-465722D8486B} ntmdm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae\WpadDecision = "0" ntmdm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" ntmdm.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ntmdm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6B75522F-692B-4A46-BADA-465722D8486B}\WpadDecision = "0" ntmdm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae\WpadDecisionReason = "1" ntmdm.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae\WpadDecisionTime = 502d82d3210dd901 ntmdm.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ntmdm.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ntmdm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad ntmdm.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0048000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ntmdm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6B75522F-692B-4A46-BADA-465722D8486B}\WpadDecisionReason = "1" ntmdm.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6B75522F-692B-4A46-BADA-465722D8486B}\WpadDecisionTime = 502d82d3210dd901 ntmdm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-6a-ab-21-cf-ae ntmdm.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" ntmdm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1756 d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe 1756 d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1996 1756 d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe 28 PID 1756 wrote to memory of 1996 1756 d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe 28 PID 1756 wrote to memory of 1996 1756 d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe 28 PID 1756 wrote to memory of 1996 1756 d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe"C:\Users\Admin\AppData\Local\Temp\d80ce492587749aad969bc2112a80eb639f063353ae4cbfb36b8edffafb307aa.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\ntmdm.exeC:\Windows\system32\ntmdm.exe -inst2⤵
- Executes dropped EXE
PID:1996
-
-
C:\Windows\SysWOW64\ntmdm.exeC:\Windows\SysWOW64\ntmdm.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1492
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5603f526d15ed0b4544b23f692e188311
SHA18f32ade1b825cb276c98bbc082ed70ae06583db5
SHA25634e66c9db758ac9e2f1fb9dd5dad3ac30a77a291cd16ca2ed0dd1d7c432cb403
SHA51267d226802510037eb261809f2d49827a6459ce695c9a0e39f59985a4cff372172766a265f6be39fd94224924898f9353a4a207132af96fdd83b92e32f8330d9a
-
Filesize
18KB
MD5603f526d15ed0b4544b23f692e188311
SHA18f32ade1b825cb276c98bbc082ed70ae06583db5
SHA25634e66c9db758ac9e2f1fb9dd5dad3ac30a77a291cd16ca2ed0dd1d7c432cb403
SHA51267d226802510037eb261809f2d49827a6459ce695c9a0e39f59985a4cff372172766a265f6be39fd94224924898f9353a4a207132af96fdd83b92e32f8330d9a
-
Filesize
18KB
MD5603f526d15ed0b4544b23f692e188311
SHA18f32ade1b825cb276c98bbc082ed70ae06583db5
SHA25634e66c9db758ac9e2f1fb9dd5dad3ac30a77a291cd16ca2ed0dd1d7c432cb403
SHA51267d226802510037eb261809f2d49827a6459ce695c9a0e39f59985a4cff372172766a265f6be39fd94224924898f9353a4a207132af96fdd83b92e32f8330d9a
-
Filesize
18KB
MD5603f526d15ed0b4544b23f692e188311
SHA18f32ade1b825cb276c98bbc082ed70ae06583db5
SHA25634e66c9db758ac9e2f1fb9dd5dad3ac30a77a291cd16ca2ed0dd1d7c432cb403
SHA51267d226802510037eb261809f2d49827a6459ce695c9a0e39f59985a4cff372172766a265f6be39fd94224924898f9353a4a207132af96fdd83b92e32f8330d9a