Analysis
-
max time kernel
148s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 19:26
Behavioral task
behavioral1
Sample
ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe
Resource
win10v2004-20221111-en
General
-
Target
ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe
-
Size
25KB
-
MD5
faecbe682ee0084fd77aabbe5c7d8e78
-
SHA1
765c289e006376d4b4d3c4a4480243015e10a40e
-
SHA256
ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c
-
SHA512
3635837bd8f31c076e67058cdcc1bd6c1d9c63075106fa9104b17c2c03f9f380c7137e037e4c4e1c7bd364af22f0fad3f464cc8d5ac22398b12159480212819d
-
SSDEEP
384:hdDFk6RryZETWUSE68jgl/RxC5WvZ/aKpBk4YA7nUOpVkGwKa62Kwv79iINPtYUW:hd5MZZlE6BBaWhSEYUndy1h62p5VK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 780 mscon.exe -
resource yara_rule behavioral1/memory/1492-54-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/files/0x000c0000000054a8-55.dat upx behavioral1/files/0x000c0000000054a8-56.dat upx behavioral1/files/0x000c0000000054a8-58.dat upx behavioral1/memory/1492-59-0x0000000000220000-0x0000000000236000-memory.dmp upx behavioral1/memory/780-61-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1492-62-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/780-65-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1492-68-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1988 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\mscon = "C:\\Windows\\system32\\mscon.exe" ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mscon.exe ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe File opened for modification C:\Windows\SysWOW64\mscon.exe ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe 780 mscon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1492 wrote to memory of 780 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 27 PID 1492 wrote to memory of 780 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 27 PID 1492 wrote to memory of 780 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 27 PID 1492 wrote to memory of 780 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 27 PID 1492 wrote to memory of 1988 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 28 PID 1492 wrote to memory of 1988 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 28 PID 1492 wrote to memory of 1988 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 28 PID 1492 wrote to memory of 1988 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 28 PID 1492 wrote to memory of 1964 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 29 PID 1492 wrote to memory of 1964 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 29 PID 1492 wrote to memory of 1964 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 29 PID 1492 wrote to memory of 1964 1492 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe"C:\Users\Admin\AppData\Local\Temp\ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\mscon.exeC:\Windows\system32\mscon.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:780
-
-
C:\Windows\SysWOW64\cmd.execmd /c "del "C:\Users\Admin\AppData\Local\Temp\ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe""2⤵
- Deletes itself
PID:1988
-
-
C:\Windows\SysWOW64\cmd.execmd /c "del "C:\Users\Admin\AppData\Local\Temp\ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe""2⤵PID:1964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5faecbe682ee0084fd77aabbe5c7d8e78
SHA1765c289e006376d4b4d3c4a4480243015e10a40e
SHA256ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c
SHA5123635837bd8f31c076e67058cdcc1bd6c1d9c63075106fa9104b17c2c03f9f380c7137e037e4c4e1c7bd364af22f0fad3f464cc8d5ac22398b12159480212819d
-
Filesize
25KB
MD5faecbe682ee0084fd77aabbe5c7d8e78
SHA1765c289e006376d4b4d3c4a4480243015e10a40e
SHA256ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c
SHA5123635837bd8f31c076e67058cdcc1bd6c1d9c63075106fa9104b17c2c03f9f380c7137e037e4c4e1c7bd364af22f0fad3f464cc8d5ac22398b12159480212819d
-
Filesize
25KB
MD5faecbe682ee0084fd77aabbe5c7d8e78
SHA1765c289e006376d4b4d3c4a4480243015e10a40e
SHA256ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c
SHA5123635837bd8f31c076e67058cdcc1bd6c1d9c63075106fa9104b17c2c03f9f380c7137e037e4c4e1c7bd364af22f0fad3f464cc8d5ac22398b12159480212819d