Analysis
-
max time kernel
362s -
max time network
426s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:26
Behavioral task
behavioral1
Sample
ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe
Resource
win10v2004-20221111-en
General
-
Target
ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe
-
Size
25KB
-
MD5
faecbe682ee0084fd77aabbe5c7d8e78
-
SHA1
765c289e006376d4b4d3c4a4480243015e10a40e
-
SHA256
ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c
-
SHA512
3635837bd8f31c076e67058cdcc1bd6c1d9c63075106fa9104b17c2c03f9f380c7137e037e4c4e1c7bd364af22f0fad3f464cc8d5ac22398b12159480212819d
-
SSDEEP
384:hdDFk6RryZETWUSE68jgl/RxC5WvZ/aKpBk4YA7nUOpVkGwKa62Kwv79iINPtYUW:hd5MZZlE6BBaWhSEYUndy1h62p5VK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 724 mscon.exe -
resource yara_rule behavioral2/memory/3888-132-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3888-133-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/files/0x000b000000022d97-135.dat upx behavioral2/files/0x000b000000022d97-136.dat upx behavioral2/memory/724-137-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/724-138-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3888-141-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mscon = "C:\\Windows\\system32\\mscon.exe" ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mscon.exe ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe File opened for modification C:\Windows\SysWOW64\mscon.exe ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe 724 mscon.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3888 wrote to memory of 724 3888 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 78 PID 3888 wrote to memory of 724 3888 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 78 PID 3888 wrote to memory of 724 3888 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 78 PID 3888 wrote to memory of 2628 3888 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 79 PID 3888 wrote to memory of 2628 3888 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 79 PID 3888 wrote to memory of 2628 3888 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 79 PID 3888 wrote to memory of 1136 3888 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 80 PID 3888 wrote to memory of 1136 3888 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 80 PID 3888 wrote to memory of 1136 3888 ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe"C:\Users\Admin\AppData\Local\Temp\ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\mscon.exeC:\Windows\system32\mscon.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:724
-
-
C:\Windows\SysWOW64\cmd.execmd /c "del "C:\Users\Admin\AppData\Local\Temp\ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe""2⤵PID:2628
-
-
C:\Windows\SysWOW64\cmd.execmd /c "del "C:\Users\Admin\AppData\Local\Temp\ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c.exe""2⤵PID:1136
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5faecbe682ee0084fd77aabbe5c7d8e78
SHA1765c289e006376d4b4d3c4a4480243015e10a40e
SHA256ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c
SHA5123635837bd8f31c076e67058cdcc1bd6c1d9c63075106fa9104b17c2c03f9f380c7137e037e4c4e1c7bd364af22f0fad3f464cc8d5ac22398b12159480212819d
-
Filesize
25KB
MD5faecbe682ee0084fd77aabbe5c7d8e78
SHA1765c289e006376d4b4d3c4a4480243015e10a40e
SHA256ea433706f218549c9d2c26210fc4f1e9fe9fa28ede3810d19bd56e62436c169c
SHA5123635837bd8f31c076e67058cdcc1bd6c1d9c63075106fa9104b17c2c03f9f380c7137e037e4c4e1c7bd364af22f0fad3f464cc8d5ac22398b12159480212819d