Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 19:57
Static task
static1
Behavioral task
behavioral1
Sample
57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94.exe
Resource
win10v2004-20220901-en
General
-
Target
57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94.exe
-
Size
725KB
-
MD5
e917362f0e5956d0198f2b320fe12332
-
SHA1
b06acf5f9ff02aea07976a4bd56139d51ac769db
-
SHA256
57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94
-
SHA512
488e4fef7ac8037d707be3a8c95e346601721de35d117d88d578bd41420291cf6c7c74eab564439dc4e7aaaba9b976bb2d58db174446eb77e8def8b761950c9c
-
SSDEEP
12288:7CatIwPtT2lwPtT2VpmxqDbHks2XnFxXKdOUzD1Duc18Wy:7zVPtT2OPtT2VpmUHU3F4Tzlu/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 812 bootinst.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 568 attrib.exe -
Loads dropped DLL 2 IoCs
pid Process 1300 cmd.exe 1300 cmd.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94.exe File opened (read-only) \??\E: cmd.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 992 wrote to memory of 1300 992 57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94.exe 27 PID 992 wrote to memory of 1300 992 57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94.exe 27 PID 992 wrote to memory of 1300 992 57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94.exe 27 PID 992 wrote to memory of 1300 992 57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94.exe 27 PID 1300 wrote to memory of 568 1300 cmd.exe 29 PID 1300 wrote to memory of 568 1300 cmd.exe 29 PID 1300 wrote to memory of 568 1300 cmd.exe 29 PID 1300 wrote to memory of 568 1300 cmd.exe 29 PID 1300 wrote to memory of 812 1300 cmd.exe 30 PID 1300 wrote to memory of 812 1300 cmd.exe 30 PID 1300 wrote to memory of 812 1300 cmd.exe 30 PID 1300 wrote to memory of 812 1300 cmd.exe 30 PID 1300 wrote to memory of 1100 1300 cmd.exe 31 PID 1300 wrote to memory of 1100 1300 cmd.exe 31 PID 1300 wrote to memory of 1100 1300 cmd.exe 31 PID 1300 wrote to memory of 1100 1300 cmd.exe 31 PID 1300 wrote to memory of 1216 1300 cmd.exe 33 PID 1300 wrote to memory of 1216 1300 cmd.exe 33 PID 1300 wrote to memory of 1216 1300 cmd.exe 33 PID 1300 wrote to memory of 1216 1300 cmd.exe 33 PID 1300 wrote to memory of 1816 1300 cmd.exe 35 PID 1300 wrote to memory of 1816 1300 cmd.exe 35 PID 1300 wrote to memory of 1816 1300 cmd.exe 35 PID 1300 wrote to memory of 1816 1300 cmd.exe 35 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 568 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94.exe"C:\Users\Admin\AppData\Local\Temp\57f5bdbf3437b84b8f2c6b5fd58e7a157077666e0822d2d498a9db161e818b94.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\cmd.execmd.exe /c copy C:\Users\Admin\AppData\Roaming\win7Res\grldr E:\grldr / b>NUL 2>NUL &attrib E:\grldr +h +s +r &C:\Users\Admin\AppData\Roaming\win7Res\bootinst /nt60 E: &cscript C:\Windows\system32\slmgr.vbs -ilc C:\Users\Admin\AppData\Roaming\win7Res\Certificate.xrm-ms &cscript C:\Windows\system32\slmgr.vbs -ipk 49PB6-6BJ6Y-KHGCQ-7DDY6-TF7CD &C:\Windows\system32\svchost.exe -k LocalService2⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\attrib.exeattrib E:\grldr +h +s +r3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:568
-
-
C:\Users\Admin\AppData\Roaming\win7Res\bootinst.exeC:\Users\Admin\AppData\Roaming\win7Res\bootinst /nt60 E:3⤵
- Executes dropped EXE
PID:812
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs -ilc C:\Users\Admin\AppData\Roaming\win7Res\Certificate.xrm-ms3⤵PID:1100
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs -ipk 49PB6-6BJ6Y-KHGCQ-7DDY6-TF7CD3⤵PID:1216
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:1816
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f25832af6a684360950dbb15589de34a
SHA117ff1d21005c1695ae3dcbdc3435017c895fff5d
SHA256266d64637cf12ff961165a018f549ff41002dc59380605b36d65cf1b8127c96f
SHA512e0cf23351c02f4afa85eedc72a86b9114f539595cbd6bcd220e8b8d70fa6a7379dcd947ea0d59332ba672f36ebda6bd98892d9b6b20eedafc8be168387a3dd5f
-
Filesize
85KB
MD570c5f6f69cdc6c5b8240622cf7d90380
SHA1d7fa00497a3d3279b547dfc913e23052b9287060
SHA256d7aba1fa037041412052bfdc0127d44bd63597bf01151058d3edf585186387be
SHA512447ffe8f7216e38695a85e09e5085564ec6d4b35c6770ee8864300fbaad50b0855f9535f1c0fb78a57b090cec9478e24338c8ef54b4986b87abcfdde986df798
-
Filesize
85KB
MD570c5f6f69cdc6c5b8240622cf7d90380
SHA1d7fa00497a3d3279b547dfc913e23052b9287060
SHA256d7aba1fa037041412052bfdc0127d44bd63597bf01151058d3edf585186387be
SHA512447ffe8f7216e38695a85e09e5085564ec6d4b35c6770ee8864300fbaad50b0855f9535f1c0fb78a57b090cec9478e24338c8ef54b4986b87abcfdde986df798
-
Filesize
199KB
MD5560b738b2357d5a92190d4ddf2966991
SHA15d3ed31bd12c97eadc594bcf10e758a67c4e7552
SHA25638c658da9d95ef05fea051054f021bfbfed67b7aff32a996a4b32edc9f31c287
SHA5127a25caacf68367a64d81fdb5a5629cb60dbca4425b27987d0c0885da0bfbfd410f0ea77810552a00601bcb32855f575a00082c9c4fbb78a591d0cc24ad09ecf3
-
Filesize
199KB
MD5560b738b2357d5a92190d4ddf2966991
SHA15d3ed31bd12c97eadc594bcf10e758a67c4e7552
SHA25638c658da9d95ef05fea051054f021bfbfed67b7aff32a996a4b32edc9f31c287
SHA5127a25caacf68367a64d81fdb5a5629cb60dbca4425b27987d0c0885da0bfbfd410f0ea77810552a00601bcb32855f575a00082c9c4fbb78a591d0cc24ad09ecf3
-
Filesize
85KB
MD570c5f6f69cdc6c5b8240622cf7d90380
SHA1d7fa00497a3d3279b547dfc913e23052b9287060
SHA256d7aba1fa037041412052bfdc0127d44bd63597bf01151058d3edf585186387be
SHA512447ffe8f7216e38695a85e09e5085564ec6d4b35c6770ee8864300fbaad50b0855f9535f1c0fb78a57b090cec9478e24338c8ef54b4986b87abcfdde986df798
-
Filesize
85KB
MD570c5f6f69cdc6c5b8240622cf7d90380
SHA1d7fa00497a3d3279b547dfc913e23052b9287060
SHA256d7aba1fa037041412052bfdc0127d44bd63597bf01151058d3edf585186387be
SHA512447ffe8f7216e38695a85e09e5085564ec6d4b35c6770ee8864300fbaad50b0855f9535f1c0fb78a57b090cec9478e24338c8ef54b4986b87abcfdde986df798