Analysis
-
max time kernel
8s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 20:45
Static task
static1
Behavioral task
behavioral1
Sample
f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe
Resource
win10v2004-20220812-en
General
-
Target
f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe
-
Size
394KB
-
MD5
c3e196729803e6e30962b946d32c22ed
-
SHA1
6bd1e763006a42d7679530c30acc3c5248d1dbff
-
SHA256
f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f
-
SHA512
d4173c34c1cc54d1920a1087a50c3bb579ffee762523b2e1f718ac0325ff804027a0c00676ed384aef76a6119287fd75fc5b19cec5380d298c722f6dfcbe594c
-
SSDEEP
12288:6+g+HPUZHa8WU2aPIBMFrHgnUS2kTzDsA/Gtey:6J+vsHZiaeMVgT2KQA/Gt7
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0008000000014145-54.dat aspack_v212_v242 behavioral1/files/0x0008000000014145-57.dat aspack_v212_v242 behavioral1/files/0x0008000000014145-55.dat aspack_v212_v242 behavioral1/files/0x000a000000013a17-58.dat aspack_v212_v242 behavioral1/files/0x000a000000013a17-59.dat aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msfali.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\msfali = "C:\\Windows\\SysWOW64\\msfali.exe" msfali.exe -
Executes dropped EXE 1 IoCs
pid Process 1476 msfali.exe -
Deletes itself 1 IoCs
pid Process 1620 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1772 f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe 1772 f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe 1476 msfali.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msuadosat.dll f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe File created C:\Windows\SysWOW64\msfali.exe f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1476 msfali.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1476 1772 f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe 28 PID 1772 wrote to memory of 1476 1772 f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe 28 PID 1772 wrote to memory of 1476 1772 f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe 28 PID 1772 wrote to memory of 1476 1772 f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe 28 PID 1772 wrote to memory of 1620 1772 f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe 29 PID 1772 wrote to memory of 1620 1772 f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe 29 PID 1772 wrote to memory of 1620 1772 f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe 29 PID 1772 wrote to memory of 1620 1772 f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe"C:\Users\Admin\AppData\Local\Temp\f5d4f4301bf7b94f80ac359d5f25942414fe018c245df71d7c72d55e1043bc6f.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\msfali.exeC:\Windows\system32\msfali.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_deleteme.bat2⤵
- Deletes itself
PID:1620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248B
MD5927e030da8837a5ca1f09682a71ed844
SHA1db9e899c4534af112640ed6f764759b8f2c2e0ad
SHA256041c900eb3d50dd41931628d17798c747ff1e611555f523833abb48af93cf447
SHA512f5d467f10d131e75098bd7396f2592db5f448ac8bffbf586fce3a7a03328a944bc9ea69e5211114805041d6cde3d04c3ce4251bb1a412492dc0b6426e57eaaf3
-
Filesize
56KB
MD5037e08658134225a44448a2de2ee8578
SHA1536a02bb1bd60f46bf71a255b9f217b7bc383427
SHA2566ac5a734eb7746775d173537eeb0a937a8de776ff5d6b4e83f64fcb0c8fe0118
SHA5124de5ec6cdc610ce0e117c42ed6c7407e0967e9719ab7c8d7056b97d49961d9c686a7d599df40862457296a27b840a29c5056bcbb6b694fbd3469e5c7bf37e481
-
Filesize
218KB
MD529d0e16c8e82a8e0553b62ad705034ea
SHA1f24246e805dfe07537854bbf1cf3f3b679e5cff9
SHA256a91eec2951e42006d343156ee57b2535d31fc0002aa92e8bc8ac8ddb20c1792d
SHA512ab039b8395f94b9b949fb3c0380f79f58e4e537f2eea69f8b423ffc3da12d00f7d29a5e579b4455fb16399c4c79c7b77a453b6a28f99538545108fbbadf55a5e
-
Filesize
56KB
MD5037e08658134225a44448a2de2ee8578
SHA1536a02bb1bd60f46bf71a255b9f217b7bc383427
SHA2566ac5a734eb7746775d173537eeb0a937a8de776ff5d6b4e83f64fcb0c8fe0118
SHA5124de5ec6cdc610ce0e117c42ed6c7407e0967e9719ab7c8d7056b97d49961d9c686a7d599df40862457296a27b840a29c5056bcbb6b694fbd3469e5c7bf37e481
-
Filesize
56KB
MD5037e08658134225a44448a2de2ee8578
SHA1536a02bb1bd60f46bf71a255b9f217b7bc383427
SHA2566ac5a734eb7746775d173537eeb0a937a8de776ff5d6b4e83f64fcb0c8fe0118
SHA5124de5ec6cdc610ce0e117c42ed6c7407e0967e9719ab7c8d7056b97d49961d9c686a7d599df40862457296a27b840a29c5056bcbb6b694fbd3469e5c7bf37e481
-
Filesize
218KB
MD529d0e16c8e82a8e0553b62ad705034ea
SHA1f24246e805dfe07537854bbf1cf3f3b679e5cff9
SHA256a91eec2951e42006d343156ee57b2535d31fc0002aa92e8bc8ac8ddb20c1792d
SHA512ab039b8395f94b9b949fb3c0380f79f58e4e537f2eea69f8b423ffc3da12d00f7d29a5e579b4455fb16399c4c79c7b77a453b6a28f99538545108fbbadf55a5e