Analysis
-
max time kernel
189s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe
Resource
win10v2004-20221111-en
General
-
Target
dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe
-
Size
209KB
-
MD5
2cb75b7af243d820e0c37e0b50e4c61b
-
SHA1
adca7bc90f81339351afced031eb39466c314470
-
SHA256
dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2
-
SHA512
2bf9f2b698194cd1859a795c490dde7cd771e8985c864c1703ac39495d81af8a1ea2767de904281ec1fd8231992c4eef264cfb9633a7b96c748a2e9d6562d241
-
SSDEEP
6144:XbNTOL0/g28bS6tYIyga2ZzyA/S65Ti5DCTXWp:LBV/gJc4z3/P5etCT
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2016 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe 28 PID 2028 wrote to memory of 2016 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe 28 PID 2028 wrote to memory of 2016 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe 28 PID 2028 wrote to memory of 2016 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe 28 PID 2028 wrote to memory of 2016 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe 28 PID 2028 wrote to memory of 2016 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe 28 PID 2028 wrote to memory of 2016 2028 dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe"C:\Users\Admin\AppData\Local\Temp\dc4d4aa69fe33ea6b7d9eec3f9d01e637371fde5647a09ba2cec5f20597d30e2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
170KB
MD546a511caa5ad0ce70895f0fc8044a80f
SHA15d61b47ce5b46b0629c989abdc73d074f50e9d87
SHA2562c98291982fa0d2e2a69854180c004f7bdb345d97f057ae4e2068810bfbbf959
SHA51264baff09642206399414238c1f23dac98f4f10c3117dd3d364715037040c6a8408bcb841042b2e034cd2dff4e44bce27dd59bff7b9aa2fc8a4fdd7898b8c63e4
-
Filesize
170KB
MD546a511caa5ad0ce70895f0fc8044a80f
SHA15d61b47ce5b46b0629c989abdc73d074f50e9d87
SHA2562c98291982fa0d2e2a69854180c004f7bdb345d97f057ae4e2068810bfbbf959
SHA51264baff09642206399414238c1f23dac98f4f10c3117dd3d364715037040c6a8408bcb841042b2e034cd2dff4e44bce27dd59bff7b9aa2fc8a4fdd7898b8c63e4
-
Filesize
170KB
MD546a511caa5ad0ce70895f0fc8044a80f
SHA15d61b47ce5b46b0629c989abdc73d074f50e9d87
SHA2562c98291982fa0d2e2a69854180c004f7bdb345d97f057ae4e2068810bfbbf959
SHA51264baff09642206399414238c1f23dac98f4f10c3117dd3d364715037040c6a8408bcb841042b2e034cd2dff4e44bce27dd59bff7b9aa2fc8a4fdd7898b8c63e4
-
Filesize
170KB
MD546a511caa5ad0ce70895f0fc8044a80f
SHA15d61b47ce5b46b0629c989abdc73d074f50e9d87
SHA2562c98291982fa0d2e2a69854180c004f7bdb345d97f057ae4e2068810bfbbf959
SHA51264baff09642206399414238c1f23dac98f4f10c3117dd3d364715037040c6a8408bcb841042b2e034cd2dff4e44bce27dd59bff7b9aa2fc8a4fdd7898b8c63e4
-
Filesize
170KB
MD546a511caa5ad0ce70895f0fc8044a80f
SHA15d61b47ce5b46b0629c989abdc73d074f50e9d87
SHA2562c98291982fa0d2e2a69854180c004f7bdb345d97f057ae4e2068810bfbbf959
SHA51264baff09642206399414238c1f23dac98f4f10c3117dd3d364715037040c6a8408bcb841042b2e034cd2dff4e44bce27dd59bff7b9aa2fc8a4fdd7898b8c63e4
-
Filesize
170KB
MD546a511caa5ad0ce70895f0fc8044a80f
SHA15d61b47ce5b46b0629c989abdc73d074f50e9d87
SHA2562c98291982fa0d2e2a69854180c004f7bdb345d97f057ae4e2068810bfbbf959
SHA51264baff09642206399414238c1f23dac98f4f10c3117dd3d364715037040c6a8408bcb841042b2e034cd2dff4e44bce27dd59bff7b9aa2fc8a4fdd7898b8c63e4