Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2023, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
93b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11.exe
Resource
win10v2004-20230220-en
General
-
Target
93b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11.exe
-
Size
7.1MB
-
MD5
3c149f221df121353ca22345d3ef9d3e
-
SHA1
cd658f613032361512b65c3fb4697e609239acce
-
SHA256
93b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11
-
SHA512
0da0554f8826e5e09a07fe5b4a6702e51d62c6260f36ae462f925ba31770ff6357171a764681f4502033c5de976d4262808c509a4dfd4a6702fe31b3b7e5f571
-
SSDEEP
98304:pwhP2Law5h7ED1Ie3cxiBzZj8uQuyTs35U4x/z5fatahNeK6:pwhPpsASeoQjDA65UWb9atahMD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1496 USOPrivatessh-JRT7I3.5.9.8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\USOPrivatessh-JRT7I3.5.9.8 = "C:\\ProgramData\\USOPrivatessh-JRT7I3.5.9.8\\USOPrivatessh-JRT7I3.5.9.8.exe" 93b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run 93b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4224 wrote to memory of 1496 4224 93b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11.exe 82 PID 4224 wrote to memory of 1496 4224 93b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\93b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11.exe"C:\Users\Admin\AppData\Local\Temp\93b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\ProgramData\USOPrivatessh-JRT7I3.5.9.8\USOPrivatessh-JRT7I3.5.9.8.exeC:\ProgramData\USOPrivatessh-JRT7I3.5.9.8\USOPrivatessh-JRT7I3.5.9.8.exe2⤵
- Executes dropped EXE
PID:1496
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.1MB
MD53c149f221df121353ca22345d3ef9d3e
SHA1cd658f613032361512b65c3fb4697e609239acce
SHA25693b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11
SHA5120da0554f8826e5e09a07fe5b4a6702e51d62c6260f36ae462f925ba31770ff6357171a764681f4502033c5de976d4262808c509a4dfd4a6702fe31b3b7e5f571
-
Filesize
7.1MB
MD53c149f221df121353ca22345d3ef9d3e
SHA1cd658f613032361512b65c3fb4697e609239acce
SHA25693b0d4d0ed704c41d6480da0c19a8650b7e787b4683a45c7e793fa7a42a10a11
SHA5120da0554f8826e5e09a07fe5b4a6702e51d62c6260f36ae462f925ba31770ff6357171a764681f4502033c5de976d4262808c509a4dfd4a6702fe31b3b7e5f571