Analysis
-
max time kernel
150s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2023 12:39
Static task
static1
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20230220-en
General
-
Target
Client-built.exe
-
Size
247KB
-
MD5
deb4b02c26f7e261ca702e5074085bd0
-
SHA1
ed4f05f5fc5655daf48171e2e29dd2789ef215bd
-
SHA256
1e385183216df19a0faef80759e96e4617fcd01be3e9399cc226fad07771b736
-
SHA512
4359c4c32b688260d012e5850e3d7eab3fab03b801fd2c0c84ab602128c015864b5d46a767471a99fbbde7ab695469cedee02b17611970a117461833b02fe4e6
-
SSDEEP
6144:QWw35DFVd3bWp7QxA4bV2MxoJbtJ1bCWd:sDjd3bWh6bquWd
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1rVoaR3XjZIMbYwUCsZwzA7Un18WZ0Rq1OVdntW2cpo= = "C:\\Users\\Admin\\AppData\\Roaming\\NRGrH6o9muRgVea6UPDgyQIS9mYNXF0qN5xR+fqx3Ng=\\uZ6cnerV9yKdhYZM7whgzjqJJvUJA9k7SwLs1lfrEF4=" Client-built.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1996 AcroRd32.exe 1996 AcroRd32.exe 1996 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 976 2032 Client-built.exe 28 PID 2032 wrote to memory of 976 2032 Client-built.exe 28 PID 2032 wrote to memory of 976 2032 Client-built.exe 28 PID 976 wrote to memory of 1996 976 rundll32.exe 29 PID 976 wrote to memory of 1996 976 rundll32.exe 29 PID 976 wrote to memory of 1996 976 rundll32.exe 29 PID 976 wrote to memory of 1996 976 rundll32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\NRGrH6o9muRgVea6UPDgyQIS9mYNXF0qN5xR+fqx3Ng=\uZ6cnerV9yKdhYZM7whgzjqJJvUJA9k7SwLs1lfrEF4=2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\NRGrH6o9muRgVea6UPDgyQIS9mYNXF0qN5xR+fqx3Ng=\uZ6cnerV9yKdhYZM7whgzjqJJvUJA9k7SwLs1lfrEF4="3⤵
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\NRGrH6o9muRgVea6UPDgyQIS9mYNXF0qN5xR+fqx3Ng=\uZ6cnerV9yKdhYZM7whgzjqJJvUJA9k7SwLs1lfrEF4=
Filesize247KB
MD5deb4b02c26f7e261ca702e5074085bd0
SHA1ed4f05f5fc5655daf48171e2e29dd2789ef215bd
SHA2561e385183216df19a0faef80759e96e4617fcd01be3e9399cc226fad07771b736
SHA5124359c4c32b688260d012e5850e3d7eab3fab03b801fd2c0c84ab602128c015864b5d46a767471a99fbbde7ab695469cedee02b17611970a117461833b02fe4e6