Analysis
-
max time kernel
137s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe
Resource
win10v2004-20230703-en
General
-
Target
9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe
-
Size
15.8MB
-
MD5
88c4d7d64fed2d4067e130f163aff0f5
-
SHA1
fdbe4df2c5500a280b3eadef490c23521c7b884a
-
SHA256
9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89
-
SHA512
90a65376054d55f7d495aa254e62274bf5dae4835ceb5f64371b9d69d4f29e6362426b132dda549653d999daf10b64a896f05815623dc1c92429579f6a8f3eb3
-
SSDEEP
393216:NP8u11Vsq9t0HC1DmLEUx0PHmylDnfQBypJEf2QI:NkCsqAi1DmJx0GypJEfg
Malware Config
Signatures
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 2396 WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 828 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe -
Loads dropped DLL 3 IoCs
pid Process 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 828 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 828 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2204 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 30 PID 1196 wrote to memory of 2204 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 30 PID 1196 wrote to memory of 2204 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 30 PID 1196 wrote to memory of 2204 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 30 PID 1196 wrote to memory of 2396 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 31 PID 1196 wrote to memory of 2396 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 31 PID 1196 wrote to memory of 2396 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 31 PID 1196 wrote to memory of 2396 1196 9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe 31 PID 2204 wrote to memory of 828 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 32 PID 2204 wrote to memory of 828 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 32 PID 2204 wrote to memory of 828 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 32 PID 2204 wrote to memory of 828 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 32 PID 2204 wrote to memory of 1140 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 33 PID 2204 wrote to memory of 1140 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 33 PID 2204 wrote to memory of 1140 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 33 PID 2204 wrote to memory of 1140 2204 ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe"C:\Users\Admin\AppData\Local\Temp\9e7a9075f7768c7de19e90ea81daae9082c3f26f6d4f82cd22d337ae3d81bf89.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe"C:\Users\Admin\AppData\Local\Temp\ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe"C:\Users\Admin\AppData\Local\Temp\ÄÚ²¿³ÌÐò_ÔƸüÐÂss42.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:828
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tem.vbs"3⤵PID:1140
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tem.vbs"2⤵
- Deletes itself
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275B
MD5f9849e00841c0d05e5c1f09e16ee4f94
SHA1dea3430f659a07940fbc1aa11ca9b8e6759e9d18
SHA2560900fc9577f8ca50ffc6731ef91e66c3f715aac2b346f8c45e3fa27d965ad5ba
SHA512e831c373b0012ef62c077e25e852121ea08782f6c50b5715694e0a199fcfbf38d3972be6c6716c12bdceec1e5a2dd6dde25b49c4ef0810be0a4b95a9869e9d1d
-
Filesize
230B
MD5151b71b54d34e4f2b0b69d83adb0d735
SHA15f01862b18c2eb52696bd4ff4625f1c1a3e9cf34
SHA256cd725db722b7323b3f92ed1f63904d768f965142d17d966c828d0eb246e72730
SHA512590191f90893efe5d188e52567b3b9d5efc0fdd289e099c52685354b01bf8122201b34f0a48dbf33b9b5fef3cacad6e142f9a0952a2e4a452755eae59cd563b0
-
Filesize
15.8MB
MD5b8365b1012185bcc787632a75fac6111
SHA124c89b5b7123a116a8e91753621df651b5c5bc11
SHA2569527eadb8f63516236cd6abf5f2a09a3d40f58624194aae580be9126273deaa5
SHA512b5e922f3399eb1fc63291244941adbc7d7f63718864afa0b14870175cdd2d1101326bad6d327ff2fab53557ccc297968c3b2d8cf117eb95becceedd936d6cbbc
-
Filesize
15.8MB
MD5b8365b1012185bcc787632a75fac6111
SHA124c89b5b7123a116a8e91753621df651b5c5bc11
SHA2569527eadb8f63516236cd6abf5f2a09a3d40f58624194aae580be9126273deaa5
SHA512b5e922f3399eb1fc63291244941adbc7d7f63718864afa0b14870175cdd2d1101326bad6d327ff2fab53557ccc297968c3b2d8cf117eb95becceedd936d6cbbc
-
Filesize
15.8MB
MD5b8365b1012185bcc787632a75fac6111
SHA124c89b5b7123a116a8e91753621df651b5c5bc11
SHA2569527eadb8f63516236cd6abf5f2a09a3d40f58624194aae580be9126273deaa5
SHA512b5e922f3399eb1fc63291244941adbc7d7f63718864afa0b14870175cdd2d1101326bad6d327ff2fab53557ccc297968c3b2d8cf117eb95becceedd936d6cbbc
-
Filesize
15.8MB
MD5b8365b1012185bcc787632a75fac6111
SHA124c89b5b7123a116a8e91753621df651b5c5bc11
SHA2569527eadb8f63516236cd6abf5f2a09a3d40f58624194aae580be9126273deaa5
SHA512b5e922f3399eb1fc63291244941adbc7d7f63718864afa0b14870175cdd2d1101326bad6d327ff2fab53557ccc297968c3b2d8cf117eb95becceedd936d6cbbc
-
Filesize
15.8MB
MD5b8365b1012185bcc787632a75fac6111
SHA124c89b5b7123a116a8e91753621df651b5c5bc11
SHA2569527eadb8f63516236cd6abf5f2a09a3d40f58624194aae580be9126273deaa5
SHA512b5e922f3399eb1fc63291244941adbc7d7f63718864afa0b14870175cdd2d1101326bad6d327ff2fab53557ccc297968c3b2d8cf117eb95becceedd936d6cbbc