Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
30-08-2023 21:34
Static task
static1
Behavioral task
behavioral1
Sample
da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe
Resource
win10v2004-20230703-en
General
-
Target
da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe
-
Size
9.2MB
-
MD5
912de51e8cafeccce873cb358809f1f6
-
SHA1
18865f500e551839ccc9449d9e08ddd6d0e4a1b3
-
SHA256
da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107
-
SHA512
9c21e7f21a25861bd452057a76fe807f7f99bb25f93ce66441c51ecc716c31a9d6ff549b28984333d9225fd89efcde34603587bf787fde76d50543da34a20ead
-
SSDEEP
196608:3Dbo9lGZGm4KxOcEYPk/EmEyv6YgCTlwc8Ev1:zoJe8cME12Lwc8y1
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2528-1-0x0000000002DF0000-0x0000000002FD4000-memory.dmp upx behavioral1/memory/2528-0-0x0000000002DF0000-0x0000000002FD4000-memory.dmp upx behavioral1/memory/2528-2-0x0000000002DF0000-0x0000000002FD4000-memory.dmp upx behavioral1/memory/2528-4-0x0000000002DF0000-0x0000000002FD4000-memory.dmp upx behavioral1/memory/2528-5-0x0000000002DF0000-0x0000000002FD4000-memory.dmp upx behavioral1/memory/2528-6-0x0000000002DF0000-0x0000000002FD4000-memory.dmp upx behavioral1/memory/2528-7-0x0000000002DF0000-0x0000000002FD4000-memory.dmp upx behavioral1/memory/2528-22-0x0000000002DF0000-0x0000000002FD4000-memory.dmp upx behavioral1/memory/2528-29-0x0000000002DF0000-0x0000000002FD4000-memory.dmp upx behavioral1/memory/2528-31-0x0000000002DF0000-0x0000000002FD4000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\port.dll da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SKB\newserver.txt da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe File created C:\Windows\·þÎñÆ÷2.txt da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 3052 systeminfo.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2988 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 29 PID 2528 wrote to memory of 2988 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 29 PID 2528 wrote to memory of 2988 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 29 PID 2528 wrote to memory of 2988 2528 da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe 29 PID 2988 wrote to memory of 3052 2988 cmd.exe 31 PID 2988 wrote to memory of 3052 2988 cmd.exe 31 PID 2988 wrote to memory of 3052 2988 cmd.exe 31 PID 2988 wrote to memory of 3052 2988 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe"C:\Users\Admin\AppData\Local\Temp\da335be220dabc492e5544e46074dec566c36dc173d186d416e278bfb6330107.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:3052
-
-