Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/09/2023, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe
Resource
win10-20230831-en
General
-
Target
611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe
-
Size
12.7MB
-
MD5
60255ef7d90a35361e5fe2f5d5514734
-
SHA1
bef1b9033a5e8665da849fb64285601e9da82966
-
SHA256
611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774
-
SHA512
9fc5b5f22d1ace55d8eaf5a3a2b71c771b56d99f057aea5557f648b4063772b999187819ab58883e86933e5cf9d44aa6b59ffddc312686b15a6b477edfe029d5
-
SSDEEP
49152:rlCm9habSnsmzuiuJtiks5bTJguq+Z0A19OO31Fb/n0EZOL/JGm/8sID0n1EY1eT:RrCliIid5nb/n5AM4mD01huEDmlvRrd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2608 ntlhost.exe -
Loads dropped DLL 1 IoCs
pid Process 2152 7z.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 7z.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2996 set thread context of 2152 2996 611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2152 2996 611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe 28 PID 2996 wrote to memory of 2152 2996 611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe 28 PID 2996 wrote to memory of 2152 2996 611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe 28 PID 2996 wrote to memory of 2152 2996 611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe 28 PID 2996 wrote to memory of 2152 2996 611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe 28 PID 2152 wrote to memory of 2608 2152 7z.exe 29 PID 2152 wrote to memory of 2608 2152 7z.exe 29 PID 2152 wrote to memory of 2608 2152 7z.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe"C:\Users\Admin\AppData\Local\Temp\611458b0884686eab54298c7e82e23daaad3a93482def2f42d8d259004e95774.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe3⤵
- Executes dropped EXE
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
842.4MB
MD5c7bda935d6565b5a5516cc17ef3f30f0
SHA1d5504b7a3125bb2d95c4cc1b78c5aed67445877a
SHA25679f682da0c09e7ea593bcb899d6b4ffc0ef3a2740b611b2f2a351334e5480508
SHA51260567d4a589401eca173fbe7522e1fbdb80a2ecd54934bb167bcf729d4e0c15e2e9f4f677c758bf7cb05a7bb1cbab8687d390a54e38b1b5585e888a8c40e5664
-
Filesize
842.4MB
MD5c7bda935d6565b5a5516cc17ef3f30f0
SHA1d5504b7a3125bb2d95c4cc1b78c5aed67445877a
SHA25679f682da0c09e7ea593bcb899d6b4ffc0ef3a2740b611b2f2a351334e5480508
SHA51260567d4a589401eca173fbe7522e1fbdb80a2ecd54934bb167bcf729d4e0c15e2e9f4f677c758bf7cb05a7bb1cbab8687d390a54e38b1b5585e888a8c40e5664