Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 05:14
Static task
static1
Behavioral task
behavioral1
Sample
fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe
Resource
win10v2004-20230915-en
General
-
Target
fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe
-
Size
3.3MB
-
MD5
51c2df4c151377008a867e9936101485
-
SHA1
6ce54dacd601acf26930864baed50cbe76504037
-
SHA256
fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac
-
SHA512
9f576d81e66f11db5a7e84a52016ee0fd96c8ccba088a586ffec8dd8788be4e8655df994aa0690297aa41b74237a57ee3f412630199de1dca964fee0d5302f70
-
SSDEEP
98304:N2HKwycIFgnZkcOyqxcQDFUg5CBgwjYNTtnpO:nFgEDcfg5CBgbNT/O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2040 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2304 rs1.exe 1884 FTvrst.exe 1496 audidog.exe -
Loads dropped DLL 2 IoCs
pid Process 2304 rs1.exe 2304 rs1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2304 rs1.exe 2304 rs1.exe 2304 rs1.exe 2304 rs1.exe 2304 rs1.exe 2304 rs1.exe 2304 rs1.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\WINDOWS\DNomb\Mpec.mbt rs1.exe File created C:\WINDOWS\DNomb\spolsvt.exe rs1.exe File created C:\WINDOWS\DNomb\FTvrst.exe rs1.exe File opened for modification C:\WINDOWS\DNomb\FTvrst.exe rs1.exe File created C:\WINDOWS\DNomb\audidog.exe rs1.exe File created C:\Windows\DNomb\Mpec.mbt fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe File opened for modification C:\Windows\DNomb\Mpec.mbt fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe File created C:\WINDOWS\Djltp.txt rs1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2816 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 2816 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 2304 rs1.exe 2304 rs1.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2040 2816 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 32 PID 2816 wrote to memory of 2040 2816 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 32 PID 2816 wrote to memory of 2040 2816 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 32 PID 2816 wrote to memory of 2040 2816 fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe 32 PID 2304 wrote to memory of 1884 2304 rs1.exe 36 PID 2304 wrote to memory of 1884 2304 rs1.exe 36 PID 2304 wrote to memory of 1884 2304 rs1.exe 36 PID 2304 wrote to memory of 1884 2304 rs1.exe 36 PID 2304 wrote to memory of 1884 2304 rs1.exe 36 PID 2304 wrote to memory of 1884 2304 rs1.exe 36 PID 2304 wrote to memory of 1884 2304 rs1.exe 36 PID 2304 wrote to memory of 1496 2304 rs1.exe 37 PID 2304 wrote to memory of 1496 2304 rs1.exe 37 PID 2304 wrote to memory of 1496 2304 rs1.exe 37 PID 2304 wrote to memory of 1496 2304 rs1.exe 37 PID 2304 wrote to memory of 1496 2304 rs1.exe 37 PID 2304 wrote to memory of 1496 2304 rs1.exe 37 PID 2304 wrote to memory of 1496 2304 rs1.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe"C:\Users\Admin\AppData\Local\Temp\fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.execmd.exe /c del fa0943feb5cc47c89fbbf1a30ba8f196610c6f562741cde6b8b9f0a19f8c74ac.exe2⤵
- Deletes itself
PID:2040
-
-
C:\Users\Public\Documents\123\rs1.exe"C:\Users\Public\Documents\123\rs1.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\WINDOWS\DNomb\FTvrst.exeC:\WINDOWS\DNomb\FTvrst.exe2⤵
- Executes dropped EXE
PID:1884
-
-
C:\WINDOWS\DNomb\audidog.exeC:\WINDOWS\DNomb\audidog.exe2⤵
- Executes dropped EXE
PID:1496
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14
-
Filesize
2.2MB
MD53a9c682b077bc044b21131216bdf6304
SHA1afdd419f084b56838c7eb07ff2b28ff9b960e27e
SHA2568beaa45a7ca8a10127ed2e359be90f856a4ac0b87ed31e57a59aadc58ad94cc8
SHA51299a2d2ce97a50791ddac4caa359bc335e404ad4f1ec3bdc5e3df6917e9c6eceba2d7c821eb0728e9d0989df1d021625db7ab962c1ebf705f8770090501d64b14