Analysis
-
max time kernel
186s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 07:32
Static task
static1
Behavioral task
behavioral1
Sample
2E55708A4D3F97B3131EE5ADF5C05EFA.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2E55708A4D3F97B3131EE5ADF5C05EFA.exe
Resource
win10v2004-20231023-en
General
-
Target
2E55708A4D3F97B3131EE5ADF5C05EFA.exe
-
Size
68KB
-
MD5
2e55708a4d3f97b3131ee5adf5c05efa
-
SHA1
fe58bb9f710c983ecc5b30f653b8ef4ed71311de
-
SHA256
00720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
-
SHA512
725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e
-
SSDEEP
384:XFLkkmlPu9GtKHK3Qh2Klokrb/8Lz53/Afiylab4i7TOTU0lOKV4n6MO:XJLmlmGtKHKtK6krYLVvAfzlY7TOvvG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 796 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ˮӡ±êǩϵͳ.lnk resvr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ˮӡ±êǩϵͳ.lnk 2E55708A4D3F97B3131EE5ADF5C05EFA.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 resvr.exe -
Loads dropped DLL 3 IoCs
pid Process 2200 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 2200 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 2700 resvr.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe 2E55708A4D3F97B3131EE5ADF5C05EFA.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe 2E55708A4D3F97B3131EE5ADF5C05EFA.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Index.dat resvr.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Index.dat 2E55708A4D3F97B3131EE5ADF5C05EFA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2700 2200 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 29 PID 2200 wrote to memory of 2700 2200 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 29 PID 2200 wrote to memory of 2700 2200 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 29 PID 2200 wrote to memory of 2700 2200 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 29 PID 2200 wrote to memory of 796 2200 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 30 PID 2200 wrote to memory of 796 2200 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 30 PID 2200 wrote to memory of 796 2200 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 30 PID 2200 wrote to memory of 796 2200 2E55708A4D3F97B3131EE5ADF5C05EFA.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2E55708A4D3F97B3131EE5ADF5C05EFA.exe"C:\Users\Admin\AppData\Local\Temp\2E55708A4D3F97B3131EE5ADF5C05EFA.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\resvr.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:2700
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\X.bat" "2⤵
- Deletes itself
PID:796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD52e55708a4d3f97b3131ee5adf5c05efa
SHA1fe58bb9f710c983ecc5b30f653b8ef4ed71311de
SHA25600720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
SHA512725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e
-
Filesize
68KB
MD52e55708a4d3f97b3131ee5adf5c05efa
SHA1fe58bb9f710c983ecc5b30f653b8ef4ed71311de
SHA25600720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
SHA512725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e
-
Filesize
68KB
MD52e55708a4d3f97b3131ee5adf5c05efa
SHA1fe58bb9f710c983ecc5b30f653b8ef4ed71311de
SHA25600720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
SHA512725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e
-
Filesize
210B
MD5f0f173c12a641c2aaf750095e28b1ac7
SHA1ae9b4765701b55dab44804a972eead916cec514a
SHA256d4a3585fa7b212c2c4df3ed66b6711f125606516dba9bdadf7efceea0d278c1e
SHA512ae1d6606da83ec9308c5be069896e2a05ff933bd85d529cc252bfbd042f42349e5a1d52e1e58f409a1a8d46550ee283f8bbef128227ac664b726389f09ed16f8
-
Filesize
210B
MD5f0f173c12a641c2aaf750095e28b1ac7
SHA1ae9b4765701b55dab44804a972eead916cec514a
SHA256d4a3585fa7b212c2c4df3ed66b6711f125606516dba9bdadf7efceea0d278c1e
SHA512ae1d6606da83ec9308c5be069896e2a05ff933bd85d529cc252bfbd042f42349e5a1d52e1e58f409a1a8d46550ee283f8bbef128227ac664b726389f09ed16f8
-
Filesize
2KB
MD57550bdee285133ce6fc670e23cd10c58
SHA1692b4843b020a2a760cf039de8d9477df87f73a1
SHA25610833898ea410a9e8886977f6768b3fb94ae358475c9501f86f488dcaf540d55
SHA5125bed3baa3d34a9e927bbd512074ad538e0b4bc6590d9696434986127e5da56ac19b35f4a1f423b034dbac58aba1546510210906bb17e333e964a02da9b051ab8
-
Filesize
68KB
MD52e55708a4d3f97b3131ee5adf5c05efa
SHA1fe58bb9f710c983ecc5b30f653b8ef4ed71311de
SHA25600720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
SHA512725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e
-
Filesize
68KB
MD52e55708a4d3f97b3131ee5adf5c05efa
SHA1fe58bb9f710c983ecc5b30f653b8ef4ed71311de
SHA25600720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
SHA512725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e
-
Filesize
68KB
MD52e55708a4d3f97b3131ee5adf5c05efa
SHA1fe58bb9f710c983ecc5b30f653b8ef4ed71311de
SHA25600720cc98eefb3d9f03600abfd3ebe6bc923a4f920d3990e121a957c4f090b93
SHA512725d442eda167f3f4cff41b5039201a4d718fd14013f2b13bd3b156f221f2a3e3c5c8806dcc1a5734e292c3904d3d863803f29330cffd562adead3bbbcd3fe7e