Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 10:34
Static task
static1
Behavioral task
behavioral1
Sample
0835d81542acc50b9579f99eca83a64d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0835d81542acc50b9579f99eca83a64d.exe
Resource
win10v2004-20231215-en
General
-
Target
0835d81542acc50b9579f99eca83a64d.exe
-
Size
430KB
-
MD5
0835d81542acc50b9579f99eca83a64d
-
SHA1
fc30d49e99f4be296d0feac5ef25bd3967b8161f
-
SHA256
ad2526deb219d4c2707553763eb672e5839b685434e2970c93bfe6551d43e18a
-
SHA512
f6f602009ddbd2b65ac69d6a05dd47167f96076f2cfcd3c87cd0951169be483bbda1848aa719a2f23c6de708e649665c5a5b0227edd71c4c5acfc4562efa1e63
-
SSDEEP
12288:ibee0PGl89WazvzkmMxM+ltxQMAn0Iv1b70ZSf2R:2edGBazvZMHltxtIv1bUS+R
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Winder.lnk 0835d81542acc50b9579f99eca83a64d.exe -
Loads dropped DLL 1 IoCs
pid Process 1992 0835d81542acc50b9579f99eca83a64d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\0835d81542acc50b9579f99eca83a64d.exe = "C:\\System32\\0835d81542acc50b9579f99eca83a64d.exe" 0835d81542acc50b9579f99eca83a64d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1992 0835d81542acc50b9579f99eca83a64d.exe 1992 0835d81542acc50b9579f99eca83a64d.exe 1992 0835d81542acc50b9579f99eca83a64d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1992 0835d81542acc50b9579f99eca83a64d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1992 0835d81542acc50b9579f99eca83a64d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1992 0835d81542acc50b9579f99eca83a64d.exe 1992 0835d81542acc50b9579f99eca83a64d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2736 1992 0835d81542acc50b9579f99eca83a64d.exe 2 PID 1992 wrote to memory of 2736 1992 0835d81542acc50b9579f99eca83a64d.exe 2 PID 1992 wrote to memory of 2736 1992 0835d81542acc50b9579f99eca83a64d.exe 2 PID 1992 wrote to memory of 2736 1992 0835d81542acc50b9579f99eca83a64d.exe 2
Processes
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"1⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\0835d81542acc50b9579f99eca83a64d.exe"C:\Users\Admin\AppData\Local\Temp\0835d81542acc50b9579f99eca83a64d.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653B
MD5f565653bd58d3b14e359cb2b9f25f2a3
SHA1467bb42be48f0fc6890e53511e7250da2bd28d3c
SHA25630249448fb3f49277c0e3a57ac012b261f47aec0e16a064acbc2ab9bb7093009
SHA512daf4196839ce22781a90e6eb8dff8739aa0c5dae8b9c04710f95b459ef0b6ceabd0c806a33defee7a43d589dd1fb79a75b1c8bde64bbf9c4302223a2626fd9fe
-
Filesize
430KB
MD5936ac0b8ff6239fa6f9de4e9fd7a9744
SHA1f559fdb5728a3d13df3fa8c75997042f6b841f4c
SHA256cdb6a6b41541677b5e8a4f325d88e35c10e7fbe64abc15bfe4525b95b8d36247
SHA5127bd7ccb17001862d8f19991601ecdf75684b824bb3c18f4bf063f0c25a09d48c02e8147b7307ec5a5743d6dc968d85115460bfc5dd47ff228319b3e084df5af9