Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 21:30
Behavioral task
behavioral1
Sample
13100333baaabdee89d445b24a573e2a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13100333baaabdee89d445b24a573e2a.exe
Resource
win10v2004-20231222-en
General
-
Target
13100333baaabdee89d445b24a573e2a.exe
-
Size
299KB
-
MD5
13100333baaabdee89d445b24a573e2a
-
SHA1
ec7bfe33db54261af75f7f5019d35991a005b9b1
-
SHA256
bd85ede8432216e38289d4c0b6e077fb0446afc14133957ec2fca6f7054fdf86
-
SHA512
6326d77caa96f17a25c0f4a778ec36cb8cedd932f56bd806e7a99eb322424e8662e27fd65e5b21f598121832a03dfcdc4dfa77429943c07778ea1dd240fed7bf
-
SSDEEP
3072:ZKgOZAFt3ATFb6ftYmQdnlNlQ/D8lVWASNfyvfpWeuTHV9ieT3qWusP4TmnY:wgOZJLvvKSzK63pWBV4eT3/x4TmY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1692 sesdessetri.exe 2388 sesdessetri.exe -
Loads dropped DLL 3 IoCs
pid Process 1188 13100333baaabdee89d445b24a573e2a.exe 1188 13100333baaabdee89d445b24a573e2a.exe 1692 sesdessetri.exe -
resource yara_rule behavioral1/memory/1412-0-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1412-10-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/files/0x000c000000014fdd-15.dat upx behavioral1/memory/1692-21-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1692-35-0x0000000000400000-0x000000000044D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessetri.exe" 13100333baaabdee89d445b24a573e2a.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessetri.exe" 13100333baaabdee89d445b24a573e2a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1412 set thread context of 1188 1412 13100333baaabdee89d445b24a573e2a.exe 28 PID 1692 set thread context of 2388 1692 sesdessetri.exe 30 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1412 13100333baaabdee89d445b24a573e2a.exe 1692 sesdessetri.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1188 1412 13100333baaabdee89d445b24a573e2a.exe 28 PID 1412 wrote to memory of 1188 1412 13100333baaabdee89d445b24a573e2a.exe 28 PID 1412 wrote to memory of 1188 1412 13100333baaabdee89d445b24a573e2a.exe 28 PID 1412 wrote to memory of 1188 1412 13100333baaabdee89d445b24a573e2a.exe 28 PID 1412 wrote to memory of 1188 1412 13100333baaabdee89d445b24a573e2a.exe 28 PID 1412 wrote to memory of 1188 1412 13100333baaabdee89d445b24a573e2a.exe 28 PID 1412 wrote to memory of 1188 1412 13100333baaabdee89d445b24a573e2a.exe 28 PID 1412 wrote to memory of 1188 1412 13100333baaabdee89d445b24a573e2a.exe 28 PID 1412 wrote to memory of 1188 1412 13100333baaabdee89d445b24a573e2a.exe 28 PID 1188 wrote to memory of 1692 1188 13100333baaabdee89d445b24a573e2a.exe 29 PID 1188 wrote to memory of 1692 1188 13100333baaabdee89d445b24a573e2a.exe 29 PID 1188 wrote to memory of 1692 1188 13100333baaabdee89d445b24a573e2a.exe 29 PID 1188 wrote to memory of 1692 1188 13100333baaabdee89d445b24a573e2a.exe 29 PID 1692 wrote to memory of 2388 1692 sesdessetri.exe 30 PID 1692 wrote to memory of 2388 1692 sesdessetri.exe 30 PID 1692 wrote to memory of 2388 1692 sesdessetri.exe 30 PID 1692 wrote to memory of 2388 1692 sesdessetri.exe 30 PID 1692 wrote to memory of 2388 1692 sesdessetri.exe 30 PID 1692 wrote to memory of 2388 1692 sesdessetri.exe 30 PID 1692 wrote to memory of 2388 1692 sesdessetri.exe 30 PID 1692 wrote to memory of 2388 1692 sesdessetri.exe 30 PID 1692 wrote to memory of 2388 1692 sesdessetri.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\13100333baaabdee89d445b24a573e2a.exe"C:\Users\Admin\AppData\Local\Temp\13100333baaabdee89d445b24a573e2a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\13100333baaabdee89d445b24a573e2a.exe"C:\Users\Admin\AppData\Local\Temp\13100333baaabdee89d445b24a573e2a.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"4⤵
- Executes dropped EXE
PID:2388
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD513100333baaabdee89d445b24a573e2a
SHA1ec7bfe33db54261af75f7f5019d35991a005b9b1
SHA256bd85ede8432216e38289d4c0b6e077fb0446afc14133957ec2fca6f7054fdf86
SHA5126326d77caa96f17a25c0f4a778ec36cb8cedd932f56bd806e7a99eb322424e8662e27fd65e5b21f598121832a03dfcdc4dfa77429943c07778ea1dd240fed7bf