Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 21:30
Behavioral task
behavioral1
Sample
13100333baaabdee89d445b24a573e2a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13100333baaabdee89d445b24a573e2a.exe
Resource
win10v2004-20231222-en
General
-
Target
13100333baaabdee89d445b24a573e2a.exe
-
Size
299KB
-
MD5
13100333baaabdee89d445b24a573e2a
-
SHA1
ec7bfe33db54261af75f7f5019d35991a005b9b1
-
SHA256
bd85ede8432216e38289d4c0b6e077fb0446afc14133957ec2fca6f7054fdf86
-
SHA512
6326d77caa96f17a25c0f4a778ec36cb8cedd932f56bd806e7a99eb322424e8662e27fd65e5b21f598121832a03dfcdc4dfa77429943c07778ea1dd240fed7bf
-
SSDEEP
3072:ZKgOZAFt3ATFb6ftYmQdnlNlQ/D8lVWASNfyvfpWeuTHV9ieT3qWusP4TmnY:wgOZJLvvKSzK63pWBV4eT3/x4TmY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2004 sesdessetri.exe 1416 sesdessetri.exe -
resource yara_rule behavioral2/memory/4056-0-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral2/memory/4056-5-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral2/files/0x0009000000023109-11.dat upx behavioral2/memory/2004-21-0x0000000000400000-0x000000000044D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessetri.exe" 13100333baaabdee89d445b24a573e2a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessetri.exe" 13100333baaabdee89d445b24a573e2a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4056 set thread context of 2152 4056 13100333baaabdee89d445b24a573e2a.exe 90 PID 2004 set thread context of 1416 2004 sesdessetri.exe 93 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4056 13100333baaabdee89d445b24a573e2a.exe 2004 sesdessetri.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4056 wrote to memory of 2152 4056 13100333baaabdee89d445b24a573e2a.exe 90 PID 4056 wrote to memory of 2152 4056 13100333baaabdee89d445b24a573e2a.exe 90 PID 4056 wrote to memory of 2152 4056 13100333baaabdee89d445b24a573e2a.exe 90 PID 4056 wrote to memory of 2152 4056 13100333baaabdee89d445b24a573e2a.exe 90 PID 4056 wrote to memory of 2152 4056 13100333baaabdee89d445b24a573e2a.exe 90 PID 4056 wrote to memory of 2152 4056 13100333baaabdee89d445b24a573e2a.exe 90 PID 4056 wrote to memory of 2152 4056 13100333baaabdee89d445b24a573e2a.exe 90 PID 4056 wrote to memory of 2152 4056 13100333baaabdee89d445b24a573e2a.exe 90 PID 2152 wrote to memory of 2004 2152 13100333baaabdee89d445b24a573e2a.exe 92 PID 2152 wrote to memory of 2004 2152 13100333baaabdee89d445b24a573e2a.exe 92 PID 2152 wrote to memory of 2004 2152 13100333baaabdee89d445b24a573e2a.exe 92 PID 2004 wrote to memory of 1416 2004 sesdessetri.exe 93 PID 2004 wrote to memory of 1416 2004 sesdessetri.exe 93 PID 2004 wrote to memory of 1416 2004 sesdessetri.exe 93 PID 2004 wrote to memory of 1416 2004 sesdessetri.exe 93 PID 2004 wrote to memory of 1416 2004 sesdessetri.exe 93 PID 2004 wrote to memory of 1416 2004 sesdessetri.exe 93 PID 2004 wrote to memory of 1416 2004 sesdessetri.exe 93 PID 2004 wrote to memory of 1416 2004 sesdessetri.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\13100333baaabdee89d445b24a573e2a.exe"C:\Users\Admin\AppData\Local\Temp\13100333baaabdee89d445b24a573e2a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\13100333baaabdee89d445b24a573e2a.exe"C:\Users\Admin\AppData\Local\Temp\13100333baaabdee89d445b24a573e2a.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"4⤵
- Executes dropped EXE
PID:1416
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD513100333baaabdee89d445b24a573e2a
SHA1ec7bfe33db54261af75f7f5019d35991a005b9b1
SHA256bd85ede8432216e38289d4c0b6e077fb0446afc14133957ec2fca6f7054fdf86
SHA5126326d77caa96f17a25c0f4a778ec36cb8cedd932f56bd806e7a99eb322424e8662e27fd65e5b21f598121832a03dfcdc4dfa77429943c07778ea1dd240fed7bf