Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 16:51
Behavioral task
behavioral1
Sample
06a6919d404c12c2dae0025041f2ceb7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
06a6919d404c12c2dae0025041f2ceb7.exe
Resource
win10v2004-20231215-en
General
-
Target
06a6919d404c12c2dae0025041f2ceb7.exe
-
Size
1.1MB
-
MD5
06a6919d404c12c2dae0025041f2ceb7
-
SHA1
17c1c16968cb6d8962107f51d1e4ae1b3b6fb794
-
SHA256
16c7f764908b929249b5d18e00cf68121d84c8b9c29e805b3a91904e1b39d508
-
SHA512
711dde2ad4a6c0ea125eeef1458dd6897620142e18ec8d9cda159323480405f55d853c8cadd1ac0b0e2fac746d119d39f1f6bd7b210e095d500285a113ea79fa
-
SSDEEP
12288:rbpHYUKy5U1bo9t8DMRSW9vbciUiLuAvOxMt11i27QitjrNNHANE:r5sJo6YrFUiyAak11LtjrNL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2984 svchest000.exe -
resource yara_rule behavioral1/memory/2968-0-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral1/files/0x000a000000015f7a-9.dat upx behavioral1/memory/2984-10-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral1/memory/2984-14-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral1/memory/2984-11-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral1/files/0x000a000000015f7a-7.dat upx behavioral1/memory/2968-1-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral1/memory/2968-15-0x0000000000400000-0x0000000000597000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\06a6919d404c12c2dae0025041f2ceb7.exe" 06a6919d404c12c2dae0025041f2ceb7.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2968 06a6919d404c12c2dae0025041f2ceb7.exe 2984 svchest000.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 06a6919d404c12c2dae0025041f2ceb7.exe File opened for modification \??\c:\Windows\BJ.exe 06a6919d404c12c2dae0025041f2ceb7.exe File created \??\c:\Windows\svchest000.exe 06a6919d404c12c2dae0025041f2ceb7.exe File opened for modification \??\c:\Windows\svchest000.exe 06a6919d404c12c2dae0025041f2ceb7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2984 2968 06a6919d404c12c2dae0025041f2ceb7.exe 16 PID 2968 wrote to memory of 2984 2968 06a6919d404c12c2dae0025041f2ceb7.exe 16 PID 2968 wrote to memory of 2984 2968 06a6919d404c12c2dae0025041f2ceb7.exe 16 PID 2968 wrote to memory of 2984 2968 06a6919d404c12c2dae0025041f2ceb7.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\06a6919d404c12c2dae0025041f2ceb7.exe"C:\Users\Admin\AppData\Local\Temp\06a6919d404c12c2dae0025041f2ceb7.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\Windows\svchest000.exec:\Windows\svchest000.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d44b0f690b7a6d07d6e28d621a067e28
SHA1f1dd0c9ed41ef43d54206e4e37d24c6f8808b038
SHA256c3d5d74412d237def9c3b5a103ac3782499f0490f7d391a6a5055c61a65ff2fa
SHA512908d450eb7d7e0e9f1fddfacafe40805307edcbdfa395415e55eaf233311759063f4dc2b976b234948dc93848331fac74b72745a1ef1b2456d17dcc46542190d