Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 18:05
Static task
static1
Behavioral task
behavioral1
Sample
0a7a91ade6fa57c67a7df54346b10971.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a7a91ade6fa57c67a7df54346b10971.exe
Resource
win10v2004-20231215-en
General
-
Target
0a7a91ade6fa57c67a7df54346b10971.exe
-
Size
35KB
-
MD5
0a7a91ade6fa57c67a7df54346b10971
-
SHA1
979eeddfbc338dfd54a93eac77b4c59ff596d4ba
-
SHA256
d3ac708974ec99753286e4b5b8dcd6f31d36726b7c106d5090639d43153a953d
-
SHA512
1d61eccb7c4f68a90c3f5e300d31c62442b04964105a36bdec347d8a199be84bcdb2e5b4120b384a717ebf958449b1914c1dbf12d44e06326af5c1ca0e8513be
-
SSDEEP
768:vEbZ5Yq8fQ7DWze2Lo3JwwwPZhVmSpfW0g0r:vv+KzrL/w2Z2SpfW0g
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 316 syscfg32.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\syscfg32.exe 0a7a91ade6fa57c67a7df54346b10971.exe File created C:\Windows\SysWOW64\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe 0a7a91ade6fa57c67a7df54346b10971.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe File created C:\Windows\SysWOW64\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe\syscfg32.exe syscfg32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4696 0a7a91ade6fa57c67a7df54346b10971.exe 4696 0a7a91ade6fa57c67a7df54346b10971.exe 316 syscfg32.exe 316 syscfg32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4696 wrote to memory of 316 4696 0a7a91ade6fa57c67a7df54346b10971.exe 51 PID 4696 wrote to memory of 316 4696 0a7a91ade6fa57c67a7df54346b10971.exe 51 PID 4696 wrote to memory of 316 4696 0a7a91ade6fa57c67a7df54346b10971.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a7a91ade6fa57c67a7df54346b10971.exe"C:\Users\Admin\AppData\Local\Temp\0a7a91ade6fa57c67a7df54346b10971.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\syscfg32.exeC:\Windows\system32\syscfg32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD50a7a91ade6fa57c67a7df54346b10971
SHA1979eeddfbc338dfd54a93eac77b4c59ff596d4ba
SHA256d3ac708974ec99753286e4b5b8dcd6f31d36726b7c106d5090639d43153a953d
SHA5121d61eccb7c4f68a90c3f5e300d31c62442b04964105a36bdec347d8a199be84bcdb2e5b4120b384a717ebf958449b1914c1dbf12d44e06326af5c1ca0e8513be