Analysis
-
max time kernel
147s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
0e01a6648f78a37f64bb0ab5ed976ce1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e01a6648f78a37f64bb0ab5ed976ce1.exe
Resource
win10v2004-20231215-en
General
-
Target
0e01a6648f78a37f64bb0ab5ed976ce1.exe
-
Size
169KB
-
MD5
0e01a6648f78a37f64bb0ab5ed976ce1
-
SHA1
7246c29cd949546e6f15a34240a56a6bc3f20e5f
-
SHA256
bdce362be366fe694bd0f5ef2d6a0dbaf4f9547cf7705e4d7c28a1e54253e91b
-
SHA512
d454f1dbf92751078a99cbc83c9008a6f9f8aba315809d55b4039da22a5fab5849490c4dd9d1bbf0d3684983eff317609a7de6a7adfeac5657d519751138acd9
-
SSDEEP
3072:S2umbx/y8x/9Kv7WsyNk8hWYrYtTZhhEktIQL8Hk8ySaMoBtNG:3BbI8x/9KvDJcuThTOQL8EzS1o
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2724 svchost.exe 3060 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 1620 0e01a6648f78a37f64bb0ab5ed976ce1.exe 1620 0e01a6648f78a37f64bb0ab5ed976ce1.exe 2724 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 816 set thread context of 1620 816 0e01a6648f78a37f64bb0ab5ed976ce1.exe 28 PID 2724 set thread context of 3060 2724 svchost.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 816 wrote to memory of 1620 816 0e01a6648f78a37f64bb0ab5ed976ce1.exe 28 PID 816 wrote to memory of 1620 816 0e01a6648f78a37f64bb0ab5ed976ce1.exe 28 PID 816 wrote to memory of 1620 816 0e01a6648f78a37f64bb0ab5ed976ce1.exe 28 PID 816 wrote to memory of 1620 816 0e01a6648f78a37f64bb0ab5ed976ce1.exe 28 PID 816 wrote to memory of 1620 816 0e01a6648f78a37f64bb0ab5ed976ce1.exe 28 PID 816 wrote to memory of 1620 816 0e01a6648f78a37f64bb0ab5ed976ce1.exe 28 PID 1620 wrote to memory of 2724 1620 0e01a6648f78a37f64bb0ab5ed976ce1.exe 29 PID 1620 wrote to memory of 2724 1620 0e01a6648f78a37f64bb0ab5ed976ce1.exe 29 PID 1620 wrote to memory of 2724 1620 0e01a6648f78a37f64bb0ab5ed976ce1.exe 29 PID 1620 wrote to memory of 2724 1620 0e01a6648f78a37f64bb0ab5ed976ce1.exe 29 PID 2724 wrote to memory of 3060 2724 svchost.exe 30 PID 2724 wrote to memory of 3060 2724 svchost.exe 30 PID 2724 wrote to memory of 3060 2724 svchost.exe 30 PID 2724 wrote to memory of 3060 2724 svchost.exe 30 PID 2724 wrote to memory of 3060 2724 svchost.exe 30 PID 2724 wrote to memory of 3060 2724 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e01a6648f78a37f64bb0ab5ed976ce1.exe"C:\Users\Admin\AppData\Local\Temp\0e01a6648f78a37f64bb0ab5ed976ce1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\0e01a6648f78a37f64bb0ab5ed976ce1.exe"C:\Users\Admin\AppData\Local\Temp\0e01a6648f78a37f64bb0ab5ed976ce1.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3060
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD50e01a6648f78a37f64bb0ab5ed976ce1
SHA17246c29cd949546e6f15a34240a56a6bc3f20e5f
SHA256bdce362be366fe694bd0f5ef2d6a0dbaf4f9547cf7705e4d7c28a1e54253e91b
SHA512d454f1dbf92751078a99cbc83c9008a6f9f8aba315809d55b4039da22a5fab5849490c4dd9d1bbf0d3684983eff317609a7de6a7adfeac5657d519751138acd9