Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 21:31
Behavioral task
behavioral1
Sample
3d9353a4ff2fe5706557b3697c78da6b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d9353a4ff2fe5706557b3697c78da6b.exe
Resource
win10v2004-20231215-en
General
-
Target
3d9353a4ff2fe5706557b3697c78da6b.exe
-
Size
150KB
-
MD5
3d9353a4ff2fe5706557b3697c78da6b
-
SHA1
4bea3f7b8aee3ca521bac17b5310f8ac36640c89
-
SHA256
27c4a4b2d9ec06ee1ba4561a7f40afd73f2355c04ffc70f93f76a14bca83995b
-
SHA512
3ea64fe07c12f9d722ed29fdf4450307393984a4ef834ddb91c1d19590332ee75e931e6c02988ac69096a4059d0bf40ce68be3589779569aa3a0dba438c4b000
-
SSDEEP
3072:L53L2qq0Z8k93xF26rBSPoV+gRh8BqelFW6++0vvOTYsSNwR9q5F:ZLHq0Z8k92iBSPoV+gRh8celb++0vvOy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1636 Aa6XwC.pif -
resource yara_rule behavioral2/memory/2232-0-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/files/0x0006000000023204-7.dat upx behavioral2/memory/2232-12-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/1636-13-0x0000000000400000-0x0000000000458000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Afd3CChZj = "\"C:\\Users\\Admin\\AppData\\Roaming\\Aa6XwC.pif\"" 3d9353a4ff2fe5706557b3697c78da6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ntjh20qQk = "\"C:\\Users\\Admin\\AppData\\Roaming\\Aa6XwC.pif\"" Aa6XwC.pif Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CxW9sAiO = "\"C:\\Users\\Admin\\AppData\\Roaming\\Aa6XwC.pif\"" Aa6XwC.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\j5msHr = "\"C:\\Users\\Admin\\AppData\\Roaming\\Aa6XwC.pif\"" 3d9353a4ff2fe5706557b3697c78da6b.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\win.com 3d9353a4ff2fe5706557b3697c78da6b.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 2232 3d9353a4ff2fe5706557b3697c78da6b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 1636 Aa6XwC.pif -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1636 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 91 PID 2232 wrote to memory of 1636 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 91 PID 2232 wrote to memory of 1636 2232 3d9353a4ff2fe5706557b3697c78da6b.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d9353a4ff2fe5706557b3697c78da6b.exe"C:\Users\Admin\AppData\Local\Temp\3d9353a4ff2fe5706557b3697c78da6b.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Roaming\Aa6XwC.pifC:\Users\Admin\AppData\Roaming\Aa6XwC.pif2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD53d9353a4ff2fe5706557b3697c78da6b
SHA14bea3f7b8aee3ca521bac17b5310f8ac36640c89
SHA25627c4a4b2d9ec06ee1ba4561a7f40afd73f2355c04ffc70f93f76a14bca83995b
SHA5123ea64fe07c12f9d722ed29fdf4450307393984a4ef834ddb91c1d19590332ee75e931e6c02988ac69096a4059d0bf40ce68be3589779569aa3a0dba438c4b000