Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
3ece075dc97570eab680b3e9b9a7e0ea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ece075dc97570eab680b3e9b9a7e0ea.exe
Resource
win10v2004-20231215-en
General
-
Target
3ece075dc97570eab680b3e9b9a7e0ea.exe
-
Size
335KB
-
MD5
3ece075dc97570eab680b3e9b9a7e0ea
-
SHA1
746e8669ee598005be80e8f191c60780d03deff7
-
SHA256
12fafc52c5d67e9ce5913b2fe010b5f0a8333d660d2f9b151e7a625f4444c407
-
SHA512
ff5273a60dcb57d7af0ffc6eb2232e447673e3c0e67a02650f54eb5ebb40f6f0d15a5150dd55652975ec568d6703f5ca52b170b8e2d55837b8d82918eb5bca4e
-
SSDEEP
6144:NtKe6YiDdv3m3mgKHIl7bNIAROzTua3Wx3uz5ffDk8wW7L3J4XIIe6VN:NtKe6Zv23YdAPaieF3Dk8T7JODD
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msnlx32.exe" 3ece075dc97570eab680b3e9b9a7e0ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msnlx32.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983} 3ece075dc97570eab680b3e9b9a7e0ea.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 svchost.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 3ece075dc97570eab680b3e9b9a7e0ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 3ece075dc97570eab680b3e9b9a7e0ea.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 3ece075dc97570eab680b3e9b9a7e0ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\vcl32.exe 3ece075dc97570eab680b3e9b9a7e0ea.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe 3ece075dc97570eab680b3e9b9a7e0ea.exe File created C:\Windows\SysWOW64\msnlx32.exe 3ece075dc97570eab680b3e9b9a7e0ea.exe File opened for modification C:\Windows\SysWOW64\msnlx32.exe 3ece075dc97570eab680b3e9b9a7e0ea.exe File created C:\Windows\SysWOW64\concp32.exe 3ece075dc97570eab680b3e9b9a7e0ea.exe File opened for modification C:\Windows\SysWOW64\concp32.exe 3ece075dc97570eab680b3e9b9a7e0ea.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 3ece075dc97570eab680b3e9b9a7e0ea.exe File opened for modification C:\Windows\svchost.exe 3ece075dc97570eab680b3e9b9a7e0ea.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983}\sm = ebb5525fa3bcf9422c8ff945977d6af9 3ece075dc97570eab680b3e9b9a7e0ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 3ece075dc97570eab680b3e9b9a7e0ea.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983} 3ece075dc97570eab680b3e9b9a7e0ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 3ece075dc97570eab680b3e9b9a7e0ea.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983}\ax = 1f6c88ae601032b24b2a22029fa71b79 3ece075dc97570eab680b3e9b9a7e0ea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B5E50B17-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1880 3ece075dc97570eab680b3e9b9a7e0ea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 3000 1880 3ece075dc97570eab680b3e9b9a7e0ea.exe 28 PID 1880 wrote to memory of 3000 1880 3ece075dc97570eab680b3e9b9a7e0ea.exe 28 PID 1880 wrote to memory of 3000 1880 3ece075dc97570eab680b3e9b9a7e0ea.exe 28 PID 1880 wrote to memory of 3000 1880 3ece075dc97570eab680b3e9b9a7e0ea.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ece075dc97570eab680b3e9b9a7e0ea.exe"C:\Users\Admin\AppData\Local\Temp\3ece075dc97570eab680b3e9b9a7e0ea.exe"1⤵
- Modifies Installed Components in the registry
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342KB
MD5dd86a77b3bc020775702c5a4c48a55a4
SHA100ff287ac5e67547bbfbfc1c788928178a8296f3
SHA256ba163f1e69982289f537513610719e8d88ac01da2cb7be4c4142966f8270cdae
SHA512832d2b28a85d41c3c1d79023ffd509b1cadf4485648e322b92e5f0d943d43d85b127abf7abac7d24434e6630ef920b40c8240a3c3853fa5fd55025bd59c54288
-
Filesize
336KB
MD5bf34ccb4c8b68b05552150cd17673246
SHA18a9ea00037a0fa16955d21f5e187016c2f5c5836
SHA2564b0b75916ed0d99a87e99e16e45eab83961e1acd8f728d9b5017ae0422ddf1ca
SHA51296277e3af6798e5ac96c07e48bb765bc6d762ab4de618431c4847a3de569ef9cad85045dd5ef4dbaea13c29f92cb495807d85af64a07f10702697c2875f1fbde