Analysis
-
max time kernel
159s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 01:26
Static task
static1
Behavioral task
behavioral1
Sample
20571ee9c9d1300f6716bdb39ca79505.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20571ee9c9d1300f6716bdb39ca79505.exe
Resource
win10v2004-20231215-en
General
-
Target
20571ee9c9d1300f6716bdb39ca79505.exe
-
Size
95KB
-
MD5
20571ee9c9d1300f6716bdb39ca79505
-
SHA1
8258d260809ca4ac7d06f70f5b603088afcc82d5
-
SHA256
c2558ec4c4caef28d6f6d2441ee9ee99aa1acbfd8d8699db40df3cd647fbb434
-
SHA512
4af614ee56c5b2b8de6bf9e31e4a7feadce30b414a1e5e76aceaf55bd89ff920d53d2b411e44655157c23faee0af7a452e848806c0bcfac9c0c098b630d7f37a
-
SSDEEP
1536:h0q5sUQpTQJP6FBe/R6Gq86jRlMCLMA04UQDLqqvh/GrxlX7+Kkr9cVz9NlTQyEq:rsUETQHRPq8aR6CLn0hQfqQ9GrxlX7kQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:/windows/services.exe" regedit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\xxxx.bat 20571ee9c9d1300f6716bdb39ca79505.exe File created C:\windows\services.exe 20571ee9c9d1300f6716bdb39ca79505.exe File created C:\windows\update.exe 20571ee9c9d1300f6716bdb39ca79505.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 2708 regedit.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2760 1048 20571ee9c9d1300f6716bdb39ca79505.exe 29 PID 1048 wrote to memory of 2760 1048 20571ee9c9d1300f6716bdb39ca79505.exe 29 PID 1048 wrote to memory of 2760 1048 20571ee9c9d1300f6716bdb39ca79505.exe 29 PID 1048 wrote to memory of 2760 1048 20571ee9c9d1300f6716bdb39ca79505.exe 29 PID 2760 wrote to memory of 2708 2760 cmd.exe 32 PID 2760 wrote to memory of 2708 2760 cmd.exe 32 PID 2760 wrote to memory of 2708 2760 cmd.exe 32 PID 2760 wrote to memory of 2708 2760 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\20571ee9c9d1300f6716bdb39ca79505.exe"C:\Users\Admin\AppData\Local\Temp\20571ee9c9d1300f6716bdb39ca79505.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\xxxx.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S temp.reg3⤵
- Modifies WinLogon for persistence
- Runs .reg file with regedit
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
22KB
MD5f8f474e11c507c7ad2f23b0fd0772a09
SHA1edd4a165e6b1caf9c92139a333446758b8598dae
SHA256ef29742385cf7bcbac185e99127e20080681ce105cdb91554712ffe1e83e14df
SHA512f04d0e1f25602e6927f8514203d80cb5e92a8b4c090dc99cdb74072e8f6748ed3c6bdcfb3bff301096725e1e75a5ff39832daf652014e9e9636750c7591f452d
-
Filesize
138B
MD513a0a82b2985f477c8857184e7ba7407
SHA1dfd8ef76f62a22d665ce0f0b5ebc34a0cacf96fb
SHA256255cf0cc80522477f8d3d2df3c106780e4a20f236bd159f2edfc3fb3d45f8320
SHA5125a904d9e57f54cd3517476c73a000109f99d3549aae73c516a8565ed27942d29fd5d7a4bd8c83c86358bb414d0e90e4e847459c3dafbd51ab2982c7898c07b71
-
Filesize
483B
MD560ff372e394f7e60959f05f811c853c5
SHA1ce697c552c71316e436b1cd592775ef894b9bf96
SHA25646138a9f4b119b1074542cbc6fbd349c959b161474eb67dddf98fec8473c84a1
SHA51269fc2b809e26e3da17f7256b5848fb1b21bfcdde002236964a3a7c5b9c2a1df1509a26f24042d2ed076f1e6e33060ff751fa45d04f9efd907e7e7f389e06cfa1
-
Filesize
280B
MD5ad0e5d3841e7186a0a8824a56efb5fca
SHA1b726c2b6c9d9af86b7e46fae07e1c65871dac30b
SHA256273787f6ff89e76a22d825048458c5aac17d9fa1871b8ad43cbb1e28f0a1c5db
SHA512b0989b1fecf37bdd3b6b0e4ea6d7bf8bd0edbb225ec8e7a68c1e81277becbf00368a99a3f37ebcfb105c4e428d195a18348fe7f46bb7faf360fe79fcdb05c331