Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
131526a4f83609a01c47bbc3bafe8e8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
131526a4f83609a01c47bbc3bafe8e8b.exe
Resource
win10v2004-20231222-en
General
-
Target
131526a4f83609a01c47bbc3bafe8e8b.exe
-
Size
290KB
-
MD5
131526a4f83609a01c47bbc3bafe8e8b
-
SHA1
85591cfb0dfc86d0162b75dc5ace18a3c1bf350c
-
SHA256
d00c39d37b3f94d601182a49ea9ca8bf014af569f8da87510152af5bad4ea3f6
-
SHA512
7a472f489432987ac8efcd49ad36c4c138060af45a3cd34f5f320617859274fcb1992d2ed54fbebee23e2074eacef80e4e7bdaac94a8a66d40549a4cebb27735
-
SSDEEP
6144:i4mQH55dt3X7HOThSLBFZkjjJNGsyriSiAVEkE6cJHCco1:i4nX7HOmajlksyrlCkpcpC
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1444 131526a4f83609a01c47bbc3bafe8e8b.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 131526a4f83609a01c47bbc3bafe8e8b.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 131526a4f83609a01c47bbc3bafe8e8b.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1444 131526a4f83609a01c47bbc3bafe8e8b.exe 1444 131526a4f83609a01c47bbc3bafe8e8b.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe 2792 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1444 131526a4f83609a01c47bbc3bafe8e8b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2792 1444 131526a4f83609a01c47bbc3bafe8e8b.exe 28 PID 1444 wrote to memory of 2792 1444 131526a4f83609a01c47bbc3bafe8e8b.exe 28 PID 1444 wrote to memory of 2792 1444 131526a4f83609a01c47bbc3bafe8e8b.exe 28 PID 1444 wrote to memory of 2792 1444 131526a4f83609a01c47bbc3bafe8e8b.exe 28 PID 1444 wrote to memory of 2792 1444 131526a4f83609a01c47bbc3bafe8e8b.exe 28 PID 1444 wrote to memory of 2792 1444 131526a4f83609a01c47bbc3bafe8e8b.exe 28 PID 1444 wrote to memory of 2792 1444 131526a4f83609a01c47bbc3bafe8e8b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\131526a4f83609a01c47bbc3bafe8e8b.exe"C:\Users\Admin\AppData\Local\Temp\131526a4f83609a01c47bbc3bafe8e8b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
235KB
MD5f7c3382dae122c09a4d2c95797bbf4fe
SHA126dfb004e3f8324776ce18969122c285b9d3e735
SHA256e8391849a9ee4d381652e72be8f85f23a9be3ad04098d0b57a75cb3a9f0f38c2
SHA512705cb3e38e975df72ddc7228fd31184335e88c206bfd780d9b1328ac68d0c2be716b55e245090e66d0720b15623d94934da0bb8f10d04cc42fb6b9ce60bdf340