Analysis
-
max time kernel
95s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
15ed1118d13cbeb82990e6e2cf33c506.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15ed1118d13cbeb82990e6e2cf33c506.exe
Resource
win10v2004-20231222-en
General
-
Target
15ed1118d13cbeb82990e6e2cf33c506.exe
-
Size
116KB
-
MD5
15ed1118d13cbeb82990e6e2cf33c506
-
SHA1
0b3bed9f357f65b695e06df0df911a2edb2f03a8
-
SHA256
e1a59060da34661d6dce398ed14308d92640844daabe31e1604b7b8c4fc12c63
-
SHA512
0d7c9ae8e083f627ce88cc9b776294537fe24f522c1966f6dbaa911376f2e4b26252f8ff8a72b578a0fdcaaa18955fb06ea276ea0cdf368611ab3b9ca248ff65
-
SSDEEP
3072:6/uzwf9se/JUkxRWySst/CojxqdQUNsk8:6/ucfOCuQROstlxqdVNM
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} 15ed1118d13cbeb82990e6e2cf33c506.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\Server.EXE" 15ed1118d13cbeb82990e6e2cf33c506.exe -
Executes dropped EXE 1 IoCs
pid Process 4028 Server.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4028 set thread context of 4084 4028 Server.EXE 87 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Server.EXE 15ed1118d13cbeb82990e6e2cf33c506.exe File opened for modification C:\Program Files\Server.EXE 15ed1118d13cbeb82990e6e2cf33c506.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4084 ipconfig.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4028 4016 15ed1118d13cbeb82990e6e2cf33c506.exe 86 PID 4016 wrote to memory of 4028 4016 15ed1118d13cbeb82990e6e2cf33c506.exe 86 PID 4016 wrote to memory of 4028 4016 15ed1118d13cbeb82990e6e2cf33c506.exe 86 PID 4028 wrote to memory of 4084 4028 Server.EXE 87 PID 4028 wrote to memory of 4084 4028 Server.EXE 87 PID 4028 wrote to memory of 4084 4028 Server.EXE 87 PID 4028 wrote to memory of 4084 4028 Server.EXE 87 PID 4028 wrote to memory of 4084 4028 Server.EXE 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\15ed1118d13cbeb82990e6e2cf33c506.exe"C:\Users\Admin\AppData\Local\Temp\15ed1118d13cbeb82990e6e2cf33c506.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Program Files\Server.EXE"C:\Program Files\Server.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\ipconfig.exeC:\Windows\SYSTEM32\ipconfig.exe3⤵
- Gathers network information
PID:4084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD515ed1118d13cbeb82990e6e2cf33c506
SHA10b3bed9f357f65b695e06df0df911a2edb2f03a8
SHA256e1a59060da34661d6dce398ed14308d92640844daabe31e1604b7b8c4fc12c63
SHA5120d7c9ae8e083f627ce88cc9b776294537fe24f522c1966f6dbaa911376f2e4b26252f8ff8a72b578a0fdcaaa18955fb06ea276ea0cdf368611ab3b9ca248ff65