Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
21b5cb46d6ed1f3501a31296aff7711a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21b5cb46d6ed1f3501a31296aff7711a.exe
Resource
win10v2004-20231222-en
General
-
Target
21b5cb46d6ed1f3501a31296aff7711a.exe
-
Size
523KB
-
MD5
21b5cb46d6ed1f3501a31296aff7711a
-
SHA1
bb40a778930e08c4a28b5e7eb635c4b71ec5325b
-
SHA256
1214c7877e11ff7d8c2f83be5a14218cc23fa40f3747b7cef39ec58fcdb75491
-
SHA512
c12ae4c4ea5110ba5373d5b734206836139df2377eccf814ee4be4ba173a6cec8711f2036f63ce84ae58d9885fe453ced2b7bbf9eb3f5d6c983124466a854472
-
SSDEEP
12288:v4mkrLWcXdcWqAERfKu3xAT6R7H1u7HtlJZghX5fCb4xQ03v9:wjrZdckE5KKxAT6R7oNl4Cb4xQ0/9
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" 1.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{62I2124G-N74F-AN2B-X4SR-W04SVRD4C7X5} 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62I2124G-N74F-AN2B-X4SR-W04SVRD4C7X5}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" 1.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 1.exe -
Loads dropped DLL 2 IoCs
pid Process 2952 21b5cb46d6ed1f3501a31296aff7711a.exe 2952 21b5cb46d6ed1f3501a31296aff7711a.exe -
resource yara_rule behavioral1/memory/1028-555-0x0000000010490000-0x0000000010502000-memory.dmp upx behavioral1/memory/1028-1827-0x0000000010490000-0x0000000010502000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" 1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" 1.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe 1.exe File opened for modification C:\Windows\SysWOW64\install\server.exe 1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2964 set thread context of 1944 2964 21b5cb46d6ed1f3501a31296aff7711a.exe 17 PID 1944 set thread context of 2952 1944 21b5cb46d6ed1f3501a31296aff7711a.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2952 21b5cb46d6ed1f3501a31296aff7711a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 1944 2964 21b5cb46d6ed1f3501a31296aff7711a.exe 17 PID 2964 wrote to memory of 1944 2964 21b5cb46d6ed1f3501a31296aff7711a.exe 17 PID 2964 wrote to memory of 1944 2964 21b5cb46d6ed1f3501a31296aff7711a.exe 17 PID 2964 wrote to memory of 1944 2964 21b5cb46d6ed1f3501a31296aff7711a.exe 17 PID 2964 wrote to memory of 1944 2964 21b5cb46d6ed1f3501a31296aff7711a.exe 17 PID 2964 wrote to memory of 1944 2964 21b5cb46d6ed1f3501a31296aff7711a.exe 17 PID 1944 wrote to memory of 2952 1944 21b5cb46d6ed1f3501a31296aff7711a.exe 16 PID 1944 wrote to memory of 2952 1944 21b5cb46d6ed1f3501a31296aff7711a.exe 16 PID 1944 wrote to memory of 2952 1944 21b5cb46d6ed1f3501a31296aff7711a.exe 16 PID 1944 wrote to memory of 2952 1944 21b5cb46d6ed1f3501a31296aff7711a.exe 16 PID 1944 wrote to memory of 2952 1944 21b5cb46d6ed1f3501a31296aff7711a.exe 16 PID 1944 wrote to memory of 2952 1944 21b5cb46d6ed1f3501a31296aff7711a.exe 16 PID 2952 wrote to memory of 3056 2952 21b5cb46d6ed1f3501a31296aff7711a.exe 30 PID 2952 wrote to memory of 3056 2952 21b5cb46d6ed1f3501a31296aff7711a.exe 30 PID 2952 wrote to memory of 3056 2952 21b5cb46d6ed1f3501a31296aff7711a.exe 30 PID 2952 wrote to memory of 3056 2952 21b5cb46d6ed1f3501a31296aff7711a.exe 30 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7 PID 3056 wrote to memory of 1344 3056 1.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\21b5cb46d6ed1f3501a31296aff7711a.exe"C:\Users\Admin\AppData\Local\Temp\21b5cb46d6ed1f3501a31296aff7711a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\21b5cb46d6ed1f3501a31296aff7711a.exe"C:\Users\Admin\AppData\Local\Temp\21b5cb46d6ed1f3501a31296aff7711a.exe" '5?gæ¯2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1944
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\21b5cb46d6ed1f3501a31296aff7711a.exeC:\Users\Admin\AppData\Local\Temp\21b5cb46d6ed1f3501a31296aff7711a.exe1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe" 02⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD573aff624dbacccc51a8e6e1d877026f9
SHA15d49bae565bb2654db3846679c585bc9e211a9eb
SHA256e146adde956eb28550b6fde58e94d5a1c8561b996778c31c852ab7445082f773
SHA512ffe40d06e23fdab84168a1aba524d66f3ac3df4347301b206b22ff7c09886dcce4a0e1dc27292889ed00a5d44dcf20e9ca2853c4cd1573b3fa712168e536b696
-
Filesize
8B
MD5f3af54a8bfa863ea186dd06348ebda79
SHA16d43e689e2918c7628be28f09f6c0edf6b1c0300
SHA256370b9c0efddb500fac99c3f30675302356480abc7d9a84798e19998dc8a67130
SHA512d676f7a2ac21a13d98488ebb8aadec584edb845596f2699d399375640501bb3736305d5514ef2cfd11185231119f076a646fff71281019c757dffb015a51c2bc
-
Filesize
8B
MD52c46d1155fe2a4021c414bbb1c65a2d6
SHA1867cde4ef70e23ae3d1d9e5e91b68cf0cc408e2a
SHA256bdc4a8d046844a9ab40efed7453f945456ec2cc8d9311a49b826e88aa6b5edbf
SHA512f7887b513697e9b2cea7b715a93b2800d6fea01554f3df6ae00a0784f2bf772f7346e7c96b5e8e0b030782ad6f7867983b68903b6fc75d9f9e86a81743ec8771
-
Filesize
8B
MD52c40e8a2b21aa615cbb45c9aa3ad1d8c
SHA19e95f587ec9d9834c38822b894250077969790bc
SHA2562efddcd1d3155e44ec14eba10fcfabbc618de882af200f84880751572f250440
SHA5127c50c28f91095bc161162a684c64ad794dc82f0644b1c103b4a37734b9fa5e3d7a6fa0ff6a241652397dc9bb17561a1ae2d729a1284b28105d17f66afd0e7441
-
Filesize
8B
MD5b9b1d723c471aee1dc7ef51c2f880891
SHA113e8452c3ca8c285f1a0b3f6c4f199ac24315a0d
SHA256baf2c11955b743a4bb0161d40d32e27c70afe065aedb1248551df80ad45a3d35
SHA51287078b097859cd99aecd20df167cc3e95b44a55a070e7f91806c85022a1278877b728ee64561b3ec9d08de211bdafdb49194f01bd3cca3b7ff186c3bd7c0d7b1
-
Filesize
8B
MD54222e4e0a1c288ed83b0981ea4ed3a27
SHA1c702590e2dbb5d41c4d427a597e8da05f701e879
SHA25688e96bc6992508a618715be57b38af7b092de6d0786933d4bf5a8cee11ce3204
SHA512d533e70baf28673b6f12f357b81417699a8b695b1042112ba49f78425b538fbeb4e3011dd5e53387cdb4887a4ba1afd59d39e7d213c8277d73c120b0c7dae1cc
-
Filesize
8B
MD5f9cddf5f3c662b452a0b9216d8613573
SHA119a2cd1d514ea51e68991f9c34fc2ab65875b853
SHA256630857fc03874788aadcc46dd8c4a4f76b2c4b499ec752112977cbe01bc9ed5e
SHA5129118591d4e0ba6acd494e3c953afe65e49c60e836930e6e3324162e916bebf3bc5c1dd63868cfb02f663cae56107298e70c99a64afa077e3dad0c6e2c7665de0
-
Filesize
8B
MD5d81eb1b0bf350531c244f82fe5325325
SHA1ea4096c68099ef338da74e513919abf869105713
SHA256caf6b16974efed2eaae02a4ad5a9c95fda4b7b5e4373984fe9f0e145b44611eb
SHA512323830daae8ccd511fe2589592316200fff065ae58c20feab7528fa11a05e70a2f651de673db442ae426045cc72d3aa6f5e399844e172e54de0a5908c8612641
-
Filesize
8B
MD5075b0b117bf63a64b4722a88b6d4a392
SHA10609850df4853e76917372ff9b12acb8c72c0a97
SHA256c111b4ca113e898a3c85eec6248ff9e9619e61c7b3c67eae7e7ea30579dc6955
SHA512ea426f322ff3396a40d5883b4ce4460401ed6876dde16b76aad69acf706542bd032893fe8b35ab126419e19f7ede0cd431abe0c0c8c5eb5269d9f39f8ffc84f9
-
Filesize
8B
MD54b8f291e85687398dedea24b521bf353
SHA14360208fef3d6126ba9512d50cde7ff36cf3f776
SHA2560f5753905e20b6a5f1d09180bd497c9f9e8a9b15ae982d77a91c33bf9b9e7077
SHA512815dc0ac8ef3b136615a346a780841c820ead0fb6034886f9d5a7fe68b19663a1eeb668e3d0e214b6a24d53e3042c1df883a54d9724a9fb1eab65f88139de57f
-
Filesize
8B
MD572dcef2869485c032be48d4dd1fcf94a
SHA1764fa4659ba042e46a9f51a8183e81c5dfc3bd62
SHA2562e100799efda91fc5d7a211abea8534739dc11e0ed510a2c09f205bd0034ec57
SHA512b44b9876382bb0c376d5d2b9ee8b9a1371bb0386efc46fce4fcf7ec5f6e7b64c1c6b2880ee2ff15a9168ef628d2cba7bb8157021e556a8f8ee7c9d95bcf38fb0
-
Filesize
8B
MD56e9c7b0a6acbac9f983b205d80c99730
SHA139768af5511be6cdc49f3e1690298602d365ac67
SHA2562ed61806ed38c6ee781481c8e880b223f2997bb1e5c1d8ebe6acc0dc1738fbf8
SHA512378923ed4babe6f6cbcd1bee4e7231ccda0186e8445f0fec0bc3583c74158be87af36509a93f49cb07088fd4794bcf2a07d5c7d1971f3e3bd4f870acb937693b
-
Filesize
8B
MD56c8f08cacfa748f3f1f6f453b690cca8
SHA1b6568ec1d69af990dcb88ce1dac452401aa21da9
SHA256ee34637318f95f5abbe88f3790171d7974bb4411e554f37b43e6f9012144fdd8
SHA5129b55a5a395107ea664181c63a0f0ac841b8e3e52caddb80c3493228322c7a1569f58afae4342f50dff441e00c189b453d37473ba42223d0a00eeeadfb1af6cd2
-
Filesize
8B
MD57502d4d44d9bd8a4d1e9dc97dedd6125
SHA124907af861a568724f15040dca156c03a6a50e91
SHA2568c0d59422c9ce7fff90dee8a84a7c035b4a31c28a398a9af9723d1d194d804d9
SHA51264f0a195a6d0730446087597fe20e14f61257e1d3c24f382f8d051df88d82ce228acc1dd3c897ddb9abb36cbd0630b51524a59db0886c804701730430cca9033
-
Filesize
8B
MD5fdfc716079bc83c77ef126006c66a073
SHA1a270e1431ab7e3cccd1e45ee1b372ee4284e1d6d
SHA256a02f0216e50c0a7cae8ad9914ad2df6d61febe51e3c8cf066b9cc9518250482a
SHA512d91858751c0650cacb5d8b0f63e104fc0df5acaa149b7b14548aecc2cd216501b2c2a483042a068e2e85e88c6bb5dcd05033e1a25a3f5a0d7dbaf07f26d57774
-
Filesize
8B
MD5b091d2b989f7e913a2d4f97ede109a77
SHA1a8a0f322ddcc83e7316001d07f4eb7a3a97ac7dd
SHA2567abd39f89a808a6bdae0502f9546130f2fba787c67c3c8ca07d00329c296246f
SHA5127f21063dfb52a0087202d6507eaf3c9e3e68d6dfc1c71445ecf504b7cea4cc125a43ba33cfc9c9647ffb589864f0f7504e7743df41ad68c808584ff78f1d1e48
-
Filesize
8B
MD55e31181d3851dede16806697a2dbad27
SHA15d581352036a49eaf8d0489ee9111072e6ab86e6
SHA2562cfbb766653ee19a387fddbe8eb2ed75fe2e57806fc7e2675ff606992eb6b775
SHA51204fb3b30e260fbdf6099c4d4693e5d8508699f932ea8dd470f66332743aa5ec8cdb425b832233cd85dd047aaafadf59c46cc34dc95e479825db3cc492121ee04
-
Filesize
8B
MD5f68620b3e2e2ebb92c36bdb6105e4e55
SHA1a878a7d7c1998a8fa1e97b39798aaf93b0d96e41
SHA25654b698dc0a140e4d6baa3b701c07747c4d364f521613a519f120c1b0c8ea90a4
SHA5125662b95e7cc2a6fd552cae0cab235567333551f295f48cf135a5848e79abcf4a40115c99ef522f31a99c63048fade9c6747efef5fa199df1bab7ac82c5f6765e
-
Filesize
8B
MD589a022991e92cada17501cba708a82fe
SHA1ff63d1d5f7810c33dc16afcdf9353f40b57ae846
SHA25699c2826eeeb13152155c55afb7c897de3150ca2b05a0dccc0eb2935005b2e6b2
SHA512d43ff5c22b2ef70031f6878f5a85450754413ec2df399382b7bd28cbf48525a19f8a292da98a77a56f586f1019e5af6c0a6f92df2f0696f2691a5d48c09e44dd
-
Filesize
8B
MD5ca042da6a605fd527abc48648c639d97
SHA14661521625d8358f0f084fa12e64c3dc6d8a68cd
SHA256c7ce8d3aa67f653aa6b7685e02767812bdf77cf06a230c88ed5a9a9aafa941b4
SHA512110542f98bd74d912826932a518536f47d9a6c0f1cb1be4e32fd733be5b249e76810d8836a4b30447ec38d09db0e20752b59ca7ff4a25d449366e5be90188e48
-
Filesize
8B
MD529995449b4f023d0b5a0ecf1173b8877
SHA1d7dd790017872bbcc03c61b448789ffc5cfd68db
SHA256f36566ac7f69eb3a89b22381c401ecddf1713c5fd9cd3906cea90508df557991
SHA5124a15b4d1722a8ab2f8087f5d9a01565cc3ba004323b8b02158521948f453d7d11407c5556d8fab26c4dcb3410f5433c1880dc731f4440252173ed3898de12792
-
Filesize
8B
MD5be09b79c2844ab6f0fe0965a2aae9372
SHA180494c8bcdc2f9a39884568b1eb6505573fd3cea
SHA256e979c9eb24f46a57571cebb830d64207538163409a68b33c07f143c6a1e290d0
SHA5129d0c947061e55a8ef5ee0805b11083f6865454f245aa49ed15cea9af3f6760a40646e5cbb465a108510aa428127aaf06f29e502722b23477dc75d2582441e923
-
Filesize
8B
MD52f4662bba53b866954aade0e190a1993
SHA174ff1fae26beb5daf6908cd84f64891e08fae404
SHA25623b4236dfd6d3769a872f15a9a65b10ae520115e36a2ee979adb2e515c7992fb
SHA51249846bc99ca6849988abd45639cec76db730e4306b42cd077450af114fa862c346f916070fa6813f16338b5127f13b4500cd3414334c36bd406268fe74a995b8