Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
26ab4c648f8df6859ae4b4efc9ce0c53.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26ab4c648f8df6859ae4b4efc9ce0c53.exe
Resource
win10v2004-20231215-en
General
-
Target
26ab4c648f8df6859ae4b4efc9ce0c53.exe
-
Size
136KB
-
MD5
26ab4c648f8df6859ae4b4efc9ce0c53
-
SHA1
280cc2b7ae048eedf835a0da7f52994aa964c739
-
SHA256
9034412d40ceeceb4771bd74e010e1782435d3de800a5fc8544bddedf28d0e18
-
SHA512
29cee52de61d53c17d5115d5b066ca1e4fff7593d1f90bf0e7339197c4c59861bea9c6c255dfe0f354e32213376bf545aa3cf2a4183061d2a80dae3115a20808
-
SSDEEP
3072:gZbQawG5CLy8M0jYxByGobQtK8bu9yAAGkICaudkC:gNKg0jY7ob+butujdt
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1352 servicio.exe 2836 servicio.exe -
Loads dropped DLL 3 IoCs
pid Process 2212 26ab4c648f8df6859ae4b4efc9ce0c53.exe 2212 26ab4c648f8df6859ae4b4efc9ce0c53.exe 1352 servicio.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\servicio.exe" 26ab4c648f8df6859ae4b4efc9ce0c53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Service = "servicio.exe" 26ab4c648f8df6859ae4b4efc9ce0c53.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\servicio.exe" servicio.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3012 set thread context of 2212 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 28 PID 1352 set thread context of 2836 1352 servicio.exe 29 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 1352 servicio.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2212 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 28 PID 3012 wrote to memory of 2212 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 28 PID 3012 wrote to memory of 2212 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 28 PID 3012 wrote to memory of 2212 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 28 PID 3012 wrote to memory of 2212 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 28 PID 3012 wrote to memory of 2212 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 28 PID 3012 wrote to memory of 2212 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 28 PID 3012 wrote to memory of 2212 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 28 PID 3012 wrote to memory of 2212 3012 26ab4c648f8df6859ae4b4efc9ce0c53.exe 28 PID 2212 wrote to memory of 1352 2212 26ab4c648f8df6859ae4b4efc9ce0c53.exe 30 PID 2212 wrote to memory of 1352 2212 26ab4c648f8df6859ae4b4efc9ce0c53.exe 30 PID 2212 wrote to memory of 1352 2212 26ab4c648f8df6859ae4b4efc9ce0c53.exe 30 PID 2212 wrote to memory of 1352 2212 26ab4c648f8df6859ae4b4efc9ce0c53.exe 30 PID 1352 wrote to memory of 2836 1352 servicio.exe 29 PID 1352 wrote to memory of 2836 1352 servicio.exe 29 PID 1352 wrote to memory of 2836 1352 servicio.exe 29 PID 1352 wrote to memory of 2836 1352 servicio.exe 29 PID 1352 wrote to memory of 2836 1352 servicio.exe 29 PID 1352 wrote to memory of 2836 1352 servicio.exe 29 PID 1352 wrote to memory of 2836 1352 servicio.exe 29 PID 1352 wrote to memory of 2836 1352 servicio.exe 29 PID 1352 wrote to memory of 2836 1352 servicio.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ab4c648f8df6859ae4b4efc9ce0c53.exe"C:\Users\Admin\AppData\Local\Temp\26ab4c648f8df6859ae4b4efc9ce0c53.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\26ab4c648f8df6859ae4b4efc9ce0c53.exeC:\Users\Admin\AppData\Local\Temp\26ab4c648f8df6859ae4b4efc9ce0c53.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\servicio.exe"C:\Users\Admin\AppData\Local\Temp\servicio.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352
-
-
-
C:\Users\Admin\AppData\Local\Temp\servicio.exeC:\Users\Admin\AppData\Local\Temp\servicio.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD526ab4c648f8df6859ae4b4efc9ce0c53
SHA1280cc2b7ae048eedf835a0da7f52994aa964c739
SHA2569034412d40ceeceb4771bd74e010e1782435d3de800a5fc8544bddedf28d0e18
SHA51229cee52de61d53c17d5115d5b066ca1e4fff7593d1f90bf0e7339197c4c59861bea9c6c255dfe0f354e32213376bf545aa3cf2a4183061d2a80dae3115a20808