Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
29c612dca4e2d302445a71ddc283b5eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29c612dca4e2d302445a71ddc283b5eb.exe
Resource
win10v2004-20231215-en
General
-
Target
29c612dca4e2d302445a71ddc283b5eb.exe
-
Size
366KB
-
MD5
29c612dca4e2d302445a71ddc283b5eb
-
SHA1
e54e0c0dc33194a4647dfafefc0595ed8caa03b6
-
SHA256
33d8601ed2e3d9c5d7fad96366f151c59688ab0b06c76b79abff5e29f7527e8d
-
SHA512
2605c3730b42140d7e0485feb3010ae96a73f4bbde79c64ad1ecf743c5798b864348767c761e4db10d1a2d222ccf1550024e2c56da8f31e07c9b9499b51fc7ed
-
SSDEEP
6144:GC3+XHmuPepeqif4ro9DC6VaZfh/m8hIHnBiXmY:SXHmuPepeXfOo9DC6gZpm82HC7
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\RemoteServer\Parameters\ServiceDll = "C:\\Windows\\system32\\RemoteServer.dll" Rundll32.exe -
Deletes itself 1 IoCs
pid Process 2952 cmd.exe -
Loads dropped DLL 5 IoCs
pid Process 2536 Rundll32.exe 2536 Rundll32.exe 2536 Rundll32.exe 2536 Rundll32.exe 2360 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Rundll32.exe File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\RemoteServer.dll 29c612dca4e2d302445a71ddc283b5eb.exe File opened for modification C:\Windows\SysWOW64\3B275A5A.fn svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\DelSelf.bat 29c612dca4e2d302445a71ddc283b5eb.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2884 PING.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2536 1924 29c612dca4e2d302445a71ddc283b5eb.exe 28 PID 1924 wrote to memory of 2536 1924 29c612dca4e2d302445a71ddc283b5eb.exe 28 PID 1924 wrote to memory of 2536 1924 29c612dca4e2d302445a71ddc283b5eb.exe 28 PID 1924 wrote to memory of 2536 1924 29c612dca4e2d302445a71ddc283b5eb.exe 28 PID 1924 wrote to memory of 2536 1924 29c612dca4e2d302445a71ddc283b5eb.exe 28 PID 1924 wrote to memory of 2536 1924 29c612dca4e2d302445a71ddc283b5eb.exe 28 PID 1924 wrote to memory of 2536 1924 29c612dca4e2d302445a71ddc283b5eb.exe 28 PID 1924 wrote to memory of 2952 1924 29c612dca4e2d302445a71ddc283b5eb.exe 31 PID 1924 wrote to memory of 2952 1924 29c612dca4e2d302445a71ddc283b5eb.exe 31 PID 1924 wrote to memory of 2952 1924 29c612dca4e2d302445a71ddc283b5eb.exe 31 PID 1924 wrote to memory of 2952 1924 29c612dca4e2d302445a71ddc283b5eb.exe 31 PID 2952 wrote to memory of 2884 2952 cmd.exe 33 PID 2952 wrote to memory of 2884 2952 cmd.exe 33 PID 2952 wrote to memory of 2884 2952 cmd.exe 33 PID 2952 wrote to memory of 2884 2952 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\29c612dca4e2d302445a71ddc283b5eb.exe"C:\Users\Admin\AppData\Local\Temp\29c612dca4e2d302445a71ddc283b5eb.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe "C:\Windows\system32\RemoteServer.dll" InstallService2⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:2536
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\DelSelf.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.13⤵
- Runs ping.exe
PID:2884
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
221B
MD5806273c86eed94986429ee6f28181c26
SHA16741e1c483a57a6b467ee1be26cef95a5f29d1b0
SHA256a884de502c4389cb6576c03b2d2d5c8ba58c063b7a9afbd8107a80bf88e0aec4
SHA51271f500f1e506db54db0c2d81118239a02cc7a9ec725cb0ae2644b8048f8bb10290db9941144cec5591dbfe904b182878c94a8a19e296fd57930fac32ac6b14c0
-
Filesize
41B
MD5a605162e80dab7c45266d02ac6c130d4
SHA10f2273d0f44136ee43c302ca5ac120218d47ed94
SHA256fef29e5012984af4d0b17266efba3f3bae6a720ea6fd002cdcb164936bcf5346
SHA5127fd0af6dac9fbd5b19b613893c0bd863cfc7427e3a9cb12c19a9214a8a5560204808781bd43f751784a7de1fe9662c2d70f105f69f80d365f928ef4a7af868c9
-
Filesize
274KB
MD57770ed55793ddcbb601c9b78a27aa907
SHA174f6636e6ef0f80d66d06a8c8111ec1354f70134
SHA256470e6aae31276874fe486c8ac11a369d076d4f8458af4e4c3e8a99642ce57d2f
SHA5123ee9da66ba7f46eb8d281e5c639270d959f87df5501d0199c3af08380956be68e6f2c1562d60bfaaa631502f14bf8787e8d155fd5c97d3e098267382afa9640a