Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 17:10
Behavioral task
behavioral1
Sample
2fd909b0064cfb45888c0e2ed57057af.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2fd909b0064cfb45888c0e2ed57057af.exe
Resource
win10v2004-20231215-en
General
-
Target
2fd909b0064cfb45888c0e2ed57057af.exe
-
Size
134KB
-
MD5
2fd909b0064cfb45888c0e2ed57057af
-
SHA1
8025a807f067e975467fc6f01fb5ea80706ace35
-
SHA256
8e18ce0fcf3a245cd6c93befaac0b7c9ec9da415dbfe2dcd5460af71d01a9883
-
SHA512
32023b34503ad33093d17238992855de938daab54bb2a97df7f92264fe24074944d3891cd031d05a579caead58ce96396c2b2aa266b5d7ee5d33dbc3528e2d6c
-
SSDEEP
3072:Dxaw7lEvFCsE8uKqMJBrHnsAWNqubkdBytQlaVrAUdB1/:TlFstuKqMJ9Hn5WNqub/tpV841
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1776 trys.exe -
resource yara_rule behavioral1/memory/2896-1-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2896-47-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2896-49-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2896-85-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2896-31578-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2896-315511-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/760-315518-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/760-315515-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/760-315514-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/760-315513-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/760-315508-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/760-315504-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/760-315502-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/files/0x000e000000012321-315549.dat upx behavioral1/memory/1776-315555-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/760-315543-0x00000000033D0000-0x0000000003440000-memory.dmp upx behavioral1/memory/1776-315568-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/1776-315608-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/1776-315638-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/760-327724-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1776-345274-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ineter Mc = "C:\\Windows\\trys.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2fd909b0064cfb45888c0e2ed57057af.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2896 set thread context of 760 2896 2fd909b0064cfb45888c0e2ed57057af.exe 30 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\trys.exe 2fd909b0064cfb45888c0e2ed57057af.exe File opened for modification C:\Windows\trys.exe 2fd909b0064cfb45888c0e2ed57057af.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2896 2fd909b0064cfb45888c0e2ed57057af.exe 760 2fd909b0064cfb45888c0e2ed57057af.exe 1776 trys.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2896 wrote to memory of 760 2896 2fd909b0064cfb45888c0e2ed57057af.exe 30 PID 2896 wrote to memory of 760 2896 2fd909b0064cfb45888c0e2ed57057af.exe 30 PID 2896 wrote to memory of 760 2896 2fd909b0064cfb45888c0e2ed57057af.exe 30 PID 2896 wrote to memory of 760 2896 2fd909b0064cfb45888c0e2ed57057af.exe 30 PID 2896 wrote to memory of 760 2896 2fd909b0064cfb45888c0e2ed57057af.exe 30 PID 2896 wrote to memory of 760 2896 2fd909b0064cfb45888c0e2ed57057af.exe 30 PID 2896 wrote to memory of 760 2896 2fd909b0064cfb45888c0e2ed57057af.exe 30 PID 2896 wrote to memory of 760 2896 2fd909b0064cfb45888c0e2ed57057af.exe 30 PID 760 wrote to memory of 2180 760 2fd909b0064cfb45888c0e2ed57057af.exe 34 PID 760 wrote to memory of 2180 760 2fd909b0064cfb45888c0e2ed57057af.exe 34 PID 760 wrote to memory of 2180 760 2fd909b0064cfb45888c0e2ed57057af.exe 34 PID 760 wrote to memory of 2180 760 2fd909b0064cfb45888c0e2ed57057af.exe 34 PID 2180 wrote to memory of 2084 2180 cmd.exe 33 PID 2180 wrote to memory of 2084 2180 cmd.exe 33 PID 2180 wrote to memory of 2084 2180 cmd.exe 33 PID 2180 wrote to memory of 2084 2180 cmd.exe 33 PID 760 wrote to memory of 1776 760 2fd909b0064cfb45888c0e2ed57057af.exe 32 PID 760 wrote to memory of 1776 760 2fd909b0064cfb45888c0e2ed57057af.exe 32 PID 760 wrote to memory of 1776 760 2fd909b0064cfb45888c0e2ed57057af.exe 32 PID 760 wrote to memory of 1776 760 2fd909b0064cfb45888c0e2ed57057af.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fd909b0064cfb45888c0e2ed57057af.exe"C:\Users\Admin\AppData\Local\Temp\2fd909b0064cfb45888c0e2ed57057af.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\2fd909b0064cfb45888c0e2ed57057af.exe"C:\Users\Admin\AppData\Local\Temp\2fd909b0064cfb45888c0e2ed57057af.exe"2⤵
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\trys.exe"C:\Windows\trys.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WVJKF.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2180
-
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Ineter Mc" /t REG_SZ /d "C:\Windows\trys.exe" /f1⤵
- Adds Run key to start application
PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115B
MD5721f40b829b989f3ed90feba41b75b51
SHA10bc3e723b65a94c6ffbb8e0b32c9aaa24d10fefd
SHA256641cbc8ccc1d7ffe1030ff40ea930cad57a855c5fa275bff57745b62d4545a15
SHA512d11fa35712baa83380b1515242d85c1ce84ade1bd3e62144906b40c6e2d42c748d7813faaf05e5514048be3ae47fb29986e0a808c93eabf7128f31300c4d972f
-
Filesize
134KB
MD5a58f7aae8dc8d2f60cb36d7129b79213
SHA137b8c6533b801aefbc9457e1dc0b099b8ad1aed3
SHA2562f7c6a6955be912146dc8210e9ca024eb4ff9cd76a299ee50d58f04b19f4aa99
SHA512fc0e70a0cb40a911ad9c8018d9585eba2b60cb7a79100a15bc58842ced74042f7ec80203160bc4c6369d4fff84a3a24412b48bce115437814b83a01a0c6dc505