Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 18:44
Static task
static1
Behavioral task
behavioral1
Sample
3565e4f70ce5a1c2227f813f7f4b48f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3565e4f70ce5a1c2227f813f7f4b48f5.exe
Resource
win10v2004-20231215-en
General
-
Target
3565e4f70ce5a1c2227f813f7f4b48f5.exe
-
Size
181KB
-
MD5
3565e4f70ce5a1c2227f813f7f4b48f5
-
SHA1
f7e79e2ea45cf8e429b811c9bfd502cf3bb0f440
-
SHA256
814e763791396858073e8bda611bf1795dfd6240cd2c4c989802a9e3e62961f1
-
SHA512
345bd46c2d3382ae6cef676b5152f44685dc9a224b8673971d6ba8197520b15bb8a19b1dd61f03aaf0815592e0b37952b5ff4714aa4de09123e356b02ccbb31b
-
SSDEEP
3072:BHooknwo1EyjyIshFFDBZt6SI/Ple7LllWH:Noo0F7OImFFP6Sc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2088 msa.exe -
resource yara_rule behavioral1/memory/2104-38531-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38532-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2104-38533-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38537-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38536-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38538-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38539-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38541-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38542-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38543-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38544-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38545-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38546-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38547-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38548-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38549-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2088-38550-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\Minisoft = "C:\\Windows\\msa.exe" msa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 3565e4f70ce5a1c2227f813f7f4b48f5.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 3565e4f70ce5a1c2227f813f7f4b48f5.exe File created C:\Windows\msa.exe 3565e4f70ce5a1c2227f813f7f4b48f5.exe File opened for modification C:\Windows\msa.exe 3565e4f70ce5a1c2227f813f7f4b48f5.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\International msa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2104 3565e4f70ce5a1c2227f813f7f4b48f5.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe 2088 msa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2088 msa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2088 2104 3565e4f70ce5a1c2227f813f7f4b48f5.exe 28 PID 2104 wrote to memory of 2088 2104 3565e4f70ce5a1c2227f813f7f4b48f5.exe 28 PID 2104 wrote to memory of 2088 2104 3565e4f70ce5a1c2227f813f7f4b48f5.exe 28 PID 2104 wrote to memory of 2088 2104 3565e4f70ce5a1c2227f813f7f4b48f5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3565e4f70ce5a1c2227f813f7f4b48f5.exe"C:\Users\Admin\AppData\Local\Temp\3565e4f70ce5a1c2227f813f7f4b48f5.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\msa.exeC:\Windows\msa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD573655b2b5e086612d8176c69657038de
SHA1c0f040b2b8698f210d35bcdecc291ce227b5958e
SHA256700f00272ef3b011d24ddd97f83d27fcfcb3f0894221129c60bfb34a75fae6b1
SHA512bd9c3806bae6ad9a7987a20ebeaf1b412088b7db2153be3b3f1effc3d680d612aadbcacfa7faa9ea7983e21fc882cded0e256a2f7610f2546da7817564a8e37e
-
Filesize
181KB
MD53565e4f70ce5a1c2227f813f7f4b48f5
SHA1f7e79e2ea45cf8e429b811c9bfd502cf3bb0f440
SHA256814e763791396858073e8bda611bf1795dfd6240cd2c4c989802a9e3e62961f1
SHA512345bd46c2d3382ae6cef676b5152f44685dc9a224b8673971d6ba8197520b15bb8a19b1dd61f03aaf0815592e0b37952b5ff4714aa4de09123e356b02ccbb31b