Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
36bdda43e73997a8cf45bb551d74a351.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36bdda43e73997a8cf45bb551d74a351.exe
Resource
win10v2004-20231215-en
General
-
Target
36bdda43e73997a8cf45bb551d74a351.exe
-
Size
113KB
-
MD5
36bdda43e73997a8cf45bb551d74a351
-
SHA1
b343cc61e39d7cfd27bd4d081c807f37522a5531
-
SHA256
629d7370d0c761234400ce6cd65eef3e1b974df6129e6e3bc7158a1d3ab9a3d0
-
SHA512
b9bb0f8a53e556684c29c3d578276d0384ee15aaf507a6dc76018c8f8da26f778bd265422565519d2a2b0535c0f22993ea774e46674f0f7da42705986e532504
-
SSDEEP
3072:aCU63Qs3SnhpLYTXPWXWT7QBTG3EUm9y9UFADUZD19:OeOZmiWEUmY9U6Di
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 36bdda43e73997a8cf45bb551d74a351.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\WinUpdaterstd = "C:\\Windows\\WinUpdaterstd\\svchost.exe" 36bdda43e73997a8cf45bb551d74a351.exe -
Executes dropped EXE 1 IoCs
pid Process 2884 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1144 36bdda43e73997a8cf45bb551d74a351.exe 1144 36bdda43e73997a8cf45bb551d74a351.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\WinUpdaterstd\svchost.exe 36bdda43e73997a8cf45bb551d74a351.exe File opened for modification C:\Windows\WinUpdaterstd\svchost.exe 36bdda43e73997a8cf45bb551d74a351.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1144 wrote to memory of 2884 1144 36bdda43e73997a8cf45bb551d74a351.exe 28 PID 1144 wrote to memory of 2884 1144 36bdda43e73997a8cf45bb551d74a351.exe 28 PID 1144 wrote to memory of 2884 1144 36bdda43e73997a8cf45bb551d74a351.exe 28 PID 1144 wrote to memory of 2884 1144 36bdda43e73997a8cf45bb551d74a351.exe 28 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 36bdda43e73997a8cf45bb551d74a351.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36bdda43e73997a8cf45bb551d74a351.exe"C:\Users\Admin\AppData\Local\Temp\36bdda43e73997a8cf45bb551d74a351.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1144 -
C:\Windows\WinUpdaterstd\svchost.exe"C:\Windows\WinUpdaterstd\svchost.exe"2⤵
- Executes dropped EXE
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5a32f6ff2d4e1f85634e52d60da733e94
SHA11e4e424ba255444f33d2eb5e0acf5eb8a35c0c7a
SHA256dcb05d44302dd01dfca5c2ffd7477d4592e9f05523cd69fbcfef41a5fa5e89c7
SHA51279d73478ae5e90ebae72d0586f1022ee8266035b8b3805e41be3fb3974efb04937272dcccc5a5eb0d00ce05f7a83d212aa8bf1396c5a53dfffed87c829c728b3
-
Filesize
21KB
MD534e46c408cf73b103cbcaa133d80890b
SHA148e2aebdcf3e8a988f2fccc838bc276662bd565c
SHA256b5a3ec6502edfd96f7cb4b08b1d4b8effc94de539445ce8318397122a1fdc14b
SHA512b3ba25dff44b4f6d0a84ae64be37435b7c093bfc94be81a4597d9f43e9f2d6f8a779188f7c967fb0e1414daf8f67c8e7ee6d7c6baa61923454f21bf51d96f46f
-
Filesize
81KB
MD517a88a4f5e96edbfc36c3be588a8132a
SHA1df4905dadb7241fb6d904d507f01f2e163a834ee
SHA2568eaa7f0f04e20e8e2cf19e62df758a382bd3a67bf67ef612019c976fb744869f
SHA512c77727af57f4077efb8ebe637806c55510281e2d03b6bef1fee0c3ef0187b0f8b014123f1e7a545ed934aa7f8c239482f6e9c6204789ba1a91797eea9b948d93
-
Filesize
79KB
MD5ea59d5833fc04416d5dd9532a6e7cfab
SHA1e1dbe7c0943a824df7d15c2aa29ecd3acd9d2f8d
SHA25678bf856ef1bc9e92dbe24d63e9334059b9d0ef7e92e8925c10372680f85bc7a5
SHA512447e6b40ac82911385aebfc52f9d32a19fecbebde9440ac69669a5686b7c4c4ef32033539a5ce542fb98740c424e1fd320d0952ddb5740cc2caa03a1b5406b65