Analysis
-
max time kernel
1s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 21:17
Static task
static1
Behavioral task
behavioral1
Sample
3d15e6c18de827e82a8020e1c6475ba8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d15e6c18de827e82a8020e1c6475ba8.exe
Resource
win10v2004-20231222-en
General
-
Target
3d15e6c18de827e82a8020e1c6475ba8.exe
-
Size
123KB
-
MD5
3d15e6c18de827e82a8020e1c6475ba8
-
SHA1
4cac5c1f282875a7b3026b76c63eaea9bd71ce7d
-
SHA256
8ee76799220183625f317f176086db2c95af7099c1c0edf8dd6eff3711c4ad4f
-
SHA512
e600a8d516dccf91877853fffca0208d789f8972ebe2992eba65b57269cc4351e90687f5f6b1035305f7d9163eca6cfc44c8a42c2a065f9f4f6974b41a7c5fba
-
SSDEEP
1536:S8VEUVSldQEUWgxvOaxMz3+ZkewyJir7uFz3/MLurpRdCpCA1dW:S8VEbdsW+vO6Mz3h9roz1rpRkzd
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1716 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8515eb34d8f9de5af815466e9715b3e5.exe Trojan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8515eb34d8f9de5af815466e9715b3e5.exe Trojan.exe -
Executes dropped EXE 1 IoCs
pid Process 1644 Trojan.exe -
Loads dropped DLL 1 IoCs
pid Process 1748 3d15e6c18de827e82a8020e1c6475ba8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\8515eb34d8f9de5af815466e9715b3e5 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\8515eb34d8f9de5af815466e9715b3e5 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Trojan.exe\" .." Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1644 1748 3d15e6c18de827e82a8020e1c6475ba8.exe 21 PID 1748 wrote to memory of 1644 1748 3d15e6c18de827e82a8020e1c6475ba8.exe 21 PID 1748 wrote to memory of 1644 1748 3d15e6c18de827e82a8020e1c6475ba8.exe 21 PID 1748 wrote to memory of 1644 1748 3d15e6c18de827e82a8020e1c6475ba8.exe 21 PID 1644 wrote to memory of 1716 1644 Trojan.exe 20 PID 1644 wrote to memory of 1716 1644 Trojan.exe 20 PID 1644 wrote to memory of 1716 1644 Trojan.exe 20 PID 1644 wrote to memory of 1716 1644 Trojan.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d15e6c18de827e82a8020e1c6475ba8.exe"C:\Users\Admin\AppData\Local\Temp\3d15e6c18de827e82a8020e1c6475ba8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Roaming\Trojan.exe"C:\Users\Admin\AppData\Roaming\Trojan.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1644
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Trojan.exe" "Trojan.exe" ENABLE1⤵
- Modifies Windows Firewall
PID:1716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8515eb34d8f9de5af815466e9715b3e5.exe
Filesize28KB
MD59c5aa5dc4fa3daa5fa6b5f04d3bcf966
SHA1f50ffe9f26f921394d6c0f90ba189404624d71b8
SHA256a90fb349dfdc8d785bca4e9c61f43dc1b7154e269b4edcd9e7bf265ce6d76d63
SHA512263af48c85a9afcedd29b2f9e9ccfef05ef07cf465beda60b289838d1dc91ab9d590eac509050d3fe34cf0ff5672430d75c602c17d8b6e03ee451b6b79988074
-
Filesize
7KB
MD57e62913e47b8917629fe904ad7470693
SHA190c1cd0303e010796f1bdd24b314a8d85cc2ed78
SHA256fefe5f5532a3502f333bc4573bf6f007328c7276ecc66cc5d31cac046df39d94
SHA512b8c6e73be3ddd1625efb27687be7184d11eb2efbf7bbd8e1d1db5fed16ab5c94573816d5b1d002e003c1593c70a001f42f0b91917b153a9d43ccd31f7f6430f5
-
Filesize
45KB
MD5446d23d238934dcd4d3fc9ead0fb298b
SHA1ce29726c14dc718ddc5daba1b8fb287cdbb9dc49
SHA2566cac7d76f90ec259d6b400cc390bd583963cdc265871bc10a4bcdfd60f675e67
SHA51299c959d955a18e612cc89f3ad837796e8461e537e973b323e428440066bde651ce84375d8b94428eeb026a09eecac7495edcd71473f330cd6590354b1559ac7e
-
Filesize
58KB
MD5c4000810e6f45d125abe150c52eddeb3
SHA17afc968da36fad1dea0cc3351a71f17974d7866a
SHA256f72929acc569349a538455e41dcd4968e1c1aeb28cb1f5e1d26c244f46e3886b
SHA512a4a3c891f01e73efe332337b8c696a00b1f1664e8bf8f02c1e2e24749e0cf4aa05bbbf24a1411e76bb1461fe584b20dfd55a60abac4d21f448914dab042d3978