Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
4e4c6330a94c36031e42bd8b4376838a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e4c6330a94c36031e42bd8b4376838a.exe
Resource
win10v2004-20231215-en
General
-
Target
4e4c6330a94c36031e42bd8b4376838a.exe
-
Size
471KB
-
MD5
4e4c6330a94c36031e42bd8b4376838a
-
SHA1
f8965f021830460cead11380190855e350ee5203
-
SHA256
55a66feced4d3d8e946886a03ba5d9b97f8fe37ebaa274c56fdecfd18d699d6f
-
SHA512
2d17b83eb5131a2488994b9bf1526e02751f27d5fca69f284ed9f58fc154d65a5f9c7e2c01133e426ffd4e8e03320f8e40f3b8a355014062fdf72ba2599cf13c
-
SSDEEP
12288:LaiZgIGkSvdAhXnF+IrdD4RGatHg3Vs3qZhtSkGeUkIBWFM1UKvt:LaiWIXMdAtgC5kg3VsuhtnbIrl
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2160 svchost.exe 2696 4e4c6330a94c36031e42bd8b4376838a.exe 2708 svchost.exe 2660 Au_.exe -
Loads dropped DLL 5 IoCs
pid Process 2160 svchost.exe 2696 4e4c6330a94c36031e42bd8b4376838a.exe 2660 Au_.exe 2660 Au_.exe 2660 Au_.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 4e4c6330a94c36031e42bd8b4376838a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 12 IoCs
resource yara_rule behavioral1/files/0x0010000000017558-13.dat nsis_installer_1 behavioral1/files/0x0010000000017558-13.dat nsis_installer_2 behavioral1/files/0x0010000000017558-10.dat nsis_installer_1 behavioral1/files/0x0010000000017558-10.dat nsis_installer_2 behavioral1/files/0x0031000000016fe9-23.dat nsis_installer_1 behavioral1/files/0x0031000000016fe9-23.dat nsis_installer_2 behavioral1/files/0x0031000000016fe9-22.dat nsis_installer_1 behavioral1/files/0x0031000000016fe9-22.dat nsis_installer_2 behavioral1/files/0x0010000000017558-16.dat nsis_installer_1 behavioral1/files/0x0010000000017558-16.dat nsis_installer_2 behavioral1/files/0x0031000000016fe9-19.dat nsis_installer_1 behavioral1/files/0x0031000000016fe9-19.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2660 Au_.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2160 1756 4e4c6330a94c36031e42bd8b4376838a.exe 14 PID 1756 wrote to memory of 2160 1756 4e4c6330a94c36031e42bd8b4376838a.exe 14 PID 1756 wrote to memory of 2160 1756 4e4c6330a94c36031e42bd8b4376838a.exe 14 PID 1756 wrote to memory of 2160 1756 4e4c6330a94c36031e42bd8b4376838a.exe 14 PID 2160 wrote to memory of 2696 2160 svchost.exe 15 PID 2160 wrote to memory of 2696 2160 svchost.exe 15 PID 2160 wrote to memory of 2696 2160 svchost.exe 15 PID 2160 wrote to memory of 2696 2160 svchost.exe 15 PID 2696 wrote to memory of 2660 2696 4e4c6330a94c36031e42bd8b4376838a.exe 24 PID 2696 wrote to memory of 2660 2696 4e4c6330a94c36031e42bd8b4376838a.exe 24 PID 2696 wrote to memory of 2660 2696 4e4c6330a94c36031e42bd8b4376838a.exe 24 PID 2696 wrote to memory of 2660 2696 4e4c6330a94c36031e42bd8b4376838a.exe 24
Processes
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4e4c6330a94c36031e42bd8b4376838a.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\4e4c6330a94c36031e42bd8b4376838a.exe"C:\Users\Admin\AppData\Local\Temp\4e4c6330a94c36031e42bd8b4376838a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\4e4c6330a94c36031e42bd8b4376838a.exe"C:\Users\Admin\AppData\Local\Temp\4e4c6330a94c36031e42bd8b4376838a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1756
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5675d64b4f90797a33b7be8381d446839
SHA16b8114cabc593e140d74f2c330b218e069492eb3
SHA25654f9cb9870da4221bbf963d90d1e0426f29f4035ee208c8762c63380f4f0a40a
SHA512c83a978bc2ad8f77fe5cea58b7cdd8a9366bdb81f7fc29a06d9b52f672c6c32787e0df973d8542df528e2a3e4b9befda197b08b58c02e5e558c1151296f4e6a1
-
Filesize
92KB
MD595d914e27b411141c83d15a8a09f2b41
SHA1f2ef2e5849d0e3b77a2c8f13dd2717608f1cf62d
SHA25695596e27f24a80586b63a74a8e443020abfba0c0802cd01b5f9a0e2c958ffc2c
SHA5129adcac0cf9ae4ccc250cfa99f718d5299c6ffe05c574ce21e83b87786a0aad710a40cef4df33ff31c78f0aa958fdafe8a662991789af94f833b0c1873fdf7646
-
Filesize
26KB
MD5bba3ef7908035e5a073cd0e058009cc1
SHA15aba60651fcc2f359b7e41789234c448340455c6
SHA256a4633dd1c7196c80a085ccfb55bf3a33c7a76671f70574902b4078644ef08a97
SHA5124a1c7ddd943aad81598bf4dada135efcdf152313397a9b7a8204e9f0fd66969ac8328c04890a647b20eb376c4a19b56cad709fb87835f2b1fbc2613cdff49453
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
397KB
MD550133825879175605c0038e22f62bd83
SHA11fcb09a67c8cc36308944dde90942cfd2df36e18
SHA256a258035f67a6e2990e8c7cfe5ab88f65e2dc47e3516c24830a9e7189b7cb91d0
SHA5127735a0906f1b9067b4e081f3e00c9150dc489d9729085832a928412af5f50a5cf10a7872bdc82f0e7deaa1b748f7a7656ae6fdc580974ed82a1ccdfa74390f73
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
64KB
MD5420e37b577a4dd66d48f46f02b9f8455
SHA1cb17cc3f26b264ee16f791e2c51b09d1fbee63d1
SHA2560141acb4b7fd70eb364c89518e3babe747f9d0d09e692547daf9289bd93ec333
SHA512ef3b0bc2fd7606e686dace14cd7af9d055956d06edfd3081477ca3a4e257cd0ae695f1b66ec0d1b3a8bc6efb2da587c666c9b993a4b09cd14bd49064992aeed6