Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
533a7dbf86c09faa41582c2667704d6a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
533a7dbf86c09faa41582c2667704d6a.exe
Resource
win10v2004-20231215-en
General
-
Target
533a7dbf86c09faa41582c2667704d6a.exe
-
Size
60KB
-
MD5
533a7dbf86c09faa41582c2667704d6a
-
SHA1
8d02c26bd9964f61659d7e7bbd10b9a18f6f9bdb
-
SHA256
cff2688925162938aece0c55ffa49b346d8bd5cab177c8d4250befbd098d0536
-
SHA512
ed94fce2c35d33e7cb19903f990dc0c2573b8880ab1ae14574869a0df28e3658f1f95f538c41202ce77bcefc7986ed0300b6cb40219ffac92d3e19de46eddf4d
-
SSDEEP
1536:adrC+sr5GfbQ26SvrFrlLXtwrUidKbRt:yfbQUrFpLgdKlt
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DllHst = "C:\\Windows\\System\\dllhst3g.exe /waitservice" 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 533a7dbf86c09faa41582c2667704d6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IEudinit = "C:\\Windows\\System\\ieudinit.exe /waitservice" 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 533a7dbf86c09faa41582c2667704d6a.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\sessmgr.exe 533a7dbf86c09faa41582c2667704d6a.exe -
Executes dropped EXE 1 IoCs
pid Process 880 sessmgr.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System\ieudinit.exe 533a7dbf86c09faa41582c2667704d6a.exe File created C:\Windows\System\dllhst3g.exe 533a7dbf86c09faa41582c2667704d6a.exe File created C:\Windows\System\ieudinit.exe 533a7dbf86c09faa41582c2667704d6a.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 533a7dbf86c09faa41582c2667704d6a.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\SessMgr = "C:\\Windows\\System32\\drivers\\sessmgr.exe /waitservice" 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\Software 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies 533a7dbf86c09faa41582c2667704d6a.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer 533a7dbf86c09faa41582c2667704d6a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5072 wrote to memory of 880 5072 533a7dbf86c09faa41582c2667704d6a.exe 19 PID 5072 wrote to memory of 880 5072 533a7dbf86c09faa41582c2667704d6a.exe 19 PID 5072 wrote to memory of 880 5072 533a7dbf86c09faa41582c2667704d6a.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\533a7dbf86c09faa41582c2667704d6a.exe"C:\Users\Admin\AppData\Local\Temp\533a7dbf86c09faa41582c2667704d6a.exe"1⤵
- Adds policy Run key to start application
- Drops file in Drivers directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Roaming\sessmgr.exeC:\Users\Admin\AppData\Roaming\sessmgr.exe /waitservice2⤵
- Executes dropped EXE
PID:880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5533a7dbf86c09faa41582c2667704d6a
SHA18d02c26bd9964f61659d7e7bbd10b9a18f6f9bdb
SHA256cff2688925162938aece0c55ffa49b346d8bd5cab177c8d4250befbd098d0536
SHA512ed94fce2c35d33e7cb19903f990dc0c2573b8880ab1ae14574869a0df28e3658f1f95f538c41202ce77bcefc7986ed0300b6cb40219ffac92d3e19de46eddf4d