Analysis
-
max time kernel
121s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
65a71e797532fd22ae5ad59d92367d0f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65a71e797532fd22ae5ad59d92367d0f.exe
Resource
win10v2004-20231222-en
General
-
Target
65a71e797532fd22ae5ad59d92367d0f.exe
-
Size
426KB
-
MD5
65a71e797532fd22ae5ad59d92367d0f
-
SHA1
49a1f0640a792f383ce33dcd4abf411ffac3db7f
-
SHA256
12ea8131dddcc2466ede5afedc007dc83bed3f5cd06480507cd8d36433a4c208
-
SHA512
298e085300468ed3deb93e28ff76c9f319c65af6ad3dcbdf8feacc4830ade7c968b229feb1cd1559cb36627712e45ffda04e75a18c68839e6bc7534e55fac1ea
-
SSDEEP
12288:NtKe6Zv23YdAPaPUD18t2o7UZlgEt4lsAXA2:d6Zv2aP7tiTt4lTXx
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983} 65a71e797532fd22ae5ad59d92367d0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msvfb32.exe" 65a71e797532fd22ae5ad59d92367d0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msvfb32.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 svchost.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 65a71e797532fd22ae5ad59d92367d0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 65a71e797532fd22ae5ad59d92367d0f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 65a71e797532fd22ae5ad59d92367d0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\concp32.exe 65a71e797532fd22ae5ad59d92367d0f.exe File opened for modification C:\Windows\SysWOW64\concp32.exe 65a71e797532fd22ae5ad59d92367d0f.exe File created C:\Windows\SysWOW64\vcl32.exe 65a71e797532fd22ae5ad59d92367d0f.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe 65a71e797532fd22ae5ad59d92367d0f.exe File created C:\Windows\SysWOW64\msvfb32.exe 65a71e797532fd22ae5ad59d92367d0f.exe File opened for modification C:\Windows\SysWOW64\msvfb32.exe 65a71e797532fd22ae5ad59d92367d0f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 65a71e797532fd22ae5ad59d92367d0f.exe File opened for modification C:\Windows\svchost.exe 65a71e797532fd22ae5ad59d92367d0f.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983}\ax = 5cbd3ff3fd3c61724de20668e0867a98 65a71e797532fd22ae5ad59d92367d0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983}\sm = ebb5525fa3bcf9422c8ff945977d6af9 65a71e797532fd22ae5ad59d92367d0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 65a71e797532fd22ae5ad59d92367d0f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983} 65a71e797532fd22ae5ad59d92367d0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6615874D-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 65a71e797532fd22ae5ad59d92367d0f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1896 65a71e797532fd22ae5ad59d92367d0f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2180 1896 65a71e797532fd22ae5ad59d92367d0f.exe 28 PID 1896 wrote to memory of 2180 1896 65a71e797532fd22ae5ad59d92367d0f.exe 28 PID 1896 wrote to memory of 2180 1896 65a71e797532fd22ae5ad59d92367d0f.exe 28 PID 1896 wrote to memory of 2180 1896 65a71e797532fd22ae5ad59d92367d0f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\65a71e797532fd22ae5ad59d92367d0f.exe"C:\Users\Admin\AppData\Local\Temp\65a71e797532fd22ae5ad59d92367d0f.exe"1⤵
- Modifies Installed Components in the registry
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
434KB
MD595791fd834305cf31d624e30eaaed7b8
SHA101a25448281f6831f27237f2c6526957e6f945a7
SHA256acbbf566b41f907a8be35f70c99b64d7614a0323e9fd9f3a37c343d9b460f564
SHA512bb1be310d62d40ffced9e6e524927021b437b959cc471916af123def5c3552330f2268aef5d0fa58960c57633c9443a63f309df3bff5b4f3b3647c3a9308859f
-
Filesize
428KB
MD50812e32c8c00155cbf281e1ce8c46c0e
SHA1db040fcee23bee264e5ab8c7e1765cbf3ea306b7
SHA256cefa0a7d5433d159be39c5adbb2149305eb81320e9087b9b2d37c86f12ff9117
SHA5125544bd044c34b138f1a8e0a90a5dcc5e03ae9b917aa5c5ed6ccafb033643a86de154776e58696730cf20b78c86fa0b48bef3c319c294a0df6b06e5ce8f317e8d