Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
674f71b2b48443aa69cc14d1a22cecf9.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
674f71b2b48443aa69cc14d1a22cecf9.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
674f71b2b48443aa69cc14d1a22cecf9.exe
-
Size
144KB
-
MD5
674f71b2b48443aa69cc14d1a22cecf9
-
SHA1
add0f5d3daf0f63da5f4ebfc2b47d560ea1df4cc
-
SHA256
71fc27db789a3f9748acefa1c70bca2a6d8467f979fc99a409272ef654f9b27f
-
SHA512
f992b075d57b3a77df921a42c454427379362d92b9c92139c97ea4d29f56441abaa2693c18534d73448e9106529b09d2dde330999fef5683b04d03dd7508c4e3
-
SSDEEP
3072:htqQUzfxR0IGcCs9O19GsURaOcitY9tdwLi0+EF6RAn:htqQ6PRD9OebIOc8YEgRE
Score
8/10
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\LanmanServer\Parameters\ServiceDll = "C:\\Windows\\system32\\Webclient.dll" 674f71b2b48443aa69cc14d1a22cecf9.exe -
Deletes itself 1 IoCs
pid Process 2188 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Webclient.dll 674f71b2b48443aa69cc14d1a22cecf9.exe File created C:\Windows\SysWOW64\Webclient.dll 674f71b2b48443aa69cc14d1a22cecf9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2188 1900 674f71b2b48443aa69cc14d1a22cecf9.exe 16 PID 1900 wrote to memory of 2188 1900 674f71b2b48443aa69cc14d1a22cecf9.exe 16 PID 1900 wrote to memory of 2188 1900 674f71b2b48443aa69cc14d1a22cecf9.exe 16 PID 1900 wrote to memory of 2188 1900 674f71b2b48443aa69cc14d1a22cecf9.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\674f71b2b48443aa69cc14d1a22cecf9.exe"C:\Users\Admin\AppData\Local\Temp\674f71b2b48443aa69cc14d1a22cecf9.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\674F71~1.EXE2⤵
- Deletes itself
PID:2188
-