Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
68f93c68ac785c3c6b897c891cef952d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68f93c68ac785c3c6b897c891cef952d.exe
Resource
win10v2004-20231215-en
General
-
Target
68f93c68ac785c3c6b897c891cef952d.exe
-
Size
264KB
-
MD5
68f93c68ac785c3c6b897c891cef952d
-
SHA1
2041c1a4500b7da5d74e6626f7ee27f8c3d15b7e
-
SHA256
e4238da2ca57b0d32ab984dba069aaa0833991692ff0e7b93a9b8e4bd90eed91
-
SHA512
8184034222cf95939ded300f1b00053eddcecacde47c2638a93a009d6ccbf55915cbf6e25b4c81ba9de37069211887f9fd1bd8b87d618f6c2f2feab2ad890f61
-
SSDEEP
6144:YZDfbygyFAx3ValPeem3nPWajO/UvdpfNMqx2M2:2hNx3VaxCjO/UHfN
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 640 say5xgjgw.exe 2868 w2xw0j2tzbsu6.exe -
Loads dropped DLL 4 IoCs
pid Process 2236 68f93c68ac785c3c6b897c891cef952d.exe 2236 68f93c68ac785c3c6b897c891cef952d.exe 640 say5xgjgw.exe 640 say5xgjgw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tracking Power File TPM Process SPP ActiveX = "C:\\Users\\Admin\\Local Settings\\Application Data\\onsa2od\\say5xgjgw.exe" 68f93c68ac785c3c6b897c891cef952d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 640 say5xgjgw.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 2868 w2xw0j2tzbsu6.exe 640 say5xgjgw.exe 2868 w2xw0j2tzbsu6.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 2868 w2xw0j2tzbsu6.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 2868 w2xw0j2tzbsu6.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 2868 w2xw0j2tzbsu6.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 2868 w2xw0j2tzbsu6.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 2868 w2xw0j2tzbsu6.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 2868 w2xw0j2tzbsu6.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 640 say5xgjgw.exe 2868 w2xw0j2tzbsu6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2236 wrote to memory of 640 2236 68f93c68ac785c3c6b897c891cef952d.exe 29 PID 2236 wrote to memory of 640 2236 68f93c68ac785c3c6b897c891cef952d.exe 29 PID 2236 wrote to memory of 640 2236 68f93c68ac785c3c6b897c891cef952d.exe 29 PID 2236 wrote to memory of 640 2236 68f93c68ac785c3c6b897c891cef952d.exe 29 PID 640 wrote to memory of 2868 640 say5xgjgw.exe 28 PID 640 wrote to memory of 2868 640 say5xgjgw.exe 28 PID 640 wrote to memory of 2868 640 say5xgjgw.exe 28 PID 640 wrote to memory of 2868 640 say5xgjgw.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\68f93c68ac785c3c6b897c891cef952d.exe"C:\Users\Admin\AppData\Local\Temp\68f93c68ac785c3c6b897c891cef952d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\Local Settings\Application Data\onsa2od\say5xgjgw.exe"C:\Users\Admin\Local Settings\Application Data\onsa2od\say5xgjgw.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640
-
-
C:\Users\Admin\Local Settings\Application Data\onsa2od\w2xw0j2tzbsu6.exeWATCHDOGPROC "C:\Users\Admin\Local Settings\Application Data\onsa2od\say5xgjgw.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5f247b6e2e81ed5c90a78a741734ba280
SHA12e9c8832196639bb29757c19374b959bad6610ba
SHA25668b01cb86ae514b78760ab27d66a1fce38611cbff01b303710bc7f05db4cd190
SHA51292e1e430f8746da5481d1e168f3d4ac654b45e76c8c124187164e00f2bd80f074a81e9d5c0fdc036bcb19980e4481d98410ed571b00b38daaa414f44cb05a1a7
-
Filesize
264KB
MD568f93c68ac785c3c6b897c891cef952d
SHA12041c1a4500b7da5d74e6626f7ee27f8c3d15b7e
SHA256e4238da2ca57b0d32ab984dba069aaa0833991692ff0e7b93a9b8e4bd90eed91
SHA5128184034222cf95939ded300f1b00053eddcecacde47c2638a93a009d6ccbf55915cbf6e25b4c81ba9de37069211887f9fd1bd8b87d618f6c2f2feab2ad890f61