Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 14:21
Static task
static1
Behavioral task
behavioral1
Sample
75332c4bd0226cebbc03b503195fb8fc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75332c4bd0226cebbc03b503195fb8fc.exe
Resource
win10v2004-20231215-en
General
-
Target
75332c4bd0226cebbc03b503195fb8fc.exe
-
Size
484KB
-
MD5
75332c4bd0226cebbc03b503195fb8fc
-
SHA1
055c9628988f31ea73c8cccf165bb1af956e4ed8
-
SHA256
32a2e69906bf41749807cd992b997d09511d4ecf0a730ec4d3ea6f311dfd3ce6
-
SHA512
6e00e1b25cc07d20ac0e710bfc5d1544adc5bb5649d6799bf36f19b1e9c8b10be686f6e14cf4400142cbcd0c1ba60781e72c84f856acefdfb8039d63c82fdfe1
-
SSDEEP
6144:ZZiqxGmSF71zKKhT03YZBmodoxaK2lhODHIPi7JgQ9cVDoi5pPp6:LXkmo7zhUYZA5j2uJncDjpPp
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2976 strdata.exe 2760 strdata.exe 2280 strdata.exe 2692 strdata.exe -
Loads dropped DLL 4 IoCs
pid Process 1692 75332c4bd0226cebbc03b503195fb8fc.exe 1692 75332c4bd0226cebbc03b503195fb8fc.exe 2976 strdata.exe 2760 strdata.exe -
Maps connected drives based on registry 3 TTPs 12 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 strdata.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 strdata.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 75332c4bd0226cebbc03b503195fb8fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 75332c4bd0226cebbc03b503195fb8fc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 75332c4bd0226cebbc03b503195fb8fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum strdata.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum strdata.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum strdata.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 75332c4bd0226cebbc03b503195fb8fc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 75332c4bd0226cebbc03b503195fb8fc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 75332c4bd0226cebbc03b503195fb8fc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 strdata.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\strdata.exe 75332c4bd0226cebbc03b503195fb8fc.exe File opened for modification C:\Windows\SysWOW64\strdata.exe 75332c4bd0226cebbc03b503195fb8fc.exe File created C:\Windows\SysWOW64\strdata.exe strdata.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1976 set thread context of 2064 1976 75332c4bd0226cebbc03b503195fb8fc.exe 29 PID 2064 set thread context of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 2976 set thread context of 2760 2976 strdata.exe 32 PID 2760 set thread context of 2280 2760 strdata.exe 33 PID 2280 set thread context of 2692 2280 strdata.exe 34 -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1104 75332c4bd0226cebbc03b503195fb8fc.exe 1976 75332c4bd0226cebbc03b503195fb8fc.exe 2064 75332c4bd0226cebbc03b503195fb8fc.exe 2976 strdata.exe 2760 strdata.exe 2280 strdata.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1976 1104 75332c4bd0226cebbc03b503195fb8fc.exe 28 PID 1104 wrote to memory of 1976 1104 75332c4bd0226cebbc03b503195fb8fc.exe 28 PID 1104 wrote to memory of 1976 1104 75332c4bd0226cebbc03b503195fb8fc.exe 28 PID 1104 wrote to memory of 1976 1104 75332c4bd0226cebbc03b503195fb8fc.exe 28 PID 1104 wrote to memory of 1976 1104 75332c4bd0226cebbc03b503195fb8fc.exe 28 PID 1104 wrote to memory of 1976 1104 75332c4bd0226cebbc03b503195fb8fc.exe 28 PID 1104 wrote to memory of 1976 1104 75332c4bd0226cebbc03b503195fb8fc.exe 28 PID 1104 wrote to memory of 1976 1104 75332c4bd0226cebbc03b503195fb8fc.exe 28 PID 1976 wrote to memory of 2064 1976 75332c4bd0226cebbc03b503195fb8fc.exe 29 PID 1976 wrote to memory of 2064 1976 75332c4bd0226cebbc03b503195fb8fc.exe 29 PID 1976 wrote to memory of 2064 1976 75332c4bd0226cebbc03b503195fb8fc.exe 29 PID 1976 wrote to memory of 2064 1976 75332c4bd0226cebbc03b503195fb8fc.exe 29 PID 1976 wrote to memory of 2064 1976 75332c4bd0226cebbc03b503195fb8fc.exe 29 PID 1976 wrote to memory of 2064 1976 75332c4bd0226cebbc03b503195fb8fc.exe 29 PID 1976 wrote to memory of 2064 1976 75332c4bd0226cebbc03b503195fb8fc.exe 29 PID 1976 wrote to memory of 2064 1976 75332c4bd0226cebbc03b503195fb8fc.exe 29 PID 2064 wrote to memory of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 2064 wrote to memory of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 2064 wrote to memory of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 2064 wrote to memory of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 2064 wrote to memory of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 2064 wrote to memory of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 2064 wrote to memory of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 2064 wrote to memory of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 2064 wrote to memory of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 2064 wrote to memory of 1692 2064 75332c4bd0226cebbc03b503195fb8fc.exe 30 PID 1692 wrote to memory of 2976 1692 75332c4bd0226cebbc03b503195fb8fc.exe 31 PID 1692 wrote to memory of 2976 1692 75332c4bd0226cebbc03b503195fb8fc.exe 31 PID 1692 wrote to memory of 2976 1692 75332c4bd0226cebbc03b503195fb8fc.exe 31 PID 1692 wrote to memory of 2976 1692 75332c4bd0226cebbc03b503195fb8fc.exe 31 PID 2976 wrote to memory of 2760 2976 strdata.exe 32 PID 2976 wrote to memory of 2760 2976 strdata.exe 32 PID 2976 wrote to memory of 2760 2976 strdata.exe 32 PID 2976 wrote to memory of 2760 2976 strdata.exe 32 PID 2976 wrote to memory of 2760 2976 strdata.exe 32 PID 2976 wrote to memory of 2760 2976 strdata.exe 32 PID 2976 wrote to memory of 2760 2976 strdata.exe 32 PID 2976 wrote to memory of 2760 2976 strdata.exe 32 PID 2760 wrote to memory of 2280 2760 strdata.exe 33 PID 2760 wrote to memory of 2280 2760 strdata.exe 33 PID 2760 wrote to memory of 2280 2760 strdata.exe 33 PID 2760 wrote to memory of 2280 2760 strdata.exe 33 PID 2760 wrote to memory of 2280 2760 strdata.exe 33 PID 2760 wrote to memory of 2280 2760 strdata.exe 33 PID 2760 wrote to memory of 2280 2760 strdata.exe 33 PID 2760 wrote to memory of 2280 2760 strdata.exe 33 PID 2280 wrote to memory of 2692 2280 strdata.exe 34 PID 2280 wrote to memory of 2692 2280 strdata.exe 34 PID 2280 wrote to memory of 2692 2280 strdata.exe 34 PID 2280 wrote to memory of 2692 2280 strdata.exe 34 PID 2280 wrote to memory of 2692 2280 strdata.exe 34 PID 2280 wrote to memory of 2692 2280 strdata.exe 34 PID 2280 wrote to memory of 2692 2280 strdata.exe 34 PID 2280 wrote to memory of 2692 2280 strdata.exe 34 PID 2280 wrote to memory of 2692 2280 strdata.exe 34 PID 2280 wrote to memory of 2692 2280 strdata.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\75332c4bd0226cebbc03b503195fb8fc.exe"C:\Users\Admin\AppData\Local\Temp\75332c4bd0226cebbc03b503195fb8fc.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\75332c4bd0226cebbc03b503195fb8fc.exeC:\Users\Admin\AppData\Local\Temp\75332c4bd0226cebbc03b503195fb8fc.exe2⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\75332c4bd0226cebbc03b503195fb8fc.exeC:\Users\Admin\AppData\Local\Temp\75332c4bd0226cebbc03b503195fb8fc.exe3⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\75332c4bd0226cebbc03b503195fb8fc.exeC:\Users\Admin\AppData\Local\Temp\75332c4bd0226cebbc03b503195fb8fc.exe4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\strdata.exeC:\Windows\system32\strdata.exe C:\Users\Admin\AppData\Local\Temp\75332c4bd0226cebbc03b503195fb8fc.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\strdata.exeC:\Windows\SysWOW64\strdata.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\strdata.exeC:\Windows\SysWOW64\strdata.exe7⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\strdata.exeC:\Windows\SysWOW64\strdata.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2692
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD575332c4bd0226cebbc03b503195fb8fc
SHA1055c9628988f31ea73c8cccf165bb1af956e4ed8
SHA25632a2e69906bf41749807cd992b997d09511d4ecf0a730ec4d3ea6f311dfd3ce6
SHA5126e00e1b25cc07d20ac0e710bfc5d1544adc5bb5649d6799bf36f19b1e9c8b10be686f6e14cf4400142cbcd0c1ba60781e72c84f856acefdfb8039d63c82fdfe1