Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 15:59
Static task
static1
Behavioral task
behavioral1
Sample
7ade31e485c4e7500d6e52288f0abfe9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ade31e485c4e7500d6e52288f0abfe9.exe
Resource
win10v2004-20231215-en
General
-
Target
7ade31e485c4e7500d6e52288f0abfe9.exe
-
Size
120KB
-
MD5
7ade31e485c4e7500d6e52288f0abfe9
-
SHA1
794d374658b19fe90c92fcbe70c7277cf756b30c
-
SHA256
c252139e031854594312b717ea84c8d71a2089667421a6046dea0ce9e7e8c08c
-
SHA512
96dac847de6ea633a872aead04eae2b92557129d895ad2b98b54cee613c87a9ee4c16303e1775f85fe12a12be788a1f09fb7f23b12e45aac4621ee47066fec97
-
SSDEEP
3072:N/uEwf9se/JUkxR9uSstfCojxsdQk9sgc:N/uffOCuQRZstFxsdl9s
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} userinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\CTFMOM.EXE" userinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} 7ade31e485c4e7500d6e52288f0abfe9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\CTFMOM.EXE" 7ade31e485c4e7500d6e52288f0abfe9.exe -
Executes dropped EXE 2 IoCs
pid Process 2692 CTFMOM.EXE 2628 CTFMOM.EXE -
Loads dropped DLL 7 IoCs
pid Process 2312 7ade31e485c4e7500d6e52288f0abfe9.exe 2692 CTFMOM.EXE 2692 CTFMOM.EXE 2692 CTFMOM.EXE 2944 userinit.exe 2628 CTFMOM.EXE 2628 CTFMOM.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 2944 2692 CTFMOM.EXE 29 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\CTFMOM.EXE 7ade31e485c4e7500d6e52288f0abfe9.exe File created C:\Program Files\CTFMOM.EXE 7ade31e485c4e7500d6e52288f0abfe9.exe File opened for modification C:\Program Files\CTFMOM.EXE userinit.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2692 2312 7ade31e485c4e7500d6e52288f0abfe9.exe 28 PID 2312 wrote to memory of 2692 2312 7ade31e485c4e7500d6e52288f0abfe9.exe 28 PID 2312 wrote to memory of 2692 2312 7ade31e485c4e7500d6e52288f0abfe9.exe 28 PID 2312 wrote to memory of 2692 2312 7ade31e485c4e7500d6e52288f0abfe9.exe 28 PID 2312 wrote to memory of 2692 2312 7ade31e485c4e7500d6e52288f0abfe9.exe 28 PID 2312 wrote to memory of 2692 2312 7ade31e485c4e7500d6e52288f0abfe9.exe 28 PID 2312 wrote to memory of 2692 2312 7ade31e485c4e7500d6e52288f0abfe9.exe 28 PID 2692 wrote to memory of 2944 2692 CTFMOM.EXE 29 PID 2692 wrote to memory of 2944 2692 CTFMOM.EXE 29 PID 2692 wrote to memory of 2944 2692 CTFMOM.EXE 29 PID 2692 wrote to memory of 2944 2692 CTFMOM.EXE 29 PID 2692 wrote to memory of 2944 2692 CTFMOM.EXE 29 PID 2692 wrote to memory of 2944 2692 CTFMOM.EXE 29 PID 2692 wrote to memory of 2944 2692 CTFMOM.EXE 29 PID 2692 wrote to memory of 2944 2692 CTFMOM.EXE 29 PID 2692 wrote to memory of 2944 2692 CTFMOM.EXE 29 PID 2944 wrote to memory of 2628 2944 userinit.exe 30 PID 2944 wrote to memory of 2628 2944 userinit.exe 30 PID 2944 wrote to memory of 2628 2944 userinit.exe 30 PID 2944 wrote to memory of 2628 2944 userinit.exe 30 PID 2944 wrote to memory of 2628 2944 userinit.exe 30 PID 2944 wrote to memory of 2628 2944 userinit.exe 30 PID 2944 wrote to memory of 2628 2944 userinit.exe 30 PID 2628 wrote to memory of 2608 2628 CTFMOM.EXE 31 PID 2628 wrote to memory of 2608 2628 CTFMOM.EXE 31 PID 2628 wrote to memory of 2608 2628 CTFMOM.EXE 31 PID 2628 wrote to memory of 2608 2628 CTFMOM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ade31e485c4e7500d6e52288f0abfe9.exe"C:\Users\Admin\AppData\Local\Temp\7ade31e485c4e7500d6e52288f0abfe9.exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files\CTFMOM.EXE"C:\Program Files\CTFMOM.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\userinit.exeC:\Windows\SYSTEM32\userinit.exe3⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files\CTFMOM.EXE"C:\Program Files\CTFMOM.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE5⤵PID:2608
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD57ade31e485c4e7500d6e52288f0abfe9
SHA1794d374658b19fe90c92fcbe70c7277cf756b30c
SHA256c252139e031854594312b717ea84c8d71a2089667421a6046dea0ce9e7e8c08c
SHA51296dac847de6ea633a872aead04eae2b92557129d895ad2b98b54cee613c87a9ee4c16303e1775f85fe12a12be788a1f09fb7f23b12e45aac4621ee47066fec97
-
Filesize
26KB
MD561ac3efdfacfdd3f0f11dd4fd4044223
SHA1211295ccda6cf6409189279bf66a212bd53fc650
SHA256538fe1012fedc72727a8de0c2c01944b3d35c29812ecef88e95aac07235e0b0b
SHA512754aefaa81b2435e05037c0a7d057fd86ef8f62d49aad399d7fc4ead1e68793e5cc9ba639245a133cfb6f67d1f4bb6a95a972da3ef4ed92855cb1742241f89eb