Analysis
-
max time kernel
144s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
febff8b8a314c8920ec8443950b059a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
febff8b8a314c8920ec8443950b059a8.exe
Resource
win10v2004-20231215-en
General
-
Target
febff8b8a314c8920ec8443950b059a8.exe
-
Size
139KB
-
MD5
febff8b8a314c8920ec8443950b059a8
-
SHA1
3d4fa51f871e8c7b3a965cd319041c29f1b536ec
-
SHA256
6571e17bf86c34375654426ffcda18fcf363ca64ede2c7a365d03ef01d6a9c8c
-
SHA512
a3215fbdd52e7767e86d7af4bb868867fac5d0dcf9980ee08286bf6cea1d5cacd89dbb12b50d319f6b15a2d56f135f1c3ceeb545e454c581143fecc2bbd6ed4d
-
SSDEEP
1536:ZyCrhycxa8EgNyHXSi1bpTfyox0VHlSTlRhr27mw:ACNycxZ5YbkoxMgTlRRMR
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2796 odjebiav2.exe 2876 odjebiav2.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 febff8b8a314c8920ec8443950b059a8.exe 1968 febff8b8a314c8920ec8443950b059a8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MS Svasta Pomalo v2 = "C:\\Users\\Admin\\AppData\\Roaming\\odjebiav2.exe" febff8b8a314c8920ec8443950b059a8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\MS Svasta Pomalo v2 = "C:\\Users\\Admin\\AppData\\Roaming\\odjebiav2.exe" febff8b8a314c8920ec8443950b059a8.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1972 set thread context of 1968 1972 febff8b8a314c8920ec8443950b059a8.exe 28 PID 2796 set thread context of 2876 2796 odjebiav2.exe 30 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1968 1972 febff8b8a314c8920ec8443950b059a8.exe 28 PID 1972 wrote to memory of 1968 1972 febff8b8a314c8920ec8443950b059a8.exe 28 PID 1972 wrote to memory of 1968 1972 febff8b8a314c8920ec8443950b059a8.exe 28 PID 1972 wrote to memory of 1968 1972 febff8b8a314c8920ec8443950b059a8.exe 28 PID 1972 wrote to memory of 1968 1972 febff8b8a314c8920ec8443950b059a8.exe 28 PID 1972 wrote to memory of 1968 1972 febff8b8a314c8920ec8443950b059a8.exe 28 PID 1972 wrote to memory of 1968 1972 febff8b8a314c8920ec8443950b059a8.exe 28 PID 1972 wrote to memory of 1968 1972 febff8b8a314c8920ec8443950b059a8.exe 28 PID 1972 wrote to memory of 1968 1972 febff8b8a314c8920ec8443950b059a8.exe 28 PID 1968 wrote to memory of 2796 1968 febff8b8a314c8920ec8443950b059a8.exe 29 PID 1968 wrote to memory of 2796 1968 febff8b8a314c8920ec8443950b059a8.exe 29 PID 1968 wrote to memory of 2796 1968 febff8b8a314c8920ec8443950b059a8.exe 29 PID 1968 wrote to memory of 2796 1968 febff8b8a314c8920ec8443950b059a8.exe 29 PID 2796 wrote to memory of 2876 2796 odjebiav2.exe 30 PID 2796 wrote to memory of 2876 2796 odjebiav2.exe 30 PID 2796 wrote to memory of 2876 2796 odjebiav2.exe 30 PID 2796 wrote to memory of 2876 2796 odjebiav2.exe 30 PID 2796 wrote to memory of 2876 2796 odjebiav2.exe 30 PID 2796 wrote to memory of 2876 2796 odjebiav2.exe 30 PID 2796 wrote to memory of 2876 2796 odjebiav2.exe 30 PID 2796 wrote to memory of 2876 2796 odjebiav2.exe 30 PID 2796 wrote to memory of 2876 2796 odjebiav2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\febff8b8a314c8920ec8443950b059a8.exe"C:\Users\Admin\AppData\Local\Temp\febff8b8a314c8920ec8443950b059a8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\febff8b8a314c8920ec8443950b059a8.exe"C:\Users\Admin\AppData\Local\Temp\febff8b8a314c8920ec8443950b059a8.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\odjebiav2.exe"C:\Users\Admin\AppData\Roaming\odjebiav2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Roaming\odjebiav2.exe"C:\Users\Admin\AppData\Roaming\odjebiav2.exe"4⤵
- Executes dropped EXE
PID:2876
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5febff8b8a314c8920ec8443950b059a8
SHA13d4fa51f871e8c7b3a965cd319041c29f1b536ec
SHA2566571e17bf86c34375654426ffcda18fcf363ca64ede2c7a365d03ef01d6a9c8c
SHA512a3215fbdd52e7767e86d7af4bb868867fac5d0dcf9980ee08286bf6cea1d5cacd89dbb12b50d319f6b15a2d56f135f1c3ceeb545e454c581143fecc2bbd6ed4d