Analysis
-
max time kernel
155s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
0601bbf81cb7ab4aa18a55d9086f636e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0601bbf81cb7ab4aa18a55d9086f636e.exe
Resource
win10v2004-20231215-en
General
-
Target
0601bbf81cb7ab4aa18a55d9086f636e.exe
-
Size
61KB
-
MD5
0601bbf81cb7ab4aa18a55d9086f636e
-
SHA1
77cb5557dc22dba7d17959994914288f8c652274
-
SHA256
8fb843ba497dfa1f6020cd072322efd3260b8b284423631aeda1d8712288c878
-
SHA512
20dc5ade693ff65db105a91f76d97bb04efa41e3943b32d83a86645d9acb0e7d82ade725253b75496deea606a93284dda052dad4e553f93504bf54d4edc9ad50
-
SSDEEP
1536:xRw1zNZQaeG0wiIyZd2iQqGu4oyI2OxhAIMFsOIDT6dm:xRwlnQnG0wiIy4uMIrxTc
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 2 IoCs
pid Process 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 2368 RunDll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\System Share = "RunDll32 \"C:\\Windows\\Media\\svclsaet.dll\",Init" 0601bbf81cb7ab4aa18a55d9086f636e.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\oobe\mshostup.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe File opened for modification C:\Windows\SysWOW64\oobe\mshostup.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Media\svclsaet.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe File opened for modification C:\Windows\Media\svclsaet.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe File created C:\Windows\Panther\logsrvet.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe File opened for modification C:\Windows\Panther\logsrvet.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController 0601bbf81cb7ab4aa18a55d9086f636e.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0 0601bbf81cb7ab4aa18a55d9086f636e.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral 0601bbf81cb7ab4aa18a55d9086f636e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter 0601bbf81cb7ab4aa18a55d9086f636e.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0 0601bbf81cb7ab4aa18a55d9086f636e.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 0601bbf81cb7ab4aa18a55d9086f636e.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2368 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 27 PID 1936 wrote to memory of 2368 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 27 PID 1936 wrote to memory of 2368 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 27 PID 1936 wrote to memory of 2368 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 27 PID 1936 wrote to memory of 2368 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 27 PID 1936 wrote to memory of 2368 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 27 PID 1936 wrote to memory of 2368 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 27 PID 1936 wrote to memory of 1128 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 6 PID 1936 wrote to memory of 1128 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 6 PID 1936 wrote to memory of 1220 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 12 PID 1936 wrote to memory of 1220 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 12 PID 1936 wrote to memory of 1264 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 11 PID 1936 wrote to memory of 1264 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 11 PID 1936 wrote to memory of 2368 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 27 PID 1936 wrote to memory of 2368 1936 0601bbf81cb7ab4aa18a55d9086f636e.exe 27
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\0601bbf81cb7ab4aa18a55d9086f636e.exe"C:\Users\Admin\AppData\Local\Temp\0601bbf81cb7ab4aa18a55d9086f636e.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32 "C:\Users\Admin\AppData\Local\Temp\96F2.tmp",Init3⤵
- Loads dropped DLL
PID:2368
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5954ae278062ec5db4f5c1e2fcfa79905
SHA1a1f1ae731a955e4c688e5667981649baf47acada
SHA2564683241676f4974d0f5ad3aab04724f9953ca959b5eaf895cdc4db2778e4351b
SHA5122b750e5e63175d2c90c7e4e9a0f0074fd26e55341dfd8aabb7561985bc5508dbc6bb3ab7d5b2fa135676f6490203b58f3236775af1fda869ec89936003c3f471