Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 18:07
Static task
static1
Behavioral task
behavioral1
Sample
000a31a1845bc21c080793e385c71f3e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
000a31a1845bc21c080793e385c71f3e.exe
Resource
win10v2004-20231215-en
General
-
Target
000a31a1845bc21c080793e385c71f3e.exe
-
Size
63KB
-
MD5
000a31a1845bc21c080793e385c71f3e
-
SHA1
74297ca6f9a1944f96e04aa9a4f83e7befa2e2e2
-
SHA256
5530f88666bfe7612b55cad4296c1fda8fff802d215ba4b3e28493083c6448bc
-
SHA512
bbbd6c0dbd8c0a29cf30c38f87ae2fcc885522ff6f727c85b1954b9578ec81743eec56ac1e3ba5250e675c687993787676b9eda886ca2b5d2bfac4ba84396642
-
SSDEEP
1536:1X0p5M1OKp54+lRkd9l8LXmPhhc+UZKtv4oN/ASfMkwdXs2:F04zoLlUUcDItvR6SfMkwdc2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2788 servicio.exe 2852 servicio.exe -
Loads dropped DLL 3 IoCs
pid Process 2884 000a31a1845bc21c080793e385c71f3e.exe 2884 000a31a1845bc21c080793e385c71f3e.exe 2788 servicio.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\servicio.exe" 000a31a1845bc21c080793e385c71f3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Service = "servicio.exe" 000a31a1845bc21c080793e385c71f3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\servicio.exe" servicio.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3020 set thread context of 2884 3020 000a31a1845bc21c080793e385c71f3e.exe 28 PID 2788 set thread context of 2852 2788 servicio.exe 30 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3020 000a31a1845bc21c080793e385c71f3e.exe 2788 servicio.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2884 3020 000a31a1845bc21c080793e385c71f3e.exe 28 PID 3020 wrote to memory of 2884 3020 000a31a1845bc21c080793e385c71f3e.exe 28 PID 3020 wrote to memory of 2884 3020 000a31a1845bc21c080793e385c71f3e.exe 28 PID 3020 wrote to memory of 2884 3020 000a31a1845bc21c080793e385c71f3e.exe 28 PID 3020 wrote to memory of 2884 3020 000a31a1845bc21c080793e385c71f3e.exe 28 PID 3020 wrote to memory of 2884 3020 000a31a1845bc21c080793e385c71f3e.exe 28 PID 3020 wrote to memory of 2884 3020 000a31a1845bc21c080793e385c71f3e.exe 28 PID 3020 wrote to memory of 2884 3020 000a31a1845bc21c080793e385c71f3e.exe 28 PID 3020 wrote to memory of 2884 3020 000a31a1845bc21c080793e385c71f3e.exe 28 PID 2884 wrote to memory of 2788 2884 000a31a1845bc21c080793e385c71f3e.exe 29 PID 2884 wrote to memory of 2788 2884 000a31a1845bc21c080793e385c71f3e.exe 29 PID 2884 wrote to memory of 2788 2884 000a31a1845bc21c080793e385c71f3e.exe 29 PID 2884 wrote to memory of 2788 2884 000a31a1845bc21c080793e385c71f3e.exe 29 PID 2788 wrote to memory of 2852 2788 servicio.exe 30 PID 2788 wrote to memory of 2852 2788 servicio.exe 30 PID 2788 wrote to memory of 2852 2788 servicio.exe 30 PID 2788 wrote to memory of 2852 2788 servicio.exe 30 PID 2788 wrote to memory of 2852 2788 servicio.exe 30 PID 2788 wrote to memory of 2852 2788 servicio.exe 30 PID 2788 wrote to memory of 2852 2788 servicio.exe 30 PID 2788 wrote to memory of 2852 2788 servicio.exe 30 PID 2788 wrote to memory of 2852 2788 servicio.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\000a31a1845bc21c080793e385c71f3e.exe"C:\Users\Admin\AppData\Local\Temp\000a31a1845bc21c080793e385c71f3e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\000a31a1845bc21c080793e385c71f3e.exe
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\servicio.exe"C:\Users\Admin\AppData\Local\Temp\servicio.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\servicio.exe
- Executes dropped EXE
- Adds Run key to start application
PID:2852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5000a31a1845bc21c080793e385c71f3e
SHA174297ca6f9a1944f96e04aa9a4f83e7befa2e2e2
SHA2565530f88666bfe7612b55cad4296c1fda8fff802d215ba4b3e28493083c6448bc
SHA512bbbd6c0dbd8c0a29cf30c38f87ae2fcc885522ff6f727c85b1954b9578ec81743eec56ac1e3ba5250e675c687993787676b9eda886ca2b5d2bfac4ba84396642