Analysis
-
max time kernel
12s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 18:21
Static task
static1
Behavioral task
behavioral1
Sample
004db7737105ea6bd66fa0f54a3a93df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
004db7737105ea6bd66fa0f54a3a93df.exe
Resource
win10v2004-20231215-en
General
-
Target
004db7737105ea6bd66fa0f54a3a93df.exe
-
Size
101KB
-
MD5
004db7737105ea6bd66fa0f54a3a93df
-
SHA1
829b87387ecbec21fbf1ba70cf22e655e4810ed6
-
SHA256
18cf498cc68fafb22321be2d377408448adf3cd0938bfba6868e7eb3476eea50
-
SHA512
6bc9afdf9a4077d022458dd0d15d0a2387dc1e48c6328fe7a1538d3ce3ed0e21f5ac9adb7a612266084807fa520c08f56f05488bec927ff90e80e25a5f5fa142
-
SSDEEP
3072:AXZPXXU/kR5ZYQz8wh36E1vCP2LuogmnaHGhN:GZPn5pXhKE29oL1
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2200-3-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2200-5-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2284-7-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2284-10-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2284-22-0x0000000000400000-0x0000000000462000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Init = "\"C:\\Users\\Admin\\AppData\\Roaming\\xjbjammluxuuthzr1b1bxwkwv2lmpnnz2\\svcnost.exe\"" 004db7737105ea6bd66fa0f54a3a93df.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2200 004db7737105ea6bd66fa0f54a3a93df.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2200 004db7737105ea6bd66fa0f54a3a93df.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2200 004db7737105ea6bd66fa0f54a3a93df.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2284 2200 004db7737105ea6bd66fa0f54a3a93df.exe 28 PID 2200 wrote to memory of 2284 2200 004db7737105ea6bd66fa0f54a3a93df.exe 28 PID 2200 wrote to memory of 2284 2200 004db7737105ea6bd66fa0f54a3a93df.exe 28 PID 2200 wrote to memory of 2284 2200 004db7737105ea6bd66fa0f54a3a93df.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\004db7737105ea6bd66fa0f54a3a93df.exe"C:\Users\Admin\AppData\Local\Temp\004db7737105ea6bd66fa0f54a3a93df.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Roaming\xjbjammluxuuthzr1b1bxwkwv2lmpnnz2\svcnost.exe"C:\Users\Admin\AppData\Roaming\xjbjammluxuuthzr1b1bxwkwv2lmpnnz2\svcnost.exe"2⤵PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD54a27242b307c6a836993353035fafc16
SHA15fea7a41b8f9071848108015d8a952e6f944eea0
SHA25602fd93f64bda51e1e2991184cac13f077d509712e462c9e44be9cf8e22c06de1
SHA51235e9c87642b82df2bf0a9312bb0e9abfb98282db1e34032a4d0150d82c5e2f2e13150ddc896f1e954f02288a1e696a4306ee595b94b1e404c6ec17bac64c44be
-
Filesize
54KB
MD57e8e966927e04a35aec644602b8a9e05
SHA1d201b0b41e8701818d60ddbf9f334332a512c4da
SHA25646f18d9fbf63f378d86962cbf24f5ce57ce257555acd4effdcc41c1e2f1adf5c
SHA512246777c79129a5076b71ca5d3f7e59b06d344f6b5e771892ae8ee68c0b5af9207cd1868b1336b49e6a84665309ad379a33ec6c8e72d7ce41de72153637921a51