Analysis
-
max time kernel
118s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 19:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
01bb5a323da5fe3a189db37551440c0f.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
01bb5a323da5fe3a189db37551440c0f.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
01bb5a323da5fe3a189db37551440c0f.exe
-
Size
239KB
-
MD5
01bb5a323da5fe3a189db37551440c0f
-
SHA1
2edc9452017177a01d83abcaee4f2a9a8c3448a0
-
SHA256
f0155f892e0c72bcba7a3b754b303ec30cd55121cd3de669bc2e465316e86944
-
SHA512
3a72914e208b18e045d1b3bc92e06b32b3c8c5b5449ae58fa1148d0f8fe58e287387bd326908f369b04a94db5e1565ad87be77138d218fc6a92681acbb2c062e
-
SSDEEP
6144:v5lPKzznZlAUjmSPKvBEyiUayGaZ7Q21/DDjLBlGBGh:hOdl/PKGyiUGuHDXXvh
Score
8/10
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WFWCServices\Parameters\ServiceDll = "C:\\Windows\\system32\\" 01bb5a323da5fe3a189db37551440c0f.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\ 01bb5a323da5fe3a189db37551440c0f.exe File opened for modification C:\Windows\SysWOW64\winaspfwct.cpl 01bb5a323da5fe3a189db37551440c0f.exe File created C:\Windows\SysWOW64\winaspfwct.cpl 01bb5a323da5fe3a189db37551440c0f.exe File created C:\Windows\SysWOW64\brc_Server.exe 01bb5a323da5fe3a189db37551440c0f.exe File opened for modification C:\Windows\SysWOW64\brc_Server.exe 01bb5a323da5fe3a189db37551440c0f.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2720 01bb5a323da5fe3a189db37551440c0f.exe 2720 01bb5a323da5fe3a189db37551440c0f.exe 2720 01bb5a323da5fe3a189db37551440c0f.exe 2720 01bb5a323da5fe3a189db37551440c0f.exe 2720 01bb5a323da5fe3a189db37551440c0f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01bb5a323da5fe3a189db37551440c0f.exe"C:\Users\Admin\AppData\Local\Temp\01bb5a323da5fe3a189db37551440c0f.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵PID:2620