Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 19:02
Static task
static1
Behavioral task
behavioral1
Sample
0126ea90433f3cffb1ce9ba4fa3e2e40.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0126ea90433f3cffb1ce9ba4fa3e2e40.exe
Resource
win10v2004-20231215-en
General
-
Target
0126ea90433f3cffb1ce9ba4fa3e2e40.exe
-
Size
416KB
-
MD5
0126ea90433f3cffb1ce9ba4fa3e2e40
-
SHA1
6cf4af2ad62307c09aeff28a15082dabf2521081
-
SHA256
73eebc72b6a280e6aae44d99efa7eca6ce621f420e50af7d49248c01ab68247f
-
SHA512
67cddf07c11f684bcb91a0aa6002c0da034528b41145df81b907f4779f24f87bed1d73b5edda6064e7fc5c05f7a4ff4ef1e6281433f8402b79f478c61cfde679
-
SSDEEP
6144:bkqbvaFGC3aDn8dlHSKaEc/34svsJMiS0cdUeLpDebYSuyOB:bbvqVaDn8dl1c/uJMfLLsbduf
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 0126ea90433f3cffb1ce9ba4fa3e2e40.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 0126ea90433f3cffb1ce9ba4fa3e2e40.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe 2748 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2748 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe 2 PID 1680 wrote to memory of 2748 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe 2 PID 1680 wrote to memory of 2748 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe 2 PID 1680 wrote to memory of 2748 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe 2 PID 1680 wrote to memory of 2748 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe 2 PID 1680 wrote to memory of 2748 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe 2 PID 1680 wrote to memory of 2748 1680 0126ea90433f3cffb1ce9ba4fa3e2e40.exe 2
Processes
-
C:\Users\Admin\AppData\Local\Temp\0126ea90433f3cffb1ce9ba4fa3e2e40.exe"C:\Users\Admin\AppData\Local\Temp\0126ea90433f3cffb1ce9ba4fa3e2e40.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD59a5976205f57843a002498ce43c1a505
SHA1ffccfc0a621e1ebc6b60dee80cc7f8ca2e89b421
SHA256c7a39d43b2e18a19c8432141d9c06139716316806e5f93b2b90000c18497a271
SHA512918916a0ec401f5946f7a7b6603cbbd60b92d8d315bb7233ff76c2122ef8fb33e44a6d3a934fd7ff7476a6751cf88482300fc776beebc63f42cf7bec0a3c2562