Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 19:36
Static task
static1
Behavioral task
behavioral1
Sample
01f087e43808d90925ec99ccb7154773.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01f087e43808d90925ec99ccb7154773.exe
Resource
win10v2004-20231215-en
General
-
Target
01f087e43808d90925ec99ccb7154773.exe
-
Size
203KB
-
MD5
01f087e43808d90925ec99ccb7154773
-
SHA1
aa7a69980f2a49ada5bcf162d43bd2b8958fb4b6
-
SHA256
eeb7c4af49e7e5daad96703dd2aa97e5c66cd7b94930ec4ba7cc011ffe8fa0ae
-
SHA512
9305109385bad4338bc6a6dd5a46561c789cac54d9fb42d45ccf3bdb9eebd3bf620e0c6e133f5c1d97d50f46c7f89bb7329c33d3032a5d94fe70f07a31e5102b
-
SSDEEP
6144:838XpOAhmmMKnKrrAoyOWK3dt7bQ0KSRCh8x:COpjnKgkWKtt7ySRCh8
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 3052 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1240 Explorer.EXE -
Loads dropped DLL 8 IoCs
pid Process 1588 01f087e43808d90925ec99ccb7154773.exe 2708 rundll32.exe 2708 rundll32.exe 2708 rundll32.exe 2708 rundll32.exe 3052 cmd.exe 2968 attrib.exe 836 Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dllhPlay.dll 01f087e43808d90925ec99ccb7154773.exe File opened for modification C:\Windows\system32\dllhPlay64.dll 01f087e43808d90925ec99ccb7154773.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1588 01f087e43808d90925ec99ccb7154773.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1588 wrote to memory of 2708 1588 01f087e43808d90925ec99ccb7154773.exe 28 PID 1588 wrote to memory of 2708 1588 01f087e43808d90925ec99ccb7154773.exe 28 PID 1588 wrote to memory of 2708 1588 01f087e43808d90925ec99ccb7154773.exe 28 PID 1588 wrote to memory of 2708 1588 01f087e43808d90925ec99ccb7154773.exe 28 PID 1588 wrote to memory of 3052 1588 01f087e43808d90925ec99ccb7154773.exe 29 PID 1588 wrote to memory of 3052 1588 01f087e43808d90925ec99ccb7154773.exe 29 PID 1588 wrote to memory of 3052 1588 01f087e43808d90925ec99ccb7154773.exe 29 PID 1588 wrote to memory of 3052 1588 01f087e43808d90925ec99ccb7154773.exe 29 PID 1588 wrote to memory of 3052 1588 01f087e43808d90925ec99ccb7154773.exe 29 PID 1588 wrote to memory of 3052 1588 01f087e43808d90925ec99ccb7154773.exe 29 PID 1588 wrote to memory of 3052 1588 01f087e43808d90925ec99ccb7154773.exe 29 PID 2708 wrote to memory of 1240 2708 rundll32.exe 9 PID 2708 wrote to memory of 1240 2708 rundll32.exe 9 PID 3052 wrote to memory of 2968 3052 cmd.exe 31 PID 3052 wrote to memory of 2968 3052 cmd.exe 31 PID 3052 wrote to memory of 2968 3052 cmd.exe 31 PID 3052 wrote to memory of 2968 3052 cmd.exe 31 PID 3052 wrote to memory of 2968 3052 cmd.exe 31 PID 3052 wrote to memory of 2968 3052 cmd.exe 31 PID 3052 wrote to memory of 2968 3052 cmd.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2968 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\01f087e43808d90925ec99ccb7154773.exe"C:\Users\Admin\AppData\Local\Temp\01f087e43808d90925ec99ccb7154773.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\dllhPlay64.dll",CreateProcessNotify3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259432049.bat" "C:\Users\Admin\AppData\Local\Temp\01f087e43808d90925ec99ccb7154773.exe""3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h"C:\Users\Admin\AppData\Local\Temp\01f087e43808d90925ec99ccb7154773.exe"4⤵
- Loads dropped DLL
- Views/modifies file attributes
PID:2968
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97B
MD5d226a657b279c5fc0a892748230a56ff
SHA1fa7e4fb6d6de3c4769001cbfce0a00ba02ef28a5
SHA2569dae2767b8e3499d37418a75ddd04d457c7ec8d6c8f312ee109c95a8a97e7761
SHA51207d55ccf3b511c3be64f6dcd05cea3feaafb286196e5d7ba30016ab6d9c0d656fb7cde8eb1ce0ef28a41f1f3f00f0e29020c92479619fd43e4ed47b829f8bf2a
-
Filesize
74KB
MD50f6ada608f5b44d2ab9985451bf3e7ad
SHA13362a15c6107eb6f54bee7a679653edefc94fbc5
SHA256021669f2daa816dd76882bb89b825a9a31b204499669efb44280c80077b1e7a5
SHA512f62aeaad64904172eb4b637ae00e11d9683722e695290610c2911b77d0aac532fb2d174614950686fae5ad9bd6b4e77a544488709425edcc86992ad298699484
-
Filesize
68KB
MD5a75036d01acc9d616197f438210f65fd
SHA161c520f525d683c326ec0b9ae965c3ae5461bb06
SHA2563f883c91668d85446f87b0d6162756afdcc5dc77125830bb7b9cd26efa8fdd43
SHA51240e3304a3efa1a273f3313ad7223a0cac27cd18c652e7496cdaf9f88c5da0e62215b4ef865e4dbd2bc884a644a5dbdc13a95e1940f130046dda66a8fc8e3152e