Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 21:25
Static task
static1
Behavioral task
behavioral1
Sample
04641930c12a161b59b979d8f15db657.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04641930c12a161b59b979d8f15db657.exe
Resource
win10v2004-20231215-en
General
-
Target
04641930c12a161b59b979d8f15db657.exe
-
Size
46KB
-
MD5
04641930c12a161b59b979d8f15db657
-
SHA1
78a4c565be8cf3ad8e3c574da36eb0a120c3764d
-
SHA256
5fe9f4aa7ceed923f774e297cf90481f981a37e31598c3a5b5da98b89c7707dd
-
SHA512
a3634460545fc985cb97f9dd024de2da7bd7f81fbe0d53c13c7caf143f5ee750ae13bbe112e205b61088aaa6e01d0d02e82a040b0a3e5090de942385728ea6d3
-
SSDEEP
768:WnZsBy5nnEkwxEK9JzNDHkkpretSyHUJUrRFZ70+0Z9T5c3PGOWcsz0EGX:WZsBy5EkuEK9R5Hkkp63HUaN0Zl5guz0
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xsvszmfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\iHNG1n1Jwz = "C:\\ProgramData\\dwlmdozy\\xsvszmfe.exe" xsvszmfe.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 xsvszmfe.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1316 04641930c12a161b59b979d8f15db657.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2820 1316 04641930c12a161b59b979d8f15db657.exe 104 PID 1316 wrote to memory of 2820 1316 04641930c12a161b59b979d8f15db657.exe 104 PID 1316 wrote to memory of 2820 1316 04641930c12a161b59b979d8f15db657.exe 104 PID 1316 wrote to memory of 1444 1316 04641930c12a161b59b979d8f15db657.exe 103 PID 1316 wrote to memory of 1444 1316 04641930c12a161b59b979d8f15db657.exe 103 PID 1316 wrote to memory of 1444 1316 04641930c12a161b59b979d8f15db657.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\04641930c12a161b59b979d8f15db657.exe"C:\Users\Admin\AppData\Local\Temp\04641930c12a161b59b979d8f15db657.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\046419~1.EXE.bak >> NUL2⤵PID:1444
-
-
C:\ProgramData\dwlmdozy\xsvszmfe.exeC:\ProgramData\dwlmdozy\xsvszmfe.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD504641930c12a161b59b979d8f15db657
SHA178a4c565be8cf3ad8e3c574da36eb0a120c3764d
SHA2565fe9f4aa7ceed923f774e297cf90481f981a37e31598c3a5b5da98b89c7707dd
SHA512a3634460545fc985cb97f9dd024de2da7bd7f81fbe0d53c13c7caf143f5ee750ae13bbe112e205b61088aaa6e01d0d02e82a040b0a3e5090de942385728ea6d3