Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 00:19
Static task
static1
Behavioral task
behavioral1
Sample
084e8ab27551ad960621911c161997b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
084e8ab27551ad960621911c161997b3.exe
Resource
win10v2004-20231215-en
General
-
Target
084e8ab27551ad960621911c161997b3.exe
-
Size
50KB
-
MD5
084e8ab27551ad960621911c161997b3
-
SHA1
c16f00cd9deb909030ffd55157020b232b57c5fe
-
SHA256
af5eea14ad04a02d4734fb1ca43601a93eb3cc1f472cf743f185033bf55a0eaa
-
SHA512
608c2ff0e230b26f368e8bd1426241dda5560aa4e35e1e62f11dcff3dcd29155d81966a97d9e8be4951fdc5322d998299ffa5ba71542e280c2e2e16eabca1536
-
SSDEEP
1536:rVIAfXxrfGzH+5tAnpTSLqTqaKroS4XQW:265OScn5jQROQW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2884 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 1820 spooIsv.exe 2608 Isass.exe 2364 iexplore.exe 2880 algs.exe -
Loads dropped DLL 8 IoCs
pid Process 2080 084e8ab27551ad960621911c161997b3.exe 2080 084e8ab27551ad960621911c161997b3.exe 1820 spooIsv.exe 1820 spooIsv.exe 2608 Isass.exe 2608 Isass.exe 2364 iexplore.exe 2364 iexplore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows DLL Loader = "C:\\Windows\\system32\\algs.exe" algs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\snozowv.bat iexplore.exe File created C:\Windows\SysWOW64\spooIsv.exe 084e8ab27551ad960621911c161997b3.exe File created C:\Windows\SysWOW64\Isass.exe spooIsv.exe File created C:\Windows\SysWOW64\hmvbe.bat spooIsv.exe File created C:\Windows\SysWOW64\xptq.bat Isass.exe File opened for modification C:\Windows\SysWOW64\algs.exe iexplore.exe File created C:\Windows\SysWOW64\algs.exe algs.exe File opened for modification C:\Windows\SysWOW64\spooIsv.exe 084e8ab27551ad960621911c161997b3.exe File opened for modification C:\Windows\SysWOW64\Isass.exe spooIsv.exe File created C:\Windows\SysWOW64\iexplore.exe Isass.exe File opened for modification C:\Windows\SysWOW64\iexplore.exe Isass.exe File created C:\Windows\SysWOW64\algs.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2884 2080 084e8ab27551ad960621911c161997b3.exe 28 PID 2080 wrote to memory of 2884 2080 084e8ab27551ad960621911c161997b3.exe 28 PID 2080 wrote to memory of 2884 2080 084e8ab27551ad960621911c161997b3.exe 28 PID 2080 wrote to memory of 2884 2080 084e8ab27551ad960621911c161997b3.exe 28 PID 2080 wrote to memory of 1820 2080 084e8ab27551ad960621911c161997b3.exe 29 PID 2080 wrote to memory of 1820 2080 084e8ab27551ad960621911c161997b3.exe 29 PID 2080 wrote to memory of 1820 2080 084e8ab27551ad960621911c161997b3.exe 29 PID 2080 wrote to memory of 1820 2080 084e8ab27551ad960621911c161997b3.exe 29 PID 1820 wrote to memory of 2776 1820 spooIsv.exe 31 PID 1820 wrote to memory of 2776 1820 spooIsv.exe 31 PID 1820 wrote to memory of 2776 1820 spooIsv.exe 31 PID 1820 wrote to memory of 2776 1820 spooIsv.exe 31 PID 1820 wrote to memory of 2608 1820 spooIsv.exe 32 PID 1820 wrote to memory of 2608 1820 spooIsv.exe 32 PID 1820 wrote to memory of 2608 1820 spooIsv.exe 32 PID 1820 wrote to memory of 2608 1820 spooIsv.exe 32 PID 2608 wrote to memory of 3016 2608 Isass.exe 34 PID 2608 wrote to memory of 3016 2608 Isass.exe 34 PID 2608 wrote to memory of 3016 2608 Isass.exe 34 PID 2608 wrote to memory of 3016 2608 Isass.exe 34 PID 2608 wrote to memory of 2364 2608 Isass.exe 36 PID 2608 wrote to memory of 2364 2608 Isass.exe 36 PID 2608 wrote to memory of 2364 2608 Isass.exe 36 PID 2608 wrote to memory of 2364 2608 Isass.exe 36 PID 2364 wrote to memory of 2784 2364 iexplore.exe 37 PID 2364 wrote to memory of 2784 2364 iexplore.exe 37 PID 2364 wrote to memory of 2784 2364 iexplore.exe 37 PID 2364 wrote to memory of 2784 2364 iexplore.exe 37 PID 2364 wrote to memory of 2880 2364 iexplore.exe 39 PID 2364 wrote to memory of 2880 2364 iexplore.exe 39 PID 2364 wrote to memory of 2880 2364 iexplore.exe 39 PID 2364 wrote to memory of 2880 2364 iexplore.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\084e8ab27551ad960621911c161997b3.exe"C:\Users\Admin\AppData\Local\Temp\084e8ab27551ad960621911c161997b3.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\fzxgpmmp.bat" "2⤵
- Deletes itself
PID:2884
-
-
C:\Windows\SysWOW64\spooIsv.exeC:\Windows\system32\spooIsv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\hmvbe.bat" "3⤵PID:2776
-
-
C:\Windows\SysWOW64\Isass.exeC:\Windows\system32\Isass.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\xptq.bat" "4⤵PID:3016
-
-
C:\Windows\SysWOW64\iexplore.exeC:\Windows\system32\iexplore.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\SysWOW64\snozowv.bat" "5⤵PID:2784
-
-
C:\Windows\SysWOW64\algs.exeC:\Windows\system32\algs.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2880
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD5bc9472019a7f49551fbe0da96633d93f
SHA1c8b8b980680ae1695374aaaa2367214a9a927bc8
SHA256ef49f08bc3bdd96b5c307445bae447d0f19607b64ee5817fce1f99b18ffd90fc
SHA512becc229920ee0d9111ecb4b72f6b2af255057c8210222dfadc11d72e84e8751dfa06aa7eb190097b86e7b48acbf0d888456cbf75b9ba00cee126331bfd38b887
-
Filesize
124B
MD52441cb1a60ddab5a190500cd4e566a60
SHA15cbb50f49a59e52b75d4a30c39dd6214b864b0e6
SHA2567a0eed097d5e9061bbcea24c05d663746af6ad2c7f17f42768e6085a8b8a4dde
SHA5122458194261999c62ef7c03a56cfc840a8ac47893f4285da7ab4cd7904c71b320593416a6c08990f3cdb0a74e521be4f4825c126a42e4bb4e0a5c9c78befc4875
-
Filesize
129B
MD5b53ab126def681231500079515d81e26
SHA1ddb8a566df5cdf3525b056b2da31796856dcc5fb
SHA2563709dd2e7bfe949bf3b9b2770c9b0ad0d0dd8d3effd232dc5b154637a2d5b75c
SHA512ec731be3a3f92a610b27b09eb692d4d7a113e441c324dfcd6dc375a0f542253c6ce74a91be4be345c5a29a60086add0d4581b504cd14e99163f80af38b057d28
-
Filesize
117B
MD5f1b4f94107cf526daeb3aac174e9f0d6
SHA147410518bfb4ad746d1f627228242f89748c5f44
SHA256c6f49695ad22490e52799f79d6d96c58ea542e6887badbe6e4c3b179ec2fc2ac
SHA512b59fa5301d527500d28319a373a1bc0aa9436a2f67c295702ccbe7d171004d104b4c810c7ee12da6f4c22e2c0e0328df57a6db936ddcf4814a67cae51791d40b
-
Filesize
50KB
MD5084e8ab27551ad960621911c161997b3
SHA1c16f00cd9deb909030ffd55157020b232b57c5fe
SHA256af5eea14ad04a02d4734fb1ca43601a93eb3cc1f472cf743f185033bf55a0eaa
SHA512608c2ff0e230b26f368e8bd1426241dda5560aa4e35e1e62f11dcff3dcd29155d81966a97d9e8be4951fdc5322d998299ffa5ba71542e280c2e2e16eabca1536