Analysis
-
max time kernel
161s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:44
Static task
static1
Behavioral task
behavioral1
Sample
0a854cf0fd9f2a188f87fb1849b2a616.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a854cf0fd9f2a188f87fb1849b2a616.exe
Resource
win10v2004-20231222-en
General
-
Target
0a854cf0fd9f2a188f87fb1849b2a616.exe
-
Size
14KB
-
MD5
0a854cf0fd9f2a188f87fb1849b2a616
-
SHA1
36d8c472e1b40b36663ec271805ceb0cd67196c3
-
SHA256
3e5980b1eb258d8dd831335693a99b77eb7f0a59298cf79c4726a175da010f24
-
SHA512
c4d2fe694345ff0effeff023803b25c272ceda55949c729a4f2d363616cb82dd7f4c218d81e07ff5a781e4357602b16cac83da4455b929b4931d781d29617853
-
SSDEEP
192:UKolLDIGpeXSjvnS8KcTmhiXsN9R+aVexqpvoGTUISWIOoMjqujMzk7HOpE/tw:U3VZgXSjvS8FTbsNySV9zTBroe2kLJt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2924 keybdcntl.exe -
Executes dropped EXE 1 IoCs
pid Process 2924 keybdcntl.exe -
Loads dropped DLL 2 IoCs
pid Process 2004 0a854cf0fd9f2a188f87fb1849b2a616.exe 2004 0a854cf0fd9f2a188f87fb1849b2a616.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Keybdcntl = "c:\\windows\\syswow64\\keybdcntl.exe" keybdcntl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\Keybdcntl = "c:\\windows\\syswow64\\keybdcntl.exe" keybdcntl.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\keybdcntl.exe 0a854cf0fd9f2a188f87fb1849b2a616.exe File opened for modification C:\Windows\SysWOW64\keybdcntl.exe 0a854cf0fd9f2a188f87fb1849b2a616.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2924 2004 0a854cf0fd9f2a188f87fb1849b2a616.exe 29 PID 2004 wrote to memory of 2924 2004 0a854cf0fd9f2a188f87fb1849b2a616.exe 29 PID 2004 wrote to memory of 2924 2004 0a854cf0fd9f2a188f87fb1849b2a616.exe 29 PID 2004 wrote to memory of 2924 2004 0a854cf0fd9f2a188f87fb1849b2a616.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a854cf0fd9f2a188f87fb1849b2a616.exe"C:\Users\Admin\AppData\Local\Temp\0a854cf0fd9f2a188f87fb1849b2a616.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\keybdcntl.exeC:\Windows\system32\keybdcntl.exe 5EA1355FD8066C91 c:\users\admin\appdata\local\temp\0a854cf0fd9f2a188f87fb1849b2a616.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD56a9fb1f0187ac4be208a249b189d47e8
SHA141888f43115bc9b73ccd7b7e2610926fac8611e3
SHA2566c655e87e493f172fb2118136606a86822263f18d4067391b7ac8448faed087f
SHA5128231a7ee257e75eb024cba5a589e3d619ffb20004b85064e62e33eb8868a770c656aed13946ab3daf77933ee5ac1b7fab6b62329b586d628d6701b7a16d8e7a3
-
Filesize
14KB
MD50a854cf0fd9f2a188f87fb1849b2a616
SHA136d8c472e1b40b36663ec271805ceb0cd67196c3
SHA2563e5980b1eb258d8dd831335693a99b77eb7f0a59298cf79c4726a175da010f24
SHA512c4d2fe694345ff0effeff023803b25c272ceda55949c729a4f2d363616cb82dd7f4c218d81e07ff5a781e4357602b16cac83da4455b929b4931d781d29617853