Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
0c046c3dcc256327ee461aa5ffe9ea6a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c046c3dcc256327ee461aa5ffe9ea6a.exe
Resource
win10v2004-20231215-en
General
-
Target
0c046c3dcc256327ee461aa5ffe9ea6a.exe
-
Size
332KB
-
MD5
0c046c3dcc256327ee461aa5ffe9ea6a
-
SHA1
65685aa3fa515b63994dc74fa5569c3c060fa6a0
-
SHA256
6fb6fbc925ade4ca5155f171df86caf212de82cec61adfc793c74176b5702071
-
SHA512
cd3d5233451347fe24b20aa93d921f8907d3cfa440052c2a3c9c2b20a4f0aaa7c05a4b5e0f4027160e80e48d3968d579d4e41f92045af9bf41bace00e6e50e65
-
SSDEEP
6144:ESDlRrFSt0BAFiptt+NL7CdZRU26i9SdQCxhu+smEHGgpAAMVvwzkPxvhL7nBuSw:EuQxFiBkyhU2l9o/vOG0jMVYQVhr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\3a800af5\\X" Explorer.EXE -
Executes dropped EXE 2 IoCs
pid Process 336 csrss.exe 3040 X -
Loads dropped DLL 2 IoCs
pid Process 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{717112e1-f980-f90b-05d8-7bcbd5430dc8}\u = "71" 0c046c3dcc256327ee461aa5ffe9ea6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{717112e1-f980-f90b-05d8-7bcbd5430dc8}\cid = "6792625113074769860" 0c046c3dcc256327ee461aa5ffe9ea6a.exe Key created \registry\machine\Software\Classes\Interface\{717112e1-f980-f90b-05d8-7bcbd5430dc8} 0c046c3dcc256327ee461aa5ffe9ea6a.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe 3040 X -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe Token: SeDebugPrivilege 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 336 csrss.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1104 wrote to memory of 336 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe 25 PID 336 wrote to memory of 2076 336 csrss.exe 28 PID 336 wrote to memory of 2076 336 csrss.exe 28 PID 336 wrote to memory of 2920 336 csrss.exe 29 PID 336 wrote to memory of 2920 336 csrss.exe 29 PID 1104 wrote to memory of 3040 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe 30 PID 1104 wrote to memory of 3040 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe 30 PID 1104 wrote to memory of 3040 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe 30 PID 1104 wrote to memory of 3040 1104 0c046c3dcc256327ee461aa5ffe9ea6a.exe 30 PID 3040 wrote to memory of 1392 3040 X 2
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies WinLogon for persistence
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\0c046c3dcc256327ee461aa5ffe9ea6a.exe"C:\Users\Admin\AppData\Local\Temp\0c046c3dcc256327ee461aa5ffe9ea6a.exe"2⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\3a800af5\X193.105.154.210:803⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040
-
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:336
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:2076
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5622d4252e92468823fefbf58fb3aa7b9
SHA11709c3a3b111c5185de7caa60307b65cc7717c02
SHA2566b27b40d3eac33ec649797ff74b0d91a981fabaf2705651f77a42adf5b6b9c52
SHA5122059f8177bb0b3d996281cf79beb2dc6670b5d9549721ef070c2e1b72476b253d5de629779011802400f0ad4baf9c79eb156f75b3b07bf6a1808a8d706ba034d
-
Filesize
41KB
MD5686b479b0ee164cf1744a8be359ebb7d
SHA18615e8f967276a85110b198d575982a958581a07
SHA256fcfbb4c648649f4825b66504b261f912227ba32cbaabcadf4689020a83fb201b
SHA5127ed8022e2b09f232150b77fc3a25269365b624f19f0b50c46a4fdf744eeb23294c09c051452c4c9dbb34a274f1a0bfc54b3ff1987ec16ae2e54848e22a97ed64
-
Filesize
31KB
MD5dafc4a53954b76c5db1d857e955f3805
SHA1a18fa0d38c6656b4398953e77e87eec3b0209ef3
SHA256c6c82dde145a2dd9d70b1b539b17571befb663fc4a9ca834ff2a140cc4ebaa0b
SHA512745e27a4f952e2492dbd12ced396be2c7dc78344ba415ad64b45920f95d7a282e30c7ad2da9266dc195c71e38019809e8183a705f9276c7d178de2f5ef34b633
-
Filesize
2KB
MD5cfc07dbcde57f9e6db34eb3ce2000d0e
SHA19ffa3ecf4a7bb0f34b8dc746ff3334625afb4c7c
SHA2560dc6e0a6eb27625e21c4cd6ca9f3742abf807719e4968227bbcd9268113a46ba
SHA512133235793ac8739679d0fc45eca73de4f35ad04b636da48f00af83165c482710b87f819d1f2557b6b8534b59383a9262226d3dfc3b130b8758449bbf8d539b8c