Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
0add5a18e5bbd80a7bef02f7d6565137.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0add5a18e5bbd80a7bef02f7d6565137.exe
Resource
win10v2004-20231215-en
General
-
Target
0add5a18e5bbd80a7bef02f7d6565137.exe
-
Size
268KB
-
MD5
0add5a18e5bbd80a7bef02f7d6565137
-
SHA1
1b5101da5f2546e5198476268d726adac8ddc4d5
-
SHA256
9ad77c2e0fc44a992b132cb699475fb9e8fecfb36195ef22e289097cb943d025
-
SHA512
3e2700cf3c38a932a305acd63c1e628b7d23d3c33b8605e57d11a8b99cb1e42be9ad6315ac21b2f9630ebf817799a72e9841e17acabe6eac82bc05153646aff8
-
SSDEEP
6144:0++nE8hM3kpMOMBFTB/8kfxR65adZwiMPKfjA8vFgW:/T18A1jfMifzvSW
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515} 0add5a18e5bbd80a7bef02f7d6565137.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515}\StubPath = "C:\\windows\\Microsoft Update.exe" 0add5a18e5bbd80a7bef02f7d6565137.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515} Microsoft Update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515}\StubPath = "C:\\windows\\Microsoft Update.exe" Microsoft Update.exe -
Deletes itself 1 IoCs
pid Process 2772 Microsoft Update.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 Microsoft Update.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\Microsoft Update.exe" 0add5a18e5bbd80a7bef02f7d6565137.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\Microsoft Update.exe" 0add5a18e5bbd80a7bef02f7d6565137.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft Update.exe 0add5a18e5bbd80a7bef02f7d6565137.exe File created C:\Windows\Microsoft Update.exe 0add5a18e5bbd80a7bef02f7d6565137.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3016 2772 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2772 2424 0add5a18e5bbd80a7bef02f7d6565137.exe 28 PID 2424 wrote to memory of 2772 2424 0add5a18e5bbd80a7bef02f7d6565137.exe 28 PID 2424 wrote to memory of 2772 2424 0add5a18e5bbd80a7bef02f7d6565137.exe 28 PID 2424 wrote to memory of 2772 2424 0add5a18e5bbd80a7bef02f7d6565137.exe 28 PID 2424 wrote to memory of 2772 2424 0add5a18e5bbd80a7bef02f7d6565137.exe 28 PID 2424 wrote to memory of 2772 2424 0add5a18e5bbd80a7bef02f7d6565137.exe 28 PID 2424 wrote to memory of 2772 2424 0add5a18e5bbd80a7bef02f7d6565137.exe 28 PID 2772 wrote to memory of 3016 2772 Microsoft Update.exe 29 PID 2772 wrote to memory of 3016 2772 Microsoft Update.exe 29 PID 2772 wrote to memory of 3016 2772 Microsoft Update.exe 29 PID 2772 wrote to memory of 3016 2772 Microsoft Update.exe 29 PID 2772 wrote to memory of 3016 2772 Microsoft Update.exe 29 PID 2772 wrote to memory of 3016 2772 Microsoft Update.exe 29 PID 2772 wrote to memory of 3016 2772 Microsoft Update.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0add5a18e5bbd80a7bef02f7d6565137.exe"C:\Users\Admin\AppData\Local\Temp\0add5a18e5bbd80a7bef02f7d6565137.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\Microsoft Update.exe"C:\Windows\Microsoft Update.exe" "C:\Users\Admin\AppData\Local\Temp\0add5a18e5bbd80a7bef02f7d6565137.exe"2⤵
- Modifies Installed Components in the registry
- Deletes itself
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 2603⤵
- Program crash
PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD50add5a18e5bbd80a7bef02f7d6565137
SHA11b5101da5f2546e5198476268d726adac8ddc4d5
SHA2569ad77c2e0fc44a992b132cb699475fb9e8fecfb36195ef22e289097cb943d025
SHA5123e2700cf3c38a932a305acd63c1e628b7d23d3c33b8605e57d11a8b99cb1e42be9ad6315ac21b2f9630ebf817799a72e9841e17acabe6eac82bc05153646aff8