Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
0d163350a1fe2894a643a8c5bb8ceb32.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d163350a1fe2894a643a8c5bb8ceb32.exe
Resource
win10v2004-20231215-en
General
-
Target
0d163350a1fe2894a643a8c5bb8ceb32.exe
-
Size
19KB
-
MD5
0d163350a1fe2894a643a8c5bb8ceb32
-
SHA1
a5d538b8b92232577062f3e903f4c35338382b0c
-
SHA256
33e29a0504fc8aec5fa1d273ac5bb396357bcfaa0d740ee0dfc97a9a0f868bfb
-
SHA512
9a7169043fdab963b9c2c94e13bdf7de9065a55e84e86c7ef535fa641ed5ea66d96f807770835da50bc753ab136424ccfa2bc2147ca484262852ea75402cf847
-
SSDEEP
384:WvePZncrQS96r3vdooCuINl/YlPDuR0AoPEEpyiGU:WycrMbvdooRIEuCAoPEEpp
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\msosmsfpfis64.sys 0d163350a1fe2894a643a8c5bb8ceb32.exe -
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2864 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\msosdohs00.dll 0d163350a1fe2894a643a8c5bb8ceb32.exe File opened for modification C:\Windows\SysWOW64\msosdohs00.dll 0d163350a1fe2894a643a8c5bb8ceb32.exe File opened for modification C:\Windows\SysWOW64\msosdohs.dat 0d163350a1fe2894a643a8c5bb8ceb32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 0d163350a1fe2894a643a8c5bb8ceb32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 484 services.exe 484 services.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2004 wrote to memory of 260 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 7 PID 2004 wrote to memory of 340 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 6 PID 2004 wrote to memory of 388 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 5 PID 2004 wrote to memory of 400 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 4 PID 2004 wrote to memory of 436 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 3 PID 2004 wrote to memory of 484 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 2 PID 2004 wrote to memory of 492 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 1 PID 2004 wrote to memory of 500 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 26 PID 2004 wrote to memory of 604 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 25 PID 2004 wrote to memory of 680 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 24 PID 2004 wrote to memory of 756 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 8 PID 2004 wrote to memory of 820 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 23 PID 2004 wrote to memory of 848 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 22 PID 2004 wrote to memory of 968 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 20 PID 2004 wrote to memory of 272 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 19 PID 2004 wrote to memory of 356 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 18 PID 2004 wrote to memory of 1080 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 9 PID 2004 wrote to memory of 1116 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 17 PID 2004 wrote to memory of 1172 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 16 PID 2004 wrote to memory of 1208 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 15 PID 2004 wrote to memory of 1668 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 14 PID 2004 wrote to memory of 1696 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 13 PID 2004 wrote to memory of 1164 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 12 PID 2004 wrote to memory of 2864 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 28 PID 2004 wrote to memory of 2864 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 28 PID 2004 wrote to memory of 2864 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 28 PID 2004 wrote to memory of 2864 2004 0d163350a1fe2894a643a8c5bb8ceb32.exe 28
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Suspicious behavior: LoadsDriver
PID:484 -
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1080
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE3⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\0d163350a1fe2894a643a8c5bb8ceb32.exe"C:\Users\Admin\AppData\Local\Temp\0d163350a1fe2894a643a8c5bb8ceb32.exe"4⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\0d163350a1fe2894a643a8c5bb8ceb32.exe"5⤵
- Deletes itself
PID:2864
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1696
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1116
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:356
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:272
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:848
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:820
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:680
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:604
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:400
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:388
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:340
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1668
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5f6df72eb4bb010cd82a7b795b9e082ac
SHA1f69f240638ae4053a7f031ac47c4828a06357155
SHA256b72505f3b3c5c8614dae2515e87f960fe38544836db60d0a44206450935653e1
SHA512320a9ec73a88418ab20d5f83d3bc64aeae4c3cd29f2beeb95adbe1c9ad845f2ce00325b5968e8af3762d16a56882d7a8b559dfd1346882af3da0df2852232782