Analysis
-
max time kernel
240s -
max time network
295s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:38
Static task
static1
Behavioral task
behavioral1
Sample
0d3505e13b97336d111d46a65cd3f5a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d3505e13b97336d111d46a65cd3f5a8.exe
Resource
win10v2004-20231215-en
General
-
Target
0d3505e13b97336d111d46a65cd3f5a8.exe
-
Size
220KB
-
MD5
0d3505e13b97336d111d46a65cd3f5a8
-
SHA1
0f57f31a6a19349c7532266fd1a66d977f49b5f5
-
SHA256
0c04de9951a3657020bc0599f1a984c5708b0701c7461a030d81d4f0db768579
-
SHA512
c5bd76deda613e7aa7146cf310e8c1e64b32b24bc14977fe5b8afee84cbf6d3e689bde92ec1f3a81b72aea4472397a4a71b20ea98c18cf0569fd1d3d0541b693
-
SSDEEP
768:jZKM11gG4ChfiPO0rfz0shcUypMC5/VKhZyg3ini2L2o277r2MIBBehUw:gMDgG4ChfiPOefgsOUqQwgH
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System applets = "C:\\Windows\\System\\applets.exe" 0d3505e13b97336d111d46a65cd3f5a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Syssrc32 = "C:\\Windows\\Syssrc32.exe" 0d3505e13b97336d111d46a65cd3f5a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fndfst32 = "C:\\Windows\\System\\fndfst32.exe" 0d3505e13b97336d111d46a65cd3f5a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Explorer Shell = "C:\\Windows\\System\\Explorer.exe" 0d3505e13b97336d111d46a65cd3f5a8.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\System\mplayerw.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File created C:\Windows\Help\intret.cnt 0d3505e13b97336d111d46a65cd3f5a8.exe File opened for modification C:\Windows\System\Sysexp32.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File opened for modification C:\Windows\System\applets.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File created C:\Windows\Syssrc32.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File opened for modification C:\Windows\System\Explorer.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File opened for modification C:\Windows\Help\intret.cnt 0d3505e13b97336d111d46a65cd3f5a8.exe File created C:\Windows\System\Sysexp32.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File created C:\Windows\System\applets.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File opened for modification C:\Windows\System\fndfst32.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File created C:\Windows\System\mplayerw.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File opened for modification C:\Windows\Syssrc32.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File created C:\Windows\System\fndfst32.exe 0d3505e13b97336d111d46a65cd3f5a8.exe File created C:\Windows\System\Explorer.exe 0d3505e13b97336d111d46a65cd3f5a8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1112 1828 WerFault.exe 11 -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command 0d3505e13b97336d111d46a65cd3f5a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\Explore = "%SystemRoot%\\SysWow64\\NOTEPAD.EXE %1" 0d3505e13b97336d111d46a65cd3f5a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\System\\Sysexp32.exe %1" 0d3505e13b97336d111d46a65cd3f5a8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1828 wrote to memory of 1112 1828 0d3505e13b97336d111d46a65cd3f5a8.exe 27 PID 1828 wrote to memory of 1112 1828 0d3505e13b97336d111d46a65cd3f5a8.exe 27 PID 1828 wrote to memory of 1112 1828 0d3505e13b97336d111d46a65cd3f5a8.exe 27 PID 1828 wrote to memory of 1112 1828 0d3505e13b97336d111d46a65cd3f5a8.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d3505e13b97336d111d46a65cd3f5a8.exe"C:\Users\Admin\AppData\Local\Temp\0d3505e13b97336d111d46a65cd3f5a8.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 922⤵
- Program crash
PID:1112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5b1878692dc5fd520fc20e26c8e4fda76
SHA101177874639f9e2ec0467014cc135789664cdeb7
SHA256f71a898d7292ecf33c35eb6c3ffbe31b455acd84e60f78148b28749e54ece891
SHA512e15ea7db9b3ba6084db7cf88bf239f343ab5792b53a0ae2e0207f7eb5cd24d01d56f6ac517c7296d7f36c314e4c2cb3c12b3e76597fdcb6833b6af4912e8afe9