Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
0f83592a2a08a9403dfe5b508501e6e6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f83592a2a08a9403dfe5b508501e6e6.exe
Resource
win10v2004-20231215-en
General
-
Target
0f83592a2a08a9403dfe5b508501e6e6.exe
-
Size
14KB
-
MD5
0f83592a2a08a9403dfe5b508501e6e6
-
SHA1
92c107234fad2f5e44539c4e51eccf1594ef38b6
-
SHA256
37a00ecbd7e4af9a25f93e074e9b9a7f70cdfac3e63fe56894129f65b0952833
-
SHA512
44bb2a9485d11f6755b445f7c3c51de14e3629d7e6b20f052bb9ac7e36644b937b7bddbfa3258a6218a7bf88226e4c747d0073ac66f0908341f3d140d46fa4bc
-
SSDEEP
384:po1KfVLuDvNR3nNHbaRn7/NTXJh3PAIBjg7:plluJ/un7VTPP7jg7
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\imgutilhx2.dll = "{DA56B183-A731-402b-9235-2CB8803E212D}" 0f83592a2a08a9403dfe5b508501e6e6.exe -
Loads dropped DLL 1 IoCs
pid Process 4188 0f83592a2a08a9403dfe5b508501e6e6.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\imgutilhx2.tmp 0f83592a2a08a9403dfe5b508501e6e6.exe File opened for modification C:\Windows\SysWOW64\imgutilhx2.tmp 0f83592a2a08a9403dfe5b508501e6e6.exe File opened for modification C:\Windows\SysWOW64\imgutilhx2.nls 0f83592a2a08a9403dfe5b508501e6e6.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA56B183-A731-402b-9235-2CB8803E212D}\InProcServer32 0f83592a2a08a9403dfe5b508501e6e6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA56B183-A731-402b-9235-2CB8803E212D}\InProcServer32\ = "C:\\Windows\\SysWow64\\imgutilhx2.dll" 0f83592a2a08a9403dfe5b508501e6e6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA56B183-A731-402b-9235-2CB8803E212D}\InProcServer32\ThreadingModel = "Apartment" 0f83592a2a08a9403dfe5b508501e6e6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DA56B183-A731-402b-9235-2CB8803E212D} 0f83592a2a08a9403dfe5b508501e6e6.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4188 0f83592a2a08a9403dfe5b508501e6e6.exe 4188 0f83592a2a08a9403dfe5b508501e6e6.exe 4188 0f83592a2a08a9403dfe5b508501e6e6.exe 4188 0f83592a2a08a9403dfe5b508501e6e6.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4188 0f83592a2a08a9403dfe5b508501e6e6.exe 4188 0f83592a2a08a9403dfe5b508501e6e6.exe 4188 0f83592a2a08a9403dfe5b508501e6e6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4188 wrote to memory of 1696 4188 0f83592a2a08a9403dfe5b508501e6e6.exe 100 PID 4188 wrote to memory of 1696 4188 0f83592a2a08a9403dfe5b508501e6e6.exe 100 PID 4188 wrote to memory of 1696 4188 0f83592a2a08a9403dfe5b508501e6e6.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f83592a2a08a9403dfe5b508501e6e6.exe"C:\Users\Admin\AppData\Local\Temp\0f83592a2a08a9403dfe5b508501e6e6.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\B585.tmp.bat2⤵PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD54e203632c3b17dcc7dee2e3a5187f45d
SHA1826d84ca534942c402dfccba989aab5f31faad29
SHA256ec4d4fdfb202d9a6145032db04e8cdbcee220b5c4ffe8ca7a7655924b4eb59f3
SHA51283406b52f216aeef564a6642a9b9a3bc6fcf73dc3f0b1722c490b282a6db19bd7187fdcdc627f7706c0909627f750b40e4e511cb4dc020152140da11c08998f9
-
Filesize
382KB
MD51e340408c93fc050143d4025717e4fa3
SHA11809678c446dfecdda2ab7add5d8133e4f7816be
SHA25660648fb6d5d43f84eb4bff2bb1fd535013b39bcb50a4dff67b3339804c5b63fb
SHA512559131b08c73bf1bc676326cb09b4221bd817bc226fcf6bfed66b43c2cc54f9743621a6f63cefe81ab5ac4f3c6d55ebb7986fa34fd7e7b07f76391dc7765a16e
-
Filesize
893KB
MD545414bfdcfcb64b22c1d59eef1f0f053
SHA12612acca14787d82df47f8aaf81a49b15c96a911
SHA2566320224de5b132d7cf9f738d5c81df0643ab56d5153b2539c67630fa1189b2fb
SHA51226da17cb84810331e4ccc606f5dcee15a0f275ab2e6dd4bf4d9412e4617d7b74911e15e5e40ffecabfaebe9fdbbc7e7637c681d15d240823559e4788cee0c04b