Analysis
-
max time kernel
152s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:30
Behavioral task
behavioral1
Sample
111da61f61dc6b7425f5b6b46de36baa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
111da61f61dc6b7425f5b6b46de36baa.exe
Resource
win10v2004-20231215-en
General
-
Target
111da61f61dc6b7425f5b6b46de36baa.exe
-
Size
293KB
-
MD5
111da61f61dc6b7425f5b6b46de36baa
-
SHA1
6315924ed224dcc3b6bdfd901a4bba867b72dfb9
-
SHA256
fc974bb1d58f640869da192d76d7600eeec7e766375066774047f93e8062918a
-
SHA512
849228e0a0957669c4e0bcb19a563247109407537a0d7e7b860d4758c0e82e0964ebfdcc5f95cc2242bbfba0edbb32e0d131d648340985d940d4305058381052
-
SSDEEP
6144:wkLcp+1ahqFTCNRExkjn+P55VseLuVLg78/J5R1oVEWSdb3z7ZSS:wjyahqKRExaY0eLuVsA/J5rumz/ES
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000b0000000132dc-11.dat aspack_v212_v242 behavioral1/files/0x000c0000000142bd-18.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2644 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2728 Minser.exe 2952 SVCHOSI.EXE -
Loads dropped DLL 5 IoCs
pid Process 2968 111da61f61dc6b7425f5b6b46de36baa.exe 2968 111da61f61dc6b7425f5b6b46de36baa.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\NetMeeting\MINMole.exe Minser.exe File created C:\Program Files\NetMeeting\Mole.Mol Minser.exe File created C:\Program Files\NetMeeting\Install.dll Minser.exe File opened for modification C:\Program Files\NetMeeting\Mole.ini Minser.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SVCHOSI.EXE 111da61f61dc6b7425f5b6b46de36baa.exe File opened for modification C:\Windows\SVCHOSI.EXE 111da61f61dc6b7425f5b6b46de36baa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2748 2728 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE 2952 SVCHOSI.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2728 2968 111da61f61dc6b7425f5b6b46de36baa.exe 28 PID 2968 wrote to memory of 2728 2968 111da61f61dc6b7425f5b6b46de36baa.exe 28 PID 2968 wrote to memory of 2728 2968 111da61f61dc6b7425f5b6b46de36baa.exe 28 PID 2968 wrote to memory of 2728 2968 111da61f61dc6b7425f5b6b46de36baa.exe 28 PID 2728 wrote to memory of 2748 2728 Minser.exe 29 PID 2728 wrote to memory of 2748 2728 Minser.exe 29 PID 2728 wrote to memory of 2748 2728 Minser.exe 29 PID 2728 wrote to memory of 2748 2728 Minser.exe 29 PID 2968 wrote to memory of 2952 2968 111da61f61dc6b7425f5b6b46de36baa.exe 30 PID 2968 wrote to memory of 2952 2968 111da61f61dc6b7425f5b6b46de36baa.exe 30 PID 2968 wrote to memory of 2952 2968 111da61f61dc6b7425f5b6b46de36baa.exe 30 PID 2968 wrote to memory of 2952 2968 111da61f61dc6b7425f5b6b46de36baa.exe 30 PID 2968 wrote to memory of 2644 2968 111da61f61dc6b7425f5b6b46de36baa.exe 31 PID 2968 wrote to memory of 2644 2968 111da61f61dc6b7425f5b6b46de36baa.exe 31 PID 2968 wrote to memory of 2644 2968 111da61f61dc6b7425f5b6b46de36baa.exe 31 PID 2968 wrote to memory of 2644 2968 111da61f61dc6b7425f5b6b46de36baa.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\111da61f61dc6b7425f5b6b46de36baa.exe"C:\Users\Admin\AppData\Local\Temp\111da61f61dc6b7425f5b6b46de36baa.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Minser.exe"C:\Users\Admin\AppData\Local\Temp\Minser.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:2748
-
-
-
C:\Windows\SVCHOSI.EXEC:\Windows\SVCHOSI.EXE -netsvcs2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Windows\SysWOW64\cmd.execmd /c Deleteme.bat2⤵
- Deletes itself
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD54471cac4d624f4ab3f0d5e25ea23d1a0
SHA1be57b1a34632f755f2102b7121dd340e69e9c32d
SHA2560cbeb4b1b2e2428398dbba149cf48dae4ddd9cca3fb3871373c501f7d3d80737
SHA512605cfbf3cf0156e9c205194b94dbe484f2de409197e06912fe0ddb0c69b9db8e4233a932cdf3d2c1a3c6eda89c7815825ca9b271f0c1be04d4399f58fdff6168
-
Filesize
123KB
MD50789ac0e9b18ed0af4881b371714cb6c
SHA17a0a7810a5436aa0bfa53d9a1503fc871540a230
SHA256acdae96260e1e563d207219c271b9d048c55fe0f1f44b2f9b8e8394e385d44b0
SHA512413df0125646980a0315f0086980edeffd7dc5183175667c91adf3641b4d30996ca07fbbc6745bcd325a4335539a4a493288ecb558dacedafaac9cd8b7cdbb6c
-
Filesize
293KB
MD5111da61f61dc6b7425f5b6b46de36baa
SHA16315924ed224dcc3b6bdfd901a4bba867b72dfb9
SHA256fc974bb1d58f640869da192d76d7600eeec7e766375066774047f93e8062918a
SHA512849228e0a0957669c4e0bcb19a563247109407537a0d7e7b860d4758c0e82e0964ebfdcc5f95cc2242bbfba0edbb32e0d131d648340985d940d4305058381052