Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
15ed1118d13cbeb82990e6e2cf33c506.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15ed1118d13cbeb82990e6e2cf33c506.exe
Resource
win10v2004-20231215-en
General
-
Target
15ed1118d13cbeb82990e6e2cf33c506.exe
-
Size
116KB
-
MD5
15ed1118d13cbeb82990e6e2cf33c506
-
SHA1
0b3bed9f357f65b695e06df0df911a2edb2f03a8
-
SHA256
e1a59060da34661d6dce398ed14308d92640844daabe31e1604b7b8c4fc12c63
-
SHA512
0d7c9ae8e083f627ce88cc9b776294537fe24f522c1966f6dbaa911376f2e4b26252f8ff8a72b578a0fdcaaa18955fb06ea276ea0cdf368611ab3b9ca248ff65
-
SSDEEP
3072:6/uzwf9se/JUkxRWySst/CojxqdQUNsk8:6/ucfOCuQROstlxqdVNM
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} ipconfig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\Server.EXE" ipconfig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} ipconfig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\Server.EXE" ipconfig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} 15ed1118d13cbeb82990e6e2cf33c506.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\Server.EXE" 15ed1118d13cbeb82990e6e2cf33c506.exe -
Executes dropped EXE 3 IoCs
pid Process 2656 Server.EXE 2688 Server.EXE 2700 Server.EXE -
Loads dropped DLL 5 IoCs
pid Process 1784 15ed1118d13cbeb82990e6e2cf33c506.exe 1784 15ed1118d13cbeb82990e6e2cf33c506.exe 2772 ipconfig.exe 2772 ipconfig.exe 2800 ipconfig.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2656 set thread context of 2772 2656 Server.EXE 29 PID 2688 set thread context of 2800 2688 Server.EXE 31 -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Server.EXE ipconfig.exe File created C:\Program Files\Server.EXE ipconfig.exe File opened for modification C:\Program Files\Server.EXE ipconfig.exe File opened for modification C:\Program Files\Server.EXE 15ed1118d13cbeb82990e6e2cf33c506.exe File created C:\Program Files\Server.EXE 15ed1118d13cbeb82990e6e2cf33c506.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2772 ipconfig.exe 2800 ipconfig.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2656 1784 15ed1118d13cbeb82990e6e2cf33c506.exe 28 PID 1784 wrote to memory of 2656 1784 15ed1118d13cbeb82990e6e2cf33c506.exe 28 PID 1784 wrote to memory of 2656 1784 15ed1118d13cbeb82990e6e2cf33c506.exe 28 PID 1784 wrote to memory of 2656 1784 15ed1118d13cbeb82990e6e2cf33c506.exe 28 PID 2656 wrote to memory of 2772 2656 Server.EXE 29 PID 2656 wrote to memory of 2772 2656 Server.EXE 29 PID 2656 wrote to memory of 2772 2656 Server.EXE 29 PID 2656 wrote to memory of 2772 2656 Server.EXE 29 PID 2656 wrote to memory of 2772 2656 Server.EXE 29 PID 2656 wrote to memory of 2772 2656 Server.EXE 29 PID 2772 wrote to memory of 2688 2772 ipconfig.exe 30 PID 2772 wrote to memory of 2688 2772 ipconfig.exe 30 PID 2772 wrote to memory of 2688 2772 ipconfig.exe 30 PID 2772 wrote to memory of 2688 2772 ipconfig.exe 30 PID 2688 wrote to memory of 2800 2688 Server.EXE 31 PID 2688 wrote to memory of 2800 2688 Server.EXE 31 PID 2688 wrote to memory of 2800 2688 Server.EXE 31 PID 2688 wrote to memory of 2800 2688 Server.EXE 31 PID 2688 wrote to memory of 2800 2688 Server.EXE 31 PID 2688 wrote to memory of 2800 2688 Server.EXE 31 PID 2800 wrote to memory of 2700 2800 ipconfig.exe 32 PID 2800 wrote to memory of 2700 2800 ipconfig.exe 32 PID 2800 wrote to memory of 2700 2800 ipconfig.exe 32 PID 2800 wrote to memory of 2700 2800 ipconfig.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\15ed1118d13cbeb82990e6e2cf33c506.exe"C:\Users\Admin\AppData\Local\Temp\15ed1118d13cbeb82990e6e2cf33c506.exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\Server.EXE"C:\Program Files\Server.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\ipconfig.exeC:\Windows\SYSTEM32\ipconfig.exe3⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Server.EXE"C:\Program Files\Server.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\ipconfig.exeC:\Windows\SYSTEM32\ipconfig.exe5⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files\Server.EXE"C:\Program Files\Server.EXE"6⤵
- Executes dropped EXE
PID:2700
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD515ed1118d13cbeb82990e6e2cf33c506
SHA10b3bed9f357f65b695e06df0df911a2edb2f03a8
SHA256e1a59060da34661d6dce398ed14308d92640844daabe31e1604b7b8c4fc12c63
SHA5120d7c9ae8e083f627ce88cc9b776294537fe24f522c1966f6dbaa911376f2e4b26252f8ff8a72b578a0fdcaaa18955fb06ea276ea0cdf368611ab3b9ca248ff65
-
Filesize
26KB
MD5cabb20e171770ff64614a54c1f31c033
SHA1ea18043fedaf888f04c07f71f2006f3f479c0b41
SHA256c0e3087d87c84776fe7ffca768a0793c02d28e34a821f0c9da32339af8e7e6a6
SHA512a6a6beff693f2e2c71c0d8e12f6964e789aa4b370c1e0191b2b0ff038801fdb0038a54c0a8f2dbc0d399d2c016f89701c6b6275b3a2b6fa74fb2a5ea817c2d3b