Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
15ed1118d13cbeb82990e6e2cf33c506.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15ed1118d13cbeb82990e6e2cf33c506.exe
Resource
win10v2004-20231215-en
General
-
Target
15ed1118d13cbeb82990e6e2cf33c506.exe
-
Size
116KB
-
MD5
15ed1118d13cbeb82990e6e2cf33c506
-
SHA1
0b3bed9f357f65b695e06df0df911a2edb2f03a8
-
SHA256
e1a59060da34661d6dce398ed14308d92640844daabe31e1604b7b8c4fc12c63
-
SHA512
0d7c9ae8e083f627ce88cc9b776294537fe24f522c1966f6dbaa911376f2e4b26252f8ff8a72b578a0fdcaaa18955fb06ea276ea0cdf368611ab3b9ca248ff65
-
SSDEEP
3072:6/uzwf9se/JUkxRWySst/CojxqdQUNsk8:6/ucfOCuQROstlxqdVNM
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\Server.EXE" 15ed1118d13cbeb82990e6e2cf33c506.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} 15ed1118d13cbeb82990e6e2cf33c506.exe -
Executes dropped EXE 1 IoCs
pid Process 4280 Server.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4280 set thread context of 2684 4280 Server.EXE 91 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Server.EXE 15ed1118d13cbeb82990e6e2cf33c506.exe File created C:\Program Files\Server.EXE 15ed1118d13cbeb82990e6e2cf33c506.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2684 ipconfig.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4280 4308 15ed1118d13cbeb82990e6e2cf33c506.exe 90 PID 4308 wrote to memory of 4280 4308 15ed1118d13cbeb82990e6e2cf33c506.exe 90 PID 4308 wrote to memory of 4280 4308 15ed1118d13cbeb82990e6e2cf33c506.exe 90 PID 4280 wrote to memory of 2684 4280 Server.EXE 91 PID 4280 wrote to memory of 2684 4280 Server.EXE 91 PID 4280 wrote to memory of 2684 4280 Server.EXE 91 PID 4280 wrote to memory of 2684 4280 Server.EXE 91 PID 4280 wrote to memory of 2684 4280 Server.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\15ed1118d13cbeb82990e6e2cf33c506.exe"C:\Users\Admin\AppData\Local\Temp\15ed1118d13cbeb82990e6e2cf33c506.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files\Server.EXE"C:\Program Files\Server.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\ipconfig.exeC:\Windows\SYSTEM32\ipconfig.exe3⤵
- Gathers network information
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD515ed1118d13cbeb82990e6e2cf33c506
SHA10b3bed9f357f65b695e06df0df911a2edb2f03a8
SHA256e1a59060da34661d6dce398ed14308d92640844daabe31e1604b7b8c4fc12c63
SHA5120d7c9ae8e083f627ce88cc9b776294537fe24f522c1966f6dbaa911376f2e4b26252f8ff8a72b578a0fdcaaa18955fb06ea276ea0cdf368611ab3b9ca248ff65