Analysis
-
max time kernel
0s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1946f2361b66efcb51df0b8609711e6e.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1946f2361b66efcb51df0b8609711e6e.exe
Resource
win10v2004-20231222-en
9 signatures
150 seconds
General
-
Target
1946f2361b66efcb51df0b8609711e6e.exe
-
Size
43KB
-
MD5
1946f2361b66efcb51df0b8609711e6e
-
SHA1
7ce4db08f2623f8b7a72b2ffba1f50e3d30b30ef
-
SHA256
f13b1c674c766083cba391e399ce76131e2dddb7930fa2df198ef6a17aca6c17
-
SHA512
793b2f5c5ec12330fcf76143c515cdb1530dea95defdb6e91ca133ba3874dea9a7b1ab70cebc2e3b78709615927da407274aec15cd32e5b9729e42dad69cd10b
-
SSDEEP
768:pmLnEO9JZnaigm8/8IIqaMlN2EHYf/Fj9XTQ224+:pmfjZnf0nMfkY3h9U227
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3000 1946f2361b66efcb51df0b8609711e6e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winblg32.rom,NEMRun" 1946f2361b66efcb51df0b8609711e6e.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winblg32.rom 1946f2361b66efcb51df0b8609711e6e.exe File opened for modification C:\Windows\SysWOW64\winblg32.rom 1946f2361b66efcb51df0b8609711e6e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3064 3000 1946f2361b66efcb51df0b8609711e6e.exe 19 PID 3000 wrote to memory of 3064 3000 1946f2361b66efcb51df0b8609711e6e.exe 19 PID 3000 wrote to memory of 3064 3000 1946f2361b66efcb51df0b8609711e6e.exe 19 PID 3000 wrote to memory of 3064 3000 1946f2361b66efcb51df0b8609711e6e.exe 19 PID 3064 wrote to memory of 2608 3064 cmd.exe 18 PID 3064 wrote to memory of 2608 3064 cmd.exe 18 PID 3064 wrote to memory of 2608 3064 cmd.exe 18 PID 3064 wrote to memory of 2608 3064 cmd.exe 18
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:21⤵PID:2624
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding1⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding1⤵
- Suspicious use of WriteProcessMemory
PID:3064
-
C:\Users\Admin\AppData\Local\Temp\1946f2361b66efcb51df0b8609711e6e.exe"C:\Users\Admin\AppData\Local\Temp\1946f2361b66efcb51df0b8609711e6e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1946f2361b66efcb51df0b8609711e6e.bat"2⤵PID:2464
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\twe62E8.bat"2⤵PID:2604
-