Analysis
-
max time kernel
151s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 13:48
Static task
static1
Behavioral task
behavioral1
Sample
1a8894a8f3878409a159a4db60910ae8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a8894a8f3878409a159a4db60910ae8.exe
Resource
win10v2004-20231222-en
General
-
Target
1a8894a8f3878409a159a4db60910ae8.exe
-
Size
214KB
-
MD5
1a8894a8f3878409a159a4db60910ae8
-
SHA1
65442414f42389a50a433fd52e3d86d7183f3202
-
SHA256
d47dc46323604c7164ea6c7ddff3b5ab4da9270ed0a5161c1cfaafbd02da4d6a
-
SHA512
e7e5c6d777f2d924571b8510a499e1fc7cd66a349d49658b9acc12044e5775221e4a32678fde9e2a047d392aa960db30587f3ba62bb3038e44a704e17196a733
-
SSDEEP
3072:vEoB+tB6/X1zqoHLsnEtf/pp3qmv1JJGd/AYKW1qW:AvYWSLzf/pp6mv70L1q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2860 msa.exe -
resource yara_rule behavioral1/memory/2232-2-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-11-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2232-6063-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-21383-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2232-28693-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-38537-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-38538-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-38540-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-38541-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-38542-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-38543-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-38544-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-38546-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-38547-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/memory/2860-38548-0x0000000000400000-0x000000000047E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Videocan = "C:\\Windows\\msa.exe" msa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 1a8894a8f3878409a159a4db60910ae8.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 1a8894a8f3878409a159a4db60910ae8.exe File created C:\Windows\msa.exe 1a8894a8f3878409a159a4db60910ae8.exe File opened for modification C:\Windows\msa.exe 1a8894a8f3878409a159a4db60910ae8.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\International msa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 1a8894a8f3878409a159a4db60910ae8.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe 2860 msa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2860 2232 1a8894a8f3878409a159a4db60910ae8.exe 30 PID 2232 wrote to memory of 2860 2232 1a8894a8f3878409a159a4db60910ae8.exe 30 PID 2232 wrote to memory of 2860 2232 1a8894a8f3878409a159a4db60910ae8.exe 30 PID 2232 wrote to memory of 2860 2232 1a8894a8f3878409a159a4db60910ae8.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a8894a8f3878409a159a4db60910ae8.exe"C:\Users\Admin\AppData\Local\Temp\1a8894a8f3878409a159a4db60910ae8.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\msa.exeC:\Windows\msa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD50d1d9be2261601b9906dbba85a2e14af
SHA1ebc332dd13abcdf30fbe31ce94465d0f56ed97fc
SHA25678e68c4fd77e344d4a55a5f904e42ab73af33b4926a4f778ef0f79bb2cd798fe
SHA51289b0891384898cb5f6cd6540a0077a22deccf03eba4e523ae707750f3b9575540f7cbe696586c6f9d2d7dd6c8f5565bf2f5de8ae509bf6a66b8b44ce7da51546
-
Filesize
214KB
MD51a8894a8f3878409a159a4db60910ae8
SHA165442414f42389a50a433fd52e3d86d7183f3202
SHA256d47dc46323604c7164ea6c7ddff3b5ab4da9270ed0a5161c1cfaafbd02da4d6a
SHA512e7e5c6d777f2d924571b8510a499e1fc7cd66a349d49658b9acc12044e5775221e4a32678fde9e2a047d392aa960db30587f3ba62bb3038e44a704e17196a733