Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:04
Static task
static1
Behavioral task
behavioral1
Sample
22881642dee4ec8b9ce9c7ce3693cdb7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
22881642dee4ec8b9ce9c7ce3693cdb7.exe
Resource
win10v2004-20231215-en
General
-
Target
22881642dee4ec8b9ce9c7ce3693cdb7.exe
-
Size
13KB
-
MD5
22881642dee4ec8b9ce9c7ce3693cdb7
-
SHA1
7c6c07466e8cdcfc4b0d65714993ad05ac261fe6
-
SHA256
d14818e17de66a4547f91f21143211466116f67988f90e3c06a4592bf0fc3890
-
SHA512
3b077eb473431001615e6f6efe2b1ec809fbcf74ba71abe30c6c19e6ff65234a169dbcdd5b7a4472c465749eb6ccd86fac6fdb1283d195ee28ab7b7128edab80
-
SSDEEP
384:15VQTh1BCbsmUBOnBF+tkdTLX4jDI+DYp:UhqpUUqiZX4jk+4
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\cliconfgzx.dll = "{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}" 22881642dee4ec8b9ce9c7ce3693cdb7.exe -
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 22881642dee4ec8b9ce9c7ce3693cdb7.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\cliconfgzx.tmp 22881642dee4ec8b9ce9c7ce3693cdb7.exe File opened for modification C:\Windows\SysWOW64\cliconfgzx.tmp 22881642dee4ec8b9ce9c7ce3693cdb7.exe File opened for modification C:\Windows\SysWOW64\cliconfgzx.nls 22881642dee4ec8b9ce9c7ce3693cdb7.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32 22881642dee4ec8b9ce9c7ce3693cdb7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32\ = "C:\\Windows\\SysWow64\\cliconfgzx.dll" 22881642dee4ec8b9ce9c7ce3693cdb7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32\ThreadingModel = "Apartment" 22881642dee4ec8b9ce9c7ce3693cdb7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07} 22881642dee4ec8b9ce9c7ce3693cdb7.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2392 22881642dee4ec8b9ce9c7ce3693cdb7.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2392 22881642dee4ec8b9ce9c7ce3693cdb7.exe 2392 22881642dee4ec8b9ce9c7ce3693cdb7.exe 2392 22881642dee4ec8b9ce9c7ce3693cdb7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2652 2392 22881642dee4ec8b9ce9c7ce3693cdb7.exe 29 PID 2392 wrote to memory of 2652 2392 22881642dee4ec8b9ce9c7ce3693cdb7.exe 29 PID 2392 wrote to memory of 2652 2392 22881642dee4ec8b9ce9c7ce3693cdb7.exe 29 PID 2392 wrote to memory of 2652 2392 22881642dee4ec8b9ce9c7ce3693cdb7.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\22881642dee4ec8b9ce9c7ce3693cdb7.exe"C:\Users\Admin\AppData\Local\Temp\22881642dee4ec8b9ce9c7ce3693cdb7.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7964.tmp.bat2⤵
- Deletes itself
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5a6d18a4c21006efdd63f4c63fb1cfe52
SHA112a48d85b017b3e9c84c983d09215ae442f920cc
SHA25683491d408853313083084c0ff83079f4e11a4d9cfa5c5464b24db5692ee30c20
SHA51292124bfd4483adcb603eaf459a0ae8b3498bc8378cb9d7005267e801624f118d370680bf8e5345498eb51b41f4eae1f65c2c5f9cbab76283c82ad2067c9397c9
-
Filesize
384KB
MD5cf98d45036fae5c8a92d88e88394aa23
SHA1c5520f622eb8df3e6dede1ec9135d108e8a8ee2a
SHA256b5d90d5cfd23e91667bfc8707c7fd94bc018e34e47f337c0d3212211a9c0b39a
SHA5127d96a18493b0066eef480760caf6cede61b786a4e1681aa5b987257f3bbbb2e5ba9d3faee32f99f94044aa943b7b85b619ffb87a5acfc640e48adc8916b09b52
-
Filesize
100KB
MD55ab5ae26a5b26d6c04bbe8a8fab0ffaf
SHA1cfbb4b4db802265d1298eec6008e6b4435eac63e
SHA2561d00e6fa51b9c92925608e667267e2747295ecaf5ed06ef835fba8224ef0a8c0
SHA51228af4db2e29cb4d1e1c01487f9f19d86e258eba264e3fa287970b4a2e74d93692ae3bb2a5f14bc58f34a1f8f2721367ad7083c304887b79dbde5dc161a874624