Analysis
-
max time kernel
120s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
263e57024e38d40170ec2ef3068a10a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
263e57024e38d40170ec2ef3068a10a9.exe
Resource
win10v2004-20231215-en
General
-
Target
263e57024e38d40170ec2ef3068a10a9.exe
-
Size
27KB
-
MD5
263e57024e38d40170ec2ef3068a10a9
-
SHA1
3e0ae44e3493f7e4a80ae724650ab259bdb44535
-
SHA256
b332bbe4dcb59a97cb405c5faf1d90bf0c61f183fcbd0842bdb4edbbaf701dd0
-
SHA512
d3b45c1b2d947f9b07847e79cce7cf0e8e55e2480334ffdda6953fe89ca99e3ede980d72a4a194fea46ce9843629b9230c0e21d93304dee66758772604840b56
-
SSDEEP
768:Q8/vuzm4DH+4U+CSWX34wF4jCFy1CikZcKTs:VvgdDH+4zCSWX34wFWCFy1CPZc
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2804 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mailmsg32 = "rundll32.exe mailmsg32.dll,egah" 263e57024e38d40170ec2ef3068a10a9.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\8494019b.dll 263e57024e38d40170ec2ef3068a10a9.exe File opened for modification C:\Windows\SysWOW64\8494019b.dll 263e57024e38d40170ec2ef3068a10a9.exe File created C:\Windows\SysWOW64\mailmsg32.dll 263e57024e38d40170ec2ef3068a10a9.exe File opened for modification C:\Windows\SysWOW64\mailmsg32.dll 263e57024e38d40170ec2ef3068a10a9.exe File created C:\Windows\SysWOW64\3804b62b.dll 263e57024e38d40170ec2ef3068a10a9.exe File opened for modification C:\Windows\SysWOW64\3804b62b.dll 263e57024e38d40170ec2ef3068a10a9.exe File created C:\Windows\SysWOW64\447677be.dll 263e57024e38d40170ec2ef3068a10a9.exe File opened for modification C:\Windows\SysWOW64\447677be.dll 263e57024e38d40170ec2ef3068a10a9.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2740 sc.exe 2776 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2804 2716 263e57024e38d40170ec2ef3068a10a9.exe 27 PID 2716 wrote to memory of 2804 2716 263e57024e38d40170ec2ef3068a10a9.exe 27 PID 2716 wrote to memory of 2804 2716 263e57024e38d40170ec2ef3068a10a9.exe 27 PID 2716 wrote to memory of 2804 2716 263e57024e38d40170ec2ef3068a10a9.exe 27 PID 2716 wrote to memory of 2740 2716 263e57024e38d40170ec2ef3068a10a9.exe 30 PID 2716 wrote to memory of 2740 2716 263e57024e38d40170ec2ef3068a10a9.exe 30 PID 2716 wrote to memory of 2740 2716 263e57024e38d40170ec2ef3068a10a9.exe 30 PID 2716 wrote to memory of 2740 2716 263e57024e38d40170ec2ef3068a10a9.exe 30 PID 2716 wrote to memory of 2776 2716 263e57024e38d40170ec2ef3068a10a9.exe 32 PID 2716 wrote to memory of 2776 2716 263e57024e38d40170ec2ef3068a10a9.exe 32 PID 2716 wrote to memory of 2776 2716 263e57024e38d40170ec2ef3068a10a9.exe 32 PID 2716 wrote to memory of 2776 2716 263e57024e38d40170ec2ef3068a10a9.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\263e57024e38d40170ec2ef3068a10a9.exe"C:\Users\Admin\AppData\Local\Temp\263e57024e38d40170ec2ef3068a10a9.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe firewall add portopening TCP 1654 messenger2⤵
- Modifies Windows Firewall
PID:2804
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create mailmsg32 type= share start= auto DisplayName= "Mail Message Objects DLL" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\mailmsg32.dll,egah"2⤵
- Launches sc.exe
PID:2740
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description mailmsg32 "Mail Message Objects DLL"2⤵
- Launches sc.exe
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD593b885adfe0da089cdf634904fd59f71
SHA15ba93c9db0cff93f52b521d7420e43f6eda2784f
SHA2566e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d
SHA512b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee