Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:26
Behavioral task
behavioral1
Sample
281c2e683cd34ffe27a3f4158cc694b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
281c2e683cd34ffe27a3f4158cc694b2.exe
Resource
win10v2004-20231215-en
General
-
Target
281c2e683cd34ffe27a3f4158cc694b2.exe
-
Size
32KB
-
MD5
281c2e683cd34ffe27a3f4158cc694b2
-
SHA1
03c613451d420bb0d47263a0d2d37fdd85dbebf8
-
SHA256
a73bf74ad6e1064bae65676feb50da619953869804c578fad45e468efe44e1a8
-
SHA512
4d4f1faed153c2a609e93ce08524392743dc251342c6fc0ddeabaee94becde11716815750d9acd3948b82ce61df67f918681b3698102f8c27f4c5923ce9b2956
-
SSDEEP
384:qWRG4HJzhJORMQ+rqENsNv3jgP/hHIqpDkiuiXte8Fb1/6qsv4AnCjNe9XaktPTD:M4HJzSKBqoYPS/fpVuiXk8F3kwCa0nPH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2680 Passepartout.exe -
resource yara_rule behavioral1/memory/2008-0-0x0000000000010000-0x0000000000029000-memory.dmp upx behavioral1/files/0x000d000000012251-8.dat upx behavioral1/memory/2008-21-0x0000000000010000-0x0000000000029000-memory.dmp upx behavioral1/memory/2680-34-0x0000000000010000-0x0000000000029000-memory.dmp upx behavioral1/memory/2008-32-0x0000000000010000-0x0000000000029000-memory.dmp upx behavioral1/memory/2680-35-0x0000000000010000-0x0000000000029000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\FASTTRACKPassepartout = "C:\\Windows\\Passepartout.exe -A" 281c2e683cd34ffe27a3f4158cc694b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FASTTRACKPassepartout = "C:\\Windows\\Passepartout.exe -A" 281c2e683cd34ffe27a3f4158cc694b2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Passepartout.exe 281c2e683cd34ffe27a3f4158cc694b2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2008 281c2e683cd34ffe27a3f4158cc694b2.exe 2008 281c2e683cd34ffe27a3f4158cc694b2.exe 2008 281c2e683cd34ffe27a3f4158cc694b2.exe 2008 281c2e683cd34ffe27a3f4158cc694b2.exe 2008 281c2e683cd34ffe27a3f4158cc694b2.exe 2680 Passepartout.exe 2680 Passepartout.exe 2680 Passepartout.exe 2680 Passepartout.exe 2680 Passepartout.exe 2680 Passepartout.exe 2680 Passepartout.exe 2680 Passepartout.exe 2680 Passepartout.exe 2680 Passepartout.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2680 2008 281c2e683cd34ffe27a3f4158cc694b2.exe 31 PID 2008 wrote to memory of 2680 2008 281c2e683cd34ffe27a3f4158cc694b2.exe 31 PID 2008 wrote to memory of 2680 2008 281c2e683cd34ffe27a3f4158cc694b2.exe 31 PID 2008 wrote to memory of 2680 2008 281c2e683cd34ffe27a3f4158cc694b2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\281c2e683cd34ffe27a3f4158cc694b2.exe"C:\Users\Admin\AppData\Local\Temp\281c2e683cd34ffe27a3f4158cc694b2.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\Passepartout.exe"C:\Windows\Passepartout.exe" -A2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5281c2e683cd34ffe27a3f4158cc694b2
SHA103c613451d420bb0d47263a0d2d37fdd85dbebf8
SHA256a73bf74ad6e1064bae65676feb50da619953869804c578fad45e468efe44e1a8
SHA5124d4f1faed153c2a609e93ce08524392743dc251342c6fc0ddeabaee94becde11716815750d9acd3948b82ce61df67f918681b3698102f8c27f4c5923ce9b2956