Analysis
-
max time kernel
124s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
27a0db1e476d5f99524225521dce569e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27a0db1e476d5f99524225521dce569e.exe
Resource
win10v2004-20231222-en
General
-
Target
27a0db1e476d5f99524225521dce569e.exe
-
Size
52KB
-
MD5
27a0db1e476d5f99524225521dce569e
-
SHA1
ff30d543951d7d33a8ba415945ff1b973d169e0e
-
SHA256
326b669abea961fc473bc010010cb96524bcfb5519157e55700a80f067a6d8af
-
SHA512
2864645a2e7ff65253a0cda2f3e766e6619c14f6fb08e32b9bc471a92deb92d069ccd53d2ff73a13b656d9cca378d406f620091f62d8272062ed62c133920e06
-
SSDEEP
768:C96E8n34lzc8VoE4tytrPsSm9vt51r4lzc6E8n3:Cw4Bc8+stAHl51r4Bc
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
pid Process 2156 cmd.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2704 sc.exe 2740 sc.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2900 27a0db1e476d5f99524225521dce569e.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2724 2900 27a0db1e476d5f99524225521dce569e.exe 28 PID 2900 wrote to memory of 2724 2900 27a0db1e476d5f99524225521dce569e.exe 28 PID 2900 wrote to memory of 2724 2900 27a0db1e476d5f99524225521dce569e.exe 28 PID 2900 wrote to memory of 2724 2900 27a0db1e476d5f99524225521dce569e.exe 28 PID 2900 wrote to memory of 2812 2900 27a0db1e476d5f99524225521dce569e.exe 29 PID 2900 wrote to memory of 2812 2900 27a0db1e476d5f99524225521dce569e.exe 29 PID 2900 wrote to memory of 2812 2900 27a0db1e476d5f99524225521dce569e.exe 29 PID 2900 wrote to memory of 2812 2900 27a0db1e476d5f99524225521dce569e.exe 29 PID 2724 wrote to memory of 2804 2724 net.exe 33 PID 2724 wrote to memory of 2804 2724 net.exe 33 PID 2724 wrote to memory of 2804 2724 net.exe 33 PID 2724 wrote to memory of 2804 2724 net.exe 33 PID 2812 wrote to memory of 2752 2812 net.exe 32 PID 2812 wrote to memory of 2752 2812 net.exe 32 PID 2812 wrote to memory of 2752 2812 net.exe 32 PID 2812 wrote to memory of 2752 2812 net.exe 32 PID 2900 wrote to memory of 2704 2900 27a0db1e476d5f99524225521dce569e.exe 34 PID 2900 wrote to memory of 2704 2900 27a0db1e476d5f99524225521dce569e.exe 34 PID 2900 wrote to memory of 2704 2900 27a0db1e476d5f99524225521dce569e.exe 34 PID 2900 wrote to memory of 2704 2900 27a0db1e476d5f99524225521dce569e.exe 34 PID 2900 wrote to memory of 2740 2900 27a0db1e476d5f99524225521dce569e.exe 35 PID 2900 wrote to memory of 2740 2900 27a0db1e476d5f99524225521dce569e.exe 35 PID 2900 wrote to memory of 2740 2900 27a0db1e476d5f99524225521dce569e.exe 35 PID 2900 wrote to memory of 2740 2900 27a0db1e476d5f99524225521dce569e.exe 35 PID 2900 wrote to memory of 2156 2900 27a0db1e476d5f99524225521dce569e.exe 39 PID 2900 wrote to memory of 2156 2900 27a0db1e476d5f99524225521dce569e.exe 39 PID 2900 wrote to memory of 2156 2900 27a0db1e476d5f99524225521dce569e.exe 39 PID 2900 wrote to memory of 2156 2900 27a0db1e476d5f99524225521dce569e.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\27a0db1e476d5f99524225521dce569e.exe"C:\Users\Admin\AppData\Local\Temp\27a0db1e476d5f99524225521dce569e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\net.exenet stop wscsvc2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵PID:2804
-
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵PID:2752
-
-
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc2⤵
- Launches sc.exe
PID:2704
-
-
C:\Windows\SysWOW64\sc.exesc delete sharedaccess2⤵
- Launches sc.exe
PID:2740
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\27a0db1e476d5f99524225521dce569e.bat C:\Users\Admin\AppData\Local\Temp\27a0db1e476d5f99524225521dce569e.exe C:\Users\Admin\AppData\Local\Temp\27a0db1e476d5f99524225521dce569e.bat2⤵
- Deletes itself
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD5e3b0a4ae48f7cfe95b51f8d3cfd329d0
SHA116d9435d895dcf1680baf5b8ebc6342f561af049
SHA25690423a49e145f44c6cefc80ba4351d04a4eaaee2b86e38aad1d9927fbad3d7bf
SHA5125abd674b6e8896bedacd7e0ae593d49771f5c5a036adab1963a37e38f5f2cf185b157d101e97c6e1572b5ae4dfcbfa0470871b2faa0a8d96c6dae19b1329b9f3