Analysis
-
max time kernel
2s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
2b9166401303584d7d0000c9633343c7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b9166401303584d7d0000c9633343c7.exe
Resource
win10v2004-20231215-en
General
-
Target
2b9166401303584d7d0000c9633343c7.exe
-
Size
108KB
-
MD5
2b9166401303584d7d0000c9633343c7
-
SHA1
b16e55c8825612453a2bc106abbc83f18da129a8
-
SHA256
877822bf052ce6e25bc2c5b535bb9571f46ff6ed6040d30f6169054133799cba
-
SHA512
7252448066015ea687dbd8a0f07410bdd1432114011b0d16169f18f07d8b72a8f6292b36ce6169b55b4d5c8ddd83532c2fde26a7a2c1d2c90c85be5652ffaca4
-
SSDEEP
1536:t055xWzJVa2iXr3V55w6yci8lsS8e9Ypwuu:t05zGg2Exw6Bi8n5
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2212 2b9166401303584d7d0000c9633343c7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\MsIMMs32 = "C:\\Windows\\MsIMMs32.exE" 2b9166401303584d7d0000c9633343c7.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\MsIMMs32.dll 2b9166401303584d7d0000c9633343c7.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MsIMMs32.exE 2b9166401303584d7d0000c9633343c7.exe File opened for modification C:\Windows\MsIMMs32.exE 2b9166401303584d7d0000c9633343c7.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2212 2b9166401303584d7d0000c9633343c7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2212 2b9166401303584d7d0000c9633343c7.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1244 2212 2b9166401303584d7d0000c9633343c7.exe 10 PID 2212 wrote to memory of 1244 2212 2b9166401303584d7d0000c9633343c7.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2b9166401303584d7d0000c9633343c7.exe"C:\Users\Admin\AppData\Local\Temp\2b9166401303584d7d0000c9633343c7.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD58fa1d2e6d326b5c326c683aad3c22bd5
SHA134db077785ef84d511751b4fbfff7371efeb448d
SHA256dc32233a2c42cf0619ff27e47e9e829d4516fef4886cf6450b2abcd0f5206f8d
SHA512dfe47a851df2e25feeda1d9d3a3fcd790853cd4f12dfebc59fe92bf7f0eef6575500d1678ad3fecc5c0b5fd30a827a5ba724ca4f13692d05be56f91098f9de9e