Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
39881622df5f1bec029291493efabcb0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39881622df5f1bec029291493efabcb0.exe
Resource
win10v2004-20231215-en
General
-
Target
39881622df5f1bec029291493efabcb0.exe
-
Size
65KB
-
MD5
39881622df5f1bec029291493efabcb0
-
SHA1
47f95a5c819e9f5964571ac6cc16a2c38a0a5784
-
SHA256
4caa9655337629343b9b546cd1d96ad98d213972d645d00c7f3d71fb7caf635f
-
SHA512
474c9b56a3f8bd1fa15da8ea5837ac5d18732c8098468c1f755a17028a76a71721284152be26b2c26102e6da9534890793e7f7ee5282bf5825716791e8a9520b
-
SSDEEP
1536:h7Lgjr9SUNU1oh2QL1+NjZs9gdHI0p2s42KC7nd7A:hroMTNje9gZ9i2Ku9A
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{28ADEDE1-A4D5-42D8-9B05-BF7C283C4060} = "v2.0|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|Profile=Public|App=C:\\Windows\\system32\\svchost.exe|Name=svchost.exe|Edge=FALSE|" 39881622df5f1bec029291493efabcb0.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\{28ADEDE1-A4D5-42D8-9B05-BF7C283C4059} = "v2.0|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|Profile=Public|App=C:\\Windows\\system32\\svchost.exe|Name=svchost.exe|Edge=FALSE|" 39881622df5f1bec029291493efabcb0.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SPService\Parameters\ServiceDll = "C:\\ProgramData\\Adobe\\sp.DLL" 39881622df5f1bec029291493efabcb0.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SPService\ImagePath = "C:\\Windows\\sysWOW64\\svchost.exe -k netsvc" 39881622df5f1bec029291493efabcb0.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 39881622df5f1bec029291493efabcb0.exe -
resource yara_rule behavioral1/memory/2968-6-0x00000000003D0000-0x00000000003EE000-memory.dmp upx behavioral1/memory/2968-9-0x00000000003D0000-0x00000000003EE000-memory.dmp upx behavioral1/memory/2968-10-0x00000000003D0000-0x00000000003EE000-memory.dmp upx behavioral1/memory/2968-11-0x00000000003D0000-0x00000000003EE000-memory.dmp upx behavioral1/memory/2968-17-0x00000000003D0000-0x00000000003EE000-memory.dmp upx -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sp\CLSID 39881622df5f1bec029291493efabcb0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sp 39881622df5f1bec029291493efabcb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sp\CLSID\ = "{96AFBE69-C3B0-4b00-8578-D933D2896EE2}" 39881622df5f1bec029291493efabcb0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 39881622df5f1bec029291493efabcb0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{96AFBE69-C3B0-4b00-8578-D933D2896EE2} 39881622df5f1bec029291493efabcb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{96AFBE69-C3B0-4b00-8578-D933D2896EE2}\InProcServer32\ThreadingModel = "Apartment" 39881622df5f1bec029291493efabcb0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{96AFBE69-C3B0-4b00-8578-D933D2896EE2}\InProcServer32 39881622df5f1bec029291493efabcb0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 39881622df5f1bec029291493efabcb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{96AFBE69-C3B0-4b00-8578-D933D2896EE2}\InProcServer32\ = "C:\\ProgramData\\Adobe\\sp.DLL" 39881622df5f1bec029291493efabcb0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39881622df5f1bec029291493efabcb0.exe"C:\Users\Admin\AppData\Local\Temp\39881622df5f1bec029291493efabcb0.exe"1⤵
- Modifies firewall policy service
- Sets DLL path for service in the registry
- Sets service image path in registry
- Loads dropped DLL
- Modifies registry class
PID:2968
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD58e97d532db4b808c0ffc2019b905346e
SHA187ea0ec6680a8bfd5bd60ad737ef40e217cbc380
SHA2565a46cc390efe1376eb01822017e7ea7b60fbf8c53883357f2bd55a8836d2e618
SHA512cbaf55bc3a1b98b8e1ad555423d1ae9fc2a1b846a3d0e21f7408cae83111faf468b28829a78fc4a1989abdcb953a9d5e7b78ab666b056a353cfc06190b5b249e