Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 16:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3d4e1b27dccfe21fa8c30114c5f5cfd0.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
3d4e1b27dccfe21fa8c30114c5f5cfd0.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
3d4e1b27dccfe21fa8c30114c5f5cfd0.exe
-
Size
1.2MB
-
MD5
3d4e1b27dccfe21fa8c30114c5f5cfd0
-
SHA1
abbde50823ab86fc33e857e3f6f4d108d427543a
-
SHA256
b4c09f38796cec7b6e790b8956f585109065e9b70f972b50e3263c5f1af06145
-
SHA512
05653fd983eeec5f78521d405809f88f97fa46967e6562a5967c58617e327ba3103e86831935437ecf91443d71735eb143c8db7c756f71eb2e85bbf0f3c15ec3
-
SSDEEP
24576:GIxx4RfxnUcoCdqr0Lk7OmII9JH6Qm0+eihOEKYjRiZ2TJlsd:wUA0ND6JeiOE7jUZYQd
Score
8/10
Malware Config
Signatures
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\system\\service.exe" 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\reg_k1.txt 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\service.exe 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe File opened for modification C:\Windows\system\service.exe 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2372 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 28 PID 2364 wrote to memory of 2372 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 28 PID 2364 wrote to memory of 2372 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 28 PID 2364 wrote to memory of 2372 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 28 PID 2364 wrote to memory of 2204 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 30 PID 2364 wrote to memory of 2204 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 30 PID 2364 wrote to memory of 2204 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 30 PID 2364 wrote to memory of 2204 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 30 PID 2364 wrote to memory of 2672 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 31 PID 2364 wrote to memory of 2672 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 31 PID 2364 wrote to memory of 2672 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 31 PID 2364 wrote to memory of 2672 2364 3d4e1b27dccfe21fa8c30114c5f5cfd0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d4e1b27dccfe21fa8c30114c5f5cfd0.exe"C:\Users\Admin\AppData\Local\Temp\3d4e1b27dccfe21fa8c30114c5f5cfd0.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2372
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2204
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2672
-