Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
3ebac8bd820cbbdc24e06cd9da4ea9d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ebac8bd820cbbdc24e06cd9da4ea9d3.exe
Resource
win10v2004-20231215-en
General
-
Target
3ebac8bd820cbbdc24e06cd9da4ea9d3.exe
-
Size
653KB
-
MD5
3ebac8bd820cbbdc24e06cd9da4ea9d3
-
SHA1
9705d579a411869b0a429b8fc9ef7c7cd4f14d1a
-
SHA256
a1a3e83f0137f527f5b86504cfb0cf0a5097a73a7d1caea41fbf5974d673b02c
-
SHA512
e38c374b9a65f1fd2047a5f258ef1c40183566c2ce3bad27a616321f1f0a3e4973a8e71bf98ee8ec72b0c33938284c0364360010e8837de6eb965a60aa5c6eeb
-
SSDEEP
3072:DFZ5qVGXvEQU+dXmEUy9rfe3kUdKSh7hKNjf7CwhqjEr8IcGN8yGBYPosqkxOqoN:JjqVG/pJZzfwsGX+LOODg
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1028 tserv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tserv = "C:\\Windows\\tserv.exe s" tserv.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tserv.exe 3ebac8bd820cbbdc24e06cd9da4ea9d3.exe File opened for modification C:\Windows\tserv.exe 3ebac8bd820cbbdc24e06cd9da4ea9d3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1028 3032 3ebac8bd820cbbdc24e06cd9da4ea9d3.exe 28 PID 3032 wrote to memory of 1028 3032 3ebac8bd820cbbdc24e06cd9da4ea9d3.exe 28 PID 3032 wrote to memory of 1028 3032 3ebac8bd820cbbdc24e06cd9da4ea9d3.exe 28 PID 3032 wrote to memory of 1028 3032 3ebac8bd820cbbdc24e06cd9da4ea9d3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ebac8bd820cbbdc24e06cd9da4ea9d3.exe"C:\Users\Admin\AppData\Local\Temp\3ebac8bd820cbbdc24e06cd9da4ea9d3.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\tserv.exeC:\Windows\tserv.exe s2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653KB
MD53ebac8bd820cbbdc24e06cd9da4ea9d3
SHA19705d579a411869b0a429b8fc9ef7c7cd4f14d1a
SHA256a1a3e83f0137f527f5b86504cfb0cf0a5097a73a7d1caea41fbf5974d673b02c
SHA512e38c374b9a65f1fd2047a5f258ef1c40183566c2ce3bad27a616321f1f0a3e4973a8e71bf98ee8ec72b0c33938284c0364360010e8837de6eb965a60aa5c6eeb