Analysis
-
max time kernel
160s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
3f67b266efd7009ca4f612cd4bc6cddd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f67b266efd7009ca4f612cd4bc6cddd.exe
Resource
win10v2004-20231222-en
General
-
Target
3f67b266efd7009ca4f612cd4bc6cddd.exe
-
Size
36KB
-
MD5
3f67b266efd7009ca4f612cd4bc6cddd
-
SHA1
142c734fe0d97fa1d5d8fef86ad1558915870d0b
-
SHA256
75f112eb3ae0172206662d1c162afee8b40a62778f20ba42428e95c1de2f7288
-
SHA512
95fac4cd573248bacc1bd09514729ed3f7a8c57e84cf2ad09ad36205651d4e4e12a98dbdc7ca1e74c20dab14d3fc7bd28cbc018f60a7ee2346cf32639df5a0aa
-
SSDEEP
768:5rlSw0hgIj8xP+Ucci6forHtRpxcabUrdwVcME4++L7Z:5rs6FNKciioJJcabQdUE4++nZ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1728 BINR.exe 2704 ssvchost.exe 2972 msvchost.exe -
Loads dropped DLL 12 IoCs
pid Process 1612 3f67b266efd7009ca4f612cd4bc6cddd.exe 1612 3f67b266efd7009ca4f612cd4bc6cddd.exe 1728 BINR.exe 1728 BINR.exe 1728 BINR.exe 2704 ssvchost.exe 2704 ssvchost.exe 1184 WerFault.exe 1184 WerFault.exe 1184 WerFault.exe 1184 WerFault.exe 1184 WerFault.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\regm64.dll BINR.exe File created C:\Windows\SysWOW64\msvchost.exe BINR.exe File opened for modification C:\Windows\SysWOW64\msvchost.exe BINR.exe File created C:\Windows\SysWOW64\ssvchost.exe BINR.exe File opened for modification C:\Windows\SysWOW64\rmnl.dll msvchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1184 2972 WerFault.exe 33 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 DllHost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1728 BINR.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1728 1612 3f67b266efd7009ca4f612cd4bc6cddd.exe 31 PID 1612 wrote to memory of 1728 1612 3f67b266efd7009ca4f612cd4bc6cddd.exe 31 PID 1612 wrote to memory of 1728 1612 3f67b266efd7009ca4f612cd4bc6cddd.exe 31 PID 1612 wrote to memory of 1728 1612 3f67b266efd7009ca4f612cd4bc6cddd.exe 31 PID 1728 wrote to memory of 2704 1728 BINR.exe 32 PID 1728 wrote to memory of 2704 1728 BINR.exe 32 PID 1728 wrote to memory of 2704 1728 BINR.exe 32 PID 1728 wrote to memory of 2704 1728 BINR.exe 32 PID 2704 wrote to memory of 2972 2704 ssvchost.exe 33 PID 2704 wrote to memory of 2972 2704 ssvchost.exe 33 PID 2704 wrote to memory of 2972 2704 ssvchost.exe 33 PID 2704 wrote to memory of 2972 2704 ssvchost.exe 33 PID 2972 wrote to memory of 1184 2972 msvchost.exe 34 PID 2972 wrote to memory of 1184 2972 msvchost.exe 34 PID 2972 wrote to memory of 1184 2972 msvchost.exe 34 PID 2972 wrote to memory of 1184 2972 msvchost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f67b266efd7009ca4f612cd4bc6cddd.exe"C:\Users\Admin\AppData\Local\Temp\3f67b266efd7009ca4f612cd4bc6cddd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\BINR.exeC:\Users\Admin\AppData\Local\Temp\BINR.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\ssvchost.exe"C:\Windows\system32\ssvchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\msvchost.exe"C:\Windows\system32\msvchost.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 1965⤵
- Loads dropped DLL
- Program crash
PID:1184
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5589d23607984760a03ff02e5c6333f0d
SHA1d445c99e0d9eb4e1c48a19147f54ef2ae22f6260
SHA25600e459d66b745fdf120e51a3804d9a156934dadd00bc3c8fa19b17e8b8a9bf99
SHA51238389a24bb4d34e3692edf0b47558cdf17bda7084c4d1091369bdd0afa3339f5f3544d328c16adf2985fec9118b675eee67de36af7a8f9057ababaefed5211ba
-
Filesize
12KB
MD5947e647325c221bf812d29d45d8e4361
SHA131f0bfe1407fc1d1caa3f1f3423b1f6397c1106b
SHA256e12b8818d0c13b3aadcf86d3b3890a37c7d55b1de7a781cbc62516f32b6c2ccf
SHA5127f816188fff02ce7eefb22efad4222799a6866b96caacc94b822daf10eed7702e49cdc37f8cd203847cdb0987d2a77a2201c13f40ae2942957f7f8f36a3decc7
-
Filesize
12KB
MD5618ba27f0502751f408b211f61747827
SHA1c78868c7b629d2e5d4f447099c9726379b6d421d
SHA2565c5b2b741b4a7a152f9750e36c61fab1f65ef41955013db8aa487a2ab29b6eb6
SHA512de6454a04c43c4d0d7f6604b9c0e61eea5fa88b9c15253817b7823b9e3446778331d25ca005625b69bf1f1cf01abe6b89dcdb752d6e179cb59be31f0439fe99d