Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
447d740124697f9b1327ab2758ee4f88.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
447d740124697f9b1327ab2758ee4f88.exe
Resource
win10v2004-20231215-en
General
-
Target
447d740124697f9b1327ab2758ee4f88.exe
-
Size
363KB
-
MD5
447d740124697f9b1327ab2758ee4f88
-
SHA1
191552c579bb002805516e7ac74a710fcf6a460c
-
SHA256
554e0aa62697e41dfaa2f0ddeadaa4ea7b29a1558041870fbc5c381a03a7613b
-
SHA512
5ac29e9d40774a78bcbc33924cdb24d24fe3389026a588c6fb18a1c6227015250270f302f332bfd6651fee78ceb526af19cc0393011688a53066641c84b5661b
-
SSDEEP
6144:8bIAyTXoQ3bBVJxRbq3gkKJFoXrIePZ3hH0WO13kKHy:XT4el77eoJFe0eh6Hy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2488 ahli.exe -
Loads dropped DLL 2 IoCs
pid Process 1280 447d740124697f9b1327ab2758ee4f88.exe 1280 447d740124697f9b1327ab2758ee4f88.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\{6CF0A0C8-CEE0-AD4E-46DF-EAE75CAEC9FA} = "C:\\Users\\Admin\\AppData\\Roaming\\Iwsii\\ahli.exe" ahli.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1280 set thread context of 896 1280 447d740124697f9b1327ab2758ee4f88.exe 28 -
Program crash 2 IoCs
pid pid_target Process procid_target 1248 896 WerFault.exe 28 1568 1248 WerFault.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy 447d740124697f9b1327ab2758ee4f88.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 447d740124697f9b1327ab2758ee4f88.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe 2488 ahli.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1280 447d740124697f9b1327ab2758ee4f88.exe 2488 ahli.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2488 1280 447d740124697f9b1327ab2758ee4f88.exe 30 PID 1280 wrote to memory of 2488 1280 447d740124697f9b1327ab2758ee4f88.exe 30 PID 1280 wrote to memory of 2488 1280 447d740124697f9b1327ab2758ee4f88.exe 30 PID 1280 wrote to memory of 2488 1280 447d740124697f9b1327ab2758ee4f88.exe 30 PID 2488 wrote to memory of 1128 2488 ahli.exe 16 PID 2488 wrote to memory of 1128 2488 ahli.exe 16 PID 2488 wrote to memory of 1128 2488 ahli.exe 16 PID 2488 wrote to memory of 1128 2488 ahli.exe 16 PID 2488 wrote to memory of 1128 2488 ahli.exe 16 PID 2488 wrote to memory of 1192 2488 ahli.exe 15 PID 2488 wrote to memory of 1192 2488 ahli.exe 15 PID 2488 wrote to memory of 1192 2488 ahli.exe 15 PID 2488 wrote to memory of 1192 2488 ahli.exe 15 PID 2488 wrote to memory of 1192 2488 ahli.exe 15 PID 2488 wrote to memory of 1228 2488 ahli.exe 9 PID 2488 wrote to memory of 1228 2488 ahli.exe 9 PID 2488 wrote to memory of 1228 2488 ahli.exe 9 PID 2488 wrote to memory of 1228 2488 ahli.exe 9 PID 2488 wrote to memory of 1228 2488 ahli.exe 9 PID 2488 wrote to memory of 320 2488 ahli.exe 13 PID 2488 wrote to memory of 320 2488 ahli.exe 13 PID 2488 wrote to memory of 320 2488 ahli.exe 13 PID 2488 wrote to memory of 320 2488 ahli.exe 13 PID 2488 wrote to memory of 320 2488 ahli.exe 13 PID 2488 wrote to memory of 1280 2488 ahli.exe 27 PID 2488 wrote to memory of 1280 2488 ahli.exe 27 PID 2488 wrote to memory of 1280 2488 ahli.exe 27 PID 2488 wrote to memory of 1280 2488 ahli.exe 27 PID 2488 wrote to memory of 1280 2488 ahli.exe 27 PID 1280 wrote to memory of 896 1280 447d740124697f9b1327ab2758ee4f88.exe 28 PID 1280 wrote to memory of 896 1280 447d740124697f9b1327ab2758ee4f88.exe 28 PID 1280 wrote to memory of 896 1280 447d740124697f9b1327ab2758ee4f88.exe 28 PID 1280 wrote to memory of 896 1280 447d740124697f9b1327ab2758ee4f88.exe 28 PID 1280 wrote to memory of 896 1280 447d740124697f9b1327ab2758ee4f88.exe 28 PID 1280 wrote to memory of 896 1280 447d740124697f9b1327ab2758ee4f88.exe 28 PID 1280 wrote to memory of 896 1280 447d740124697f9b1327ab2758ee4f88.exe 28 PID 1280 wrote to memory of 896 1280 447d740124697f9b1327ab2758ee4f88.exe 28 PID 1280 wrote to memory of 896 1280 447d740124697f9b1327ab2758ee4f88.exe 28 PID 896 wrote to memory of 1248 896 cmd.exe 31 PID 896 wrote to memory of 1248 896 cmd.exe 31 PID 896 wrote to memory of 1248 896 cmd.exe 31 PID 896 wrote to memory of 1248 896 cmd.exe 31 PID 2488 wrote to memory of 1956 2488 ahli.exe 29 PID 2488 wrote to memory of 1956 2488 ahli.exe 29 PID 2488 wrote to memory of 1956 2488 ahli.exe 29 PID 2488 wrote to memory of 1956 2488 ahli.exe 29 PID 2488 wrote to memory of 1956 2488 ahli.exe 29 PID 2488 wrote to memory of 1248 2488 ahli.exe 31 PID 2488 wrote to memory of 1248 2488 ahli.exe 31 PID 2488 wrote to memory of 1248 2488 ahli.exe 31 PID 2488 wrote to memory of 1248 2488 ahli.exe 31 PID 2488 wrote to memory of 1248 2488 ahli.exe 31 PID 1248 wrote to memory of 1568 1248 WerFault.exe 32 PID 1248 wrote to memory of 1568 1248 WerFault.exe 32 PID 1248 wrote to memory of 1568 1248 WerFault.exe 32 PID 1248 wrote to memory of 1568 1248 WerFault.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\447d740124697f9b1327ab2758ee4f88.exe"C:\Users\Admin\AppData\Local\Temp\447d740124697f9b1327ab2758ee4f88.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc97c16a8.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 1164⤵
- Program crash
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 5365⤵
- Program crash
PID:1568
-
-
-
-
C:\Users\Admin\AppData\Roaming\Iwsii\ahli.exe"C:\Users\Admin\AppData\Roaming\Iwsii\ahli.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2488
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:320
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-195951677814503984671017121529-756744923-203108215613258263489698066741725740800"1⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD5f3ffbd69f0f21927f9656fd41de64ff7
SHA18a9d011ae5c4cfa41b6e2eede3f2fbacdcb7c9a6
SHA256c7aead0c9f0185ee2e083178f50e63dd4530009c5365f1bf9ee8b1faa5bcfd57
SHA512ddc6d569fbf14f94759ec4a32af6d5a07300a77c3c524bea448f7de7a94f3de4cb10b28620e38dc6913fe60ac895abab670a7d4e1610c7690385cd81951fe60d