Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 13:52
Static task
static1
Behavioral task
behavioral1
Sample
4925b9c17c5c0de34eedf258f8f4f374.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4925b9c17c5c0de34eedf258f8f4f374.exe
Resource
win10v2004-20231215-en
General
-
Target
4925b9c17c5c0de34eedf258f8f4f374.exe
-
Size
202KB
-
MD5
4925b9c17c5c0de34eedf258f8f4f374
-
SHA1
0a66255b71760d6fd467ad48c7be3816e32097c9
-
SHA256
9a6a99e76ce170b6abda7ba6fbe18d492b5276db3ca68ed273de74e5cb564e42
-
SHA512
dd49fb95737b42d93cbb3359ceefaa9fcecf3c4c66f22f19207cd513e2184524db666f0641f4896a43b817740b8d40c3c0cb99066d137795f750791be68295aa
-
SSDEEP
6144:lkaoTSj1byLqohs0g7ltVXPeAayyQqxa1m:UGpbyLLhCJfkyylG
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2604 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
Explorer.EXEpid process 1360 Explorer.EXE -
Loads dropped DLL 8 IoCs
Processes:
4925b9c17c5c0de34eedf258f8f4f374.exerundll32.execmd.exeattrib.exepid process 1420 4925b9c17c5c0de34eedf258f8f4f374.exe 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 1704 rundll32.exe 2604 cmd.exe 1352 attrib.exe 852 -
Drops file in System32 directory 2 IoCs
Processes:
4925b9c17c5c0de34eedf258f8f4f374.exedescription ioc process File opened for modification C:\Windows\SysWOW64\dccwskey.dll 4925b9c17c5c0de34eedf258f8f4f374.exe File opened for modification C:\Windows\system32\dccwskey64.dll 4925b9c17c5c0de34eedf258f8f4f374.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
4925b9c17c5c0de34eedf258f8f4f374.exepid process 1420 4925b9c17c5c0de34eedf258f8f4f374.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
4925b9c17c5c0de34eedf258f8f4f374.exerundll32.execmd.exedescription pid process target process PID 1420 wrote to memory of 1704 1420 4925b9c17c5c0de34eedf258f8f4f374.exe rundll32.exe PID 1420 wrote to memory of 1704 1420 4925b9c17c5c0de34eedf258f8f4f374.exe rundll32.exe PID 1420 wrote to memory of 1704 1420 4925b9c17c5c0de34eedf258f8f4f374.exe rundll32.exe PID 1420 wrote to memory of 1704 1420 4925b9c17c5c0de34eedf258f8f4f374.exe rundll32.exe PID 1420 wrote to memory of 2604 1420 4925b9c17c5c0de34eedf258f8f4f374.exe cmd.exe PID 1420 wrote to memory of 2604 1420 4925b9c17c5c0de34eedf258f8f4f374.exe cmd.exe PID 1420 wrote to memory of 2604 1420 4925b9c17c5c0de34eedf258f8f4f374.exe cmd.exe PID 1420 wrote to memory of 2604 1420 4925b9c17c5c0de34eedf258f8f4f374.exe cmd.exe PID 1420 wrote to memory of 2604 1420 4925b9c17c5c0de34eedf258f8f4f374.exe cmd.exe PID 1704 wrote to memory of 1360 1704 rundll32.exe Explorer.EXE PID 1420 wrote to memory of 2604 1420 4925b9c17c5c0de34eedf258f8f4f374.exe cmd.exe PID 1420 wrote to memory of 2604 1420 4925b9c17c5c0de34eedf258f8f4f374.exe cmd.exe PID 1704 wrote to memory of 1360 1704 rundll32.exe Explorer.EXE PID 2604 wrote to memory of 1352 2604 cmd.exe attrib.exe PID 2604 wrote to memory of 1352 2604 cmd.exe attrib.exe PID 2604 wrote to memory of 1352 2604 cmd.exe attrib.exe PID 2604 wrote to memory of 1352 2604 cmd.exe attrib.exe PID 2604 wrote to memory of 1352 2604 cmd.exe attrib.exe PID 2604 wrote to memory of 1352 2604 cmd.exe attrib.exe PID 2604 wrote to memory of 1352 2604 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\4925b9c17c5c0de34eedf258f8f4f374.exe"C:\Users\Admin\AppData\Local\Temp\4925b9c17c5c0de34eedf258f8f4f374.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\dccwskey64.dll",CreateProcessNotify2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259414982.bat" "C:\Users\Admin\AppData\Local\Temp\4925b9c17c5c0de34eedf258f8f4f374.exe""2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h"C:\Users\Admin\AppData\Local\Temp\4925b9c17c5c0de34eedf258f8f4f374.exe"3⤵
- Loads dropped DLL
- Views/modifies file attributes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\259414982.batFilesize
97B
MD5d226a657b279c5fc0a892748230a56ff
SHA1fa7e4fb6d6de3c4769001cbfce0a00ba02ef28a5
SHA2569dae2767b8e3499d37418a75ddd04d457c7ec8d6c8f312ee109c95a8a97e7761
SHA51207d55ccf3b511c3be64f6dcd05cea3feaafb286196e5d7ba30016ab6d9c0d656fb7cde8eb1ce0ef28a41f1f3f00f0e29020c92479619fd43e4ed47b829f8bf2a
-
\Windows\SysWOW64\dccwskey.dllFilesize
66KB
MD51b779622c0d6eec48ac0c1f3e39eb7b9
SHA1db01babafb0bbd256dca940cbe3667774e76c80a
SHA256ff0d559548eb5bcf7ee0368198cd74d2aca13b54dece875080653b677c81508a
SHA512fc88df2a55dd082a568ade994ea0eaa6a581f94e797fbe3962eaa692e43ac5403b4e817ccc011445643d690022bfbe14f580f39a06b1cab14cbef0d8091c4a34
-
\Windows\System32\dccwskey64.dllFilesize
75KB
MD54dab557dad0fb8ec95f66d5efe648b02
SHA1b52d4d3c8429a132b7582cd8dbe89ec93da3dc05
SHA256b8a5ae38b6d38327ae2abbeb70dec6ee9ac52cdc421f5585c4907e8088eb3849
SHA5125dbc616b17578dfb4c620bcca3b040a89b5e771f34053ffe46ff449f0bea5f68f6c7db9eb7d43cddf7de7e34a94aeb29be4c2174bcec3de74a5a09a6bd70afbf
-
memory/1352-50-0x0000000010000000-0x0000000010015000-memory.dmpFilesize
84KB
-
memory/1360-41-0x0000000180000000-0x0000000180019000-memory.dmpFilesize
100KB
-
memory/1360-25-0x0000000002580000-0x0000000002581000-memory.dmpFilesize
4KB
-
memory/1360-23-0x0000000002580000-0x0000000002581000-memory.dmpFilesize
4KB
-
memory/1420-42-0x0000000001000000-0x0000000001035000-memory.dmpFilesize
212KB
-
memory/1420-7-0x0000000010000000-0x0000000010015000-memory.dmpFilesize
84KB
-
memory/1420-6-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/1420-0-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1420-43-0x0000000010000000-0x0000000010015000-memory.dmpFilesize
84KB
-
memory/1420-1-0x0000000001000000-0x0000000001035000-memory.dmpFilesize
212KB
-
memory/1420-68-0x0000000001000000-0x0000000001035000-memory.dmpFilesize
212KB
-
memory/1420-69-0x0000000010000000-0x0000000010015000-memory.dmpFilesize
84KB
-
memory/1704-22-0x0000000180000000-0x0000000180019000-memory.dmpFilesize
100KB
-
memory/1704-14-0x0000000001CF0000-0x0000000001CF1000-memory.dmpFilesize
4KB
-
memory/2604-54-0x0000000010000000-0x0000000010015000-memory.dmpFilesize
84KB
-
memory/2604-70-0x0000000010000000-0x0000000010015000-memory.dmpFilesize
84KB