Analysis
-
max time kernel
89s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
4939e3970031f5fa049b2fae68069b52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4939e3970031f5fa049b2fae68069b52.exe
Resource
win10v2004-20231215-en
General
-
Target
4939e3970031f5fa049b2fae68069b52.exe
-
Size
4.5MB
-
MD5
4939e3970031f5fa049b2fae68069b52
-
SHA1
758e7a8c35d3a0503191bb1272a9a97e88be6544
-
SHA256
693c98209d73e643781f4c8b0b143d61143c8f256f479311def7cbadbee1888e
-
SHA512
caddf036d6826d6a7ff353ae556a78941b5990982409c35b46887ac3ace2432af43b93fe3194a339e392af4527e49ff928bd8d53ed2928b45bb113ae2d40e24c
-
SSDEEP
98304:vU1FB2INAL29YBwDKeEoGBAcxpba5mgWUZMXfCcNn6w4GZwAGPzx:vUTK29LOroZyamvUZMXfrN6w4G6xzx
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winexec32 = "C:\\Documents and Settings\\All Users\\Menu Iniciar\\Programas\\Inicializar\\winexec32.exe" 4939e3970031f5fa049b2fae68069b52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winexec32 = "C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\winexec32.exe" 4939e3970031f5fa049b2fae68069b52.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\wscnntfyyx.dat 4939e3970031f5fa049b2fae68069b52.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2736 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3008 schtasks.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2720 2380 4939e3970031f5fa049b2fae68069b52.exe 28 PID 2380 wrote to memory of 2720 2380 4939e3970031f5fa049b2fae68069b52.exe 28 PID 2380 wrote to memory of 2720 2380 4939e3970031f5fa049b2fae68069b52.exe 28 PID 2380 wrote to memory of 2720 2380 4939e3970031f5fa049b2fae68069b52.exe 28 PID 2380 wrote to memory of 3008 2380 4939e3970031f5fa049b2fae68069b52.exe 30 PID 2380 wrote to memory of 3008 2380 4939e3970031f5fa049b2fae68069b52.exe 30 PID 2380 wrote to memory of 3008 2380 4939e3970031f5fa049b2fae68069b52.exe 30 PID 2380 wrote to memory of 3008 2380 4939e3970031f5fa049b2fae68069b52.exe 30 PID 2380 wrote to memory of 2736 2380 4939e3970031f5fa049b2fae68069b52.exe 31 PID 2380 wrote to memory of 2736 2380 4939e3970031f5fa049b2fae68069b52.exe 31 PID 2380 wrote to memory of 2736 2380 4939e3970031f5fa049b2fae68069b52.exe 31 PID 2380 wrote to memory of 2736 2380 4939e3970031f5fa049b2fae68069b52.exe 31 PID 2380 wrote to memory of 2744 2380 4939e3970031f5fa049b2fae68069b52.exe 36 PID 2380 wrote to memory of 2744 2380 4939e3970031f5fa049b2fae68069b52.exe 36 PID 2380 wrote to memory of 2744 2380 4939e3970031f5fa049b2fae68069b52.exe 36 PID 2380 wrote to memory of 2744 2380 4939e3970031f5fa049b2fae68069b52.exe 36 PID 2380 wrote to memory of 2876 2380 4939e3970031f5fa049b2fae68069b52.exe 35 PID 2380 wrote to memory of 2876 2380 4939e3970031f5fa049b2fae68069b52.exe 35 PID 2380 wrote to memory of 2876 2380 4939e3970031f5fa049b2fae68069b52.exe 35 PID 2380 wrote to memory of 2876 2380 4939e3970031f5fa049b2fae68069b52.exe 35 PID 2380 wrote to memory of 2100 2380 4939e3970031f5fa049b2fae68069b52.exe 33 PID 2380 wrote to memory of 2100 2380 4939e3970031f5fa049b2fae68069b52.exe 33 PID 2380 wrote to memory of 2100 2380 4939e3970031f5fa049b2fae68069b52.exe 33 PID 2380 wrote to memory of 2100 2380 4939e3970031f5fa049b2fae68069b52.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4939e3970031f5fa049b2fae68069b52.exe"C:\Users\Admin\AppData\Local\Temp\4939e3970031f5fa049b2fae68069b52.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /TN startt /f2⤵PID:2720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\sys.bat /sc onstart /ru system2⤵
- Creates scheduled task(s)
PID:3008
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
PID:2736
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2100
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2876
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1