Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
51404372ad2166b42f9cb6bfd09606bf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51404372ad2166b42f9cb6bfd09606bf.exe
Resource
win10v2004-20231215-en
General
-
Target
51404372ad2166b42f9cb6bfd09606bf.exe
-
Size
14KB
-
MD5
51404372ad2166b42f9cb6bfd09606bf
-
SHA1
67a8f510fdc060c34afc3c86e47cf8f458f7419b
-
SHA256
9c1c8291ae0737d8dc860500a10cb8fcef1ec97a6f3404158ca9d939f23ac9f3
-
SHA512
f38ecab78c6016e263612fca0e4b0e797b90510bd838bed1135328df542322f6f7cde17774f224b378d6a26f7c80b7b802a72bf0fc2011e067bc77003679edc4
-
SSDEEP
384:5dmHImwx5lmuKIp4kFJvAI8IWRCmua3S8O+tqoX5A/mM:5dbmwSI2kF6ILmtit+8oXi/F
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\adsntzt.dll = "{00010001-0001-0001-0001-00010001BB15}" 51404372ad2166b42f9cb6bfd09606bf.exe -
Deletes itself 1 IoCs
pid Process 3004 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1472 51404372ad2166b42f9cb6bfd09606bf.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\adsntzt.tmp 51404372ad2166b42f9cb6bfd09606bf.exe File opened for modification C:\Windows\SysWOW64\adsntzt.tmp 51404372ad2166b42f9cb6bfd09606bf.exe File opened for modification C:\Windows\SysWOW64\adsntzt.nls 51404372ad2166b42f9cb6bfd09606bf.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00010001-0001-0001-0001-00010001BB15} 51404372ad2166b42f9cb6bfd09606bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00010001-0001-0001-0001-00010001BB15}\InProcServer32 51404372ad2166b42f9cb6bfd09606bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00010001-0001-0001-0001-00010001BB15}\InProcServer32\ = "C:\\Windows\\SysWow64\\adsntzt.dll" 51404372ad2166b42f9cb6bfd09606bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00010001-0001-0001-0001-00010001BB15}\InProcServer32\ThreadingModel = "Apartment" 51404372ad2166b42f9cb6bfd09606bf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1472 51404372ad2166b42f9cb6bfd09606bf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1472 51404372ad2166b42f9cb6bfd09606bf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1472 wrote to memory of 3004 1472 51404372ad2166b42f9cb6bfd09606bf.exe 30 PID 1472 wrote to memory of 3004 1472 51404372ad2166b42f9cb6bfd09606bf.exe 30 PID 1472 wrote to memory of 3004 1472 51404372ad2166b42f9cb6bfd09606bf.exe 30 PID 1472 wrote to memory of 3004 1472 51404372ad2166b42f9cb6bfd09606bf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\51404372ad2166b42f9cb6bfd09606bf.exe"C:\Users\Admin\AppData\Local\Temp\51404372ad2166b42f9cb6bfd09606bf.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1EE6.tmp.bat2⤵
- Deletes itself
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5604c687336d3a69e8d6e53cc4c94ac67
SHA15258921564cb0a5e4ded5af78b7608832435195b
SHA256ec77234f2f0f28b7f6dd732d00fe671d02359c3f606a7d9ef25cfdfb4f169249
SHA512d564d4133b51ca026c8fa0142dc89be14aa465739bb8b49bd0fa656ac315667cfae59dba1d6522bcf959d5bdae0ab4faa677268bda04bd57f39409e2c3239182
-
Filesize
803KB
MD5d743013684c23a779ad8935143952613
SHA1712018067cd6199104cdf9cc7fb7fbdb171f2366
SHA256307bdd5f0ca6e96e06e1577c6c357a18a010a5dcb5577b23fcacff0c589e7271
SHA512289fca2138527bd17d007b36ec243fb048d6a21648a300ebd47350cd0c14d35f3ec553382f9060b451016df4cbbce795d1d40aaf34ff9e1076a61088ede0b7af