Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
54e774a831ae65d320a56309b2031571.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54e774a831ae65d320a56309b2031571.exe
Resource
win10v2004-20231222-en
General
-
Target
54e774a831ae65d320a56309b2031571.exe
-
Size
173KB
-
MD5
54e774a831ae65d320a56309b2031571
-
SHA1
c1a900133243bfc8b5197577be45514a310a063c
-
SHA256
2235290b1ef78b3417ef56c6d40edb4a8143bb1a4d241411f1ee3e3f631eb726
-
SHA512
63340f9267b04cf186167892a77f204ca760c21ef65006039ae6c17058ba23bd90f092275ccd2e9f9d7904dc06b89384485d4fcefd98d451fcb8222d9d7b0f93
-
SSDEEP
3072:q9tuNgbNR5Z9V9wyN6SZhk7wj5ZBmrntdqDpFau6WVUu2A4k16Jw/:VNgbz5x9wyN6SZC7S5ZBmrLqdFmch4zw
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 54e774a831ae65d320a56309b2031571.exe -
Executes dropped EXE 1 IoCs
pid Process 2932 dplaysvr.exe -
Loads dropped DLL 3 IoCs
pid Process 2960 54e774a831ae65d320a56309b2031571.exe 2960 54e774a831ae65d320a56309b2031571.exe 2932 dplaysvr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 54e774a831ae65d320a56309b2031571.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 54e774a831ae65d320a56309b2031571.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2932 dplaysvr.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2960 54e774a831ae65d320a56309b2031571.exe 2932 dplaysvr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2932 2960 54e774a831ae65d320a56309b2031571.exe 29 PID 2960 wrote to memory of 2932 2960 54e774a831ae65d320a56309b2031571.exe 29 PID 2960 wrote to memory of 2932 2960 54e774a831ae65d320a56309b2031571.exe 29 PID 2960 wrote to memory of 2932 2960 54e774a831ae65d320a56309b2031571.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\54e774a831ae65d320a56309b2031571.exe"C:\Users\Admin\AppData\Local\Temp\54e774a831ae65d320a56309b2031571.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\dplaysvr.exe"C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\54e774a831ae65d320a56309b2031571.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:2932
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵PID:1348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5ee474aeb47ec5bd89d9adedd0d330715
SHA1407899ebcd465aeec513c9059c5db5c2fd8f3f35
SHA25602e8b9c583fdcfa44fbcdef3c00d468181e60c2258cf414e6534a9ea33adc966
SHA512f7783e2b4b59a6f6fe3fea4bb51764f8d4eda8bf8c6a0631f8553490414507f17c16d86d6124a6e2d2ced65c351f7e6b6c199a604f2f73fcc37e6ec2917fef34
-
Filesize
51KB
MD513ec4fb33c3851da40032490cec94cae
SHA105716c77843043afb05ccc68eb84b7212b0bf45c
SHA256f0c2a8bb7ebcb415d51822c50f7f2fa9065597177583fd9b463ae28056ed2014
SHA512a7237a005311d1da0104223d5de2d0d834d3726cc5e905610615647c9b5e00ec970aa7c97a703708abe82b4c24433893b2f18ddb9ec69ddfd5e4719ab9383807
-
Filesize
882B
MD5dfacd03b4a800507e85677733cc3712a
SHA1db5b14eb23801b68b90e578bdedc6f6b4327639c
SHA256478f83def583d7305fa43f3efc606b14b0842cc446e39aae552bb5ca1b3c73ae
SHA51267e015f7d98a62cf9e1ab628b2e9b618ffe9ada70f13704d7aa5991856497b40b67e22c95e257ef595d1ac7b9986ce0448b5fdd43505aa6ef269af96c0e9f302