Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
52d10e320751187900505bb882f347b4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52d10e320751187900505bb882f347b4.exe
Resource
win10v2004-20231215-en
General
-
Target
52d10e320751187900505bb882f347b4.exe
-
Size
44KB
-
MD5
52d10e320751187900505bb882f347b4
-
SHA1
ef5edc0b631523e8c3743b3179bc95f8210daba8
-
SHA256
c201abf4fef7bad9521ca862500645069d913b6c8b54a86b5881c15c58651daa
-
SHA512
502aa95d4ad00df854c29d699ddcce8ca0eef41e99009303454360bebe613cc87eef2a20f1adff5e1cab281199aa113ea206f5c9b29a6dad8d160b226c4e86af
-
SSDEEP
768:CPXXwC7mhYq8E8hECenTxUxE9KLCM1uvyozpEEEF1VtA2Ob+EXD0Fj4:CIC7mhYq8ReTCK9KOcuvyoz5mu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2820 winsdpmgr.exe 2688 winsdpmgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center = "winsdpmgr.exe" 52d10e320751187900505bb882f347b4.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2184 set thread context of 1588 2184 52d10e320751187900505bb882f347b4.exe 28 PID 2820 set thread context of 2688 2820 winsdpmgr.exe 30 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winsdpmgr.exe 52d10e320751187900505bb882f347b4.exe File opened for modification C:\Windows\winsdpmgr.exe 52d10e320751187900505bb882f347b4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2184 52d10e320751187900505bb882f347b4.exe 2820 winsdpmgr.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1588 2184 52d10e320751187900505bb882f347b4.exe 28 PID 2184 wrote to memory of 1588 2184 52d10e320751187900505bb882f347b4.exe 28 PID 2184 wrote to memory of 1588 2184 52d10e320751187900505bb882f347b4.exe 28 PID 2184 wrote to memory of 1588 2184 52d10e320751187900505bb882f347b4.exe 28 PID 2184 wrote to memory of 1588 2184 52d10e320751187900505bb882f347b4.exe 28 PID 2184 wrote to memory of 1588 2184 52d10e320751187900505bb882f347b4.exe 28 PID 1588 wrote to memory of 2820 1588 52d10e320751187900505bb882f347b4.exe 29 PID 1588 wrote to memory of 2820 1588 52d10e320751187900505bb882f347b4.exe 29 PID 1588 wrote to memory of 2820 1588 52d10e320751187900505bb882f347b4.exe 29 PID 1588 wrote to memory of 2820 1588 52d10e320751187900505bb882f347b4.exe 29 PID 2820 wrote to memory of 2688 2820 winsdpmgr.exe 30 PID 2820 wrote to memory of 2688 2820 winsdpmgr.exe 30 PID 2820 wrote to memory of 2688 2820 winsdpmgr.exe 30 PID 2820 wrote to memory of 2688 2820 winsdpmgr.exe 30 PID 2820 wrote to memory of 2688 2820 winsdpmgr.exe 30 PID 2820 wrote to memory of 2688 2820 winsdpmgr.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\52d10e320751187900505bb882f347b4.exe"C:\Users\Admin\AppData\Local\Temp\52d10e320751187900505bb882f347b4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\52d10e320751187900505bb882f347b4.exeC:\Users\Admin\AppData\Local\Temp\52d10e320751187900505bb882f347b4.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\winsdpmgr.exe"C:\Windows\winsdpmgr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\winsdpmgr.exeC:\Windows\winsdpmgr.exe4⤵
- Executes dropped EXE
PID:2688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD552d10e320751187900505bb882f347b4
SHA1ef5edc0b631523e8c3743b3179bc95f8210daba8
SHA256c201abf4fef7bad9521ca862500645069d913b6c8b54a86b5881c15c58651daa
SHA512502aa95d4ad00df854c29d699ddcce8ca0eef41e99009303454360bebe613cc87eef2a20f1adff5e1cab281199aa113ea206f5c9b29a6dad8d160b226c4e86af