Analysis
-
max time kernel
152s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
53d1c374b8ee68b21d22f089229f6d9b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53d1c374b8ee68b21d22f089229f6d9b.exe
Resource
win10v2004-20231222-en
General
-
Target
53d1c374b8ee68b21d22f089229f6d9b.exe
-
Size
1.2MB
-
MD5
53d1c374b8ee68b21d22f089229f6d9b
-
SHA1
0fb8a04232dc31cab1e86c05035f25e93293baaa
-
SHA256
0c05ce6ae32ba064520e1245f1cc2157ec4ae05a1b098883d82a53f2017a52e9
-
SHA512
a46d29bbb87dac862d476b74963bff628d606a51293c739931f5728b443362ca44365f166aef6d394b6c00d85a5b407f28d48530c0d96f7b29ba8db8650b2ca8
-
SSDEEP
6144:fS/ZFKc3p9BhKS/ZFKc3p9BhVcnQ3nWdJWXkeX3QPBFez5b:venTt3QPBFy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2092 mawa.exe -
Loads dropped DLL 2 IoCs
pid Process 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 1720 53d1c374b8ee68b21d22f089229f6d9b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\{8D03B3C8-CEC5-AD4E-9D6C-4FF59E096CE8} = "C:\\Users\\Admin\\AppData\\Roaming\\Laer\\mawa.exe" mawa.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 2764 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Privacy 53d1c374b8ee68b21d22f089229f6d9b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 53d1c374b8ee68b21d22f089229f6d9b.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe 2092 mawa.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 1720 53d1c374b8ee68b21d22f089229f6d9b.exe Token: SeSecurityPrivilege 1720 53d1c374b8ee68b21d22f089229f6d9b.exe Token: SeSecurityPrivilege 1720 53d1c374b8ee68b21d22f089229f6d9b.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2092 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 28 PID 1720 wrote to memory of 2092 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 28 PID 1720 wrote to memory of 2092 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 28 PID 1720 wrote to memory of 2092 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 28 PID 2092 wrote to memory of 1128 2092 mawa.exe 9 PID 2092 wrote to memory of 1128 2092 mawa.exe 9 PID 2092 wrote to memory of 1128 2092 mawa.exe 9 PID 2092 wrote to memory of 1128 2092 mawa.exe 9 PID 2092 wrote to memory of 1128 2092 mawa.exe 9 PID 2092 wrote to memory of 1188 2092 mawa.exe 8 PID 2092 wrote to memory of 1188 2092 mawa.exe 8 PID 2092 wrote to memory of 1188 2092 mawa.exe 8 PID 2092 wrote to memory of 1188 2092 mawa.exe 8 PID 2092 wrote to memory of 1188 2092 mawa.exe 8 PID 2092 wrote to memory of 1224 2092 mawa.exe 7 PID 2092 wrote to memory of 1224 2092 mawa.exe 7 PID 2092 wrote to memory of 1224 2092 mawa.exe 7 PID 2092 wrote to memory of 1224 2092 mawa.exe 7 PID 2092 wrote to memory of 1224 2092 mawa.exe 7 PID 2092 wrote to memory of 1984 2092 mawa.exe 5 PID 2092 wrote to memory of 1984 2092 mawa.exe 5 PID 2092 wrote to memory of 1984 2092 mawa.exe 5 PID 2092 wrote to memory of 1984 2092 mawa.exe 5 PID 2092 wrote to memory of 1984 2092 mawa.exe 5 PID 2092 wrote to memory of 1720 2092 mawa.exe 4 PID 2092 wrote to memory of 1720 2092 mawa.exe 4 PID 2092 wrote to memory of 1720 2092 mawa.exe 4 PID 2092 wrote to memory of 1720 2092 mawa.exe 4 PID 2092 wrote to memory of 1720 2092 mawa.exe 4 PID 1720 wrote to memory of 2764 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 29 PID 1720 wrote to memory of 2764 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 29 PID 1720 wrote to memory of 2764 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 29 PID 1720 wrote to memory of 2764 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 29 PID 1720 wrote to memory of 2764 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 29 PID 1720 wrote to memory of 2764 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 29 PID 1720 wrote to memory of 2764 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 29 PID 1720 wrote to memory of 2764 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 29 PID 1720 wrote to memory of 2764 1720 53d1c374b8ee68b21d22f089229f6d9b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\53d1c374b8ee68b21d22f089229f6d9b.exe"C:\Users\Admin\AppData\Local\Temp\53d1c374b8ee68b21d22f089229f6d9b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\Laer\mawa.exe"C:\Users\Admin\AppData\Roaming\Laer\mawa.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpab60d451.bat"2⤵
- Deletes itself
PID:2764
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1984
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD5e1a9c1aa95661431874667e839fcdb49
SHA15f173eca34d8d55fc2ea9520f3a8f980dbc8a6f6
SHA25681f4757fe0333b50e7a8b50f193fa0f7194554a3702c8d6bcb05e497f45c6d37
SHA51243b2ba090c43ea6fbb603c7f844027b50f800c49a78a1eb55d148b52fb03c0bbb054c53ce7f00b52be7ac71120cf6d0bebae12455a28752eeabe1beb33a3ae03
-
Filesize
1.1MB
MD5e646549b797413dc1ee800c8ffe71907
SHA1a47b38f23418f566d17559d6e3a98521122cff4c
SHA2565944b7e9c66ffe9e5bf8ba9d9317c4a9e01cc147c0350688eecbc770c722dc5b
SHA512e12969ed48017fcc5afc2367726f7b1ca9f0671ab2e7ee20bab93965968d3a945d49b7b8a868a7e2ebf823ee99d03c10d1f0eb5a0e87ceba454744d3a3f598f8
-
Filesize
838KB
MD5ad8a005414c8d5cc5a146560085d020f
SHA1ca9db2caa189c16e39e49d0090c178598f97a75f
SHA2567ea0aa60b1324ac0fe1d34289a846ee5fe3f6b1bb4fbc020ae10d9656b712a1e
SHA512db4e3d087b87a488d829ddd1220dcca6197a39c553e8b7143eba6d360c3b404a1e7033b7eba981246cda3f1e03b2fb7c2acba8bf64fc4aa2ebdb3da97e564b9c
-
Filesize
366B
MD5621c8d227ead51e74bd9dab95cb9ecd5
SHA157be69dd6cecca77316532bf68ea1a91485c1a5c
SHA25613106053ae09ea4d25df4c5b8d44414eae0b5d3be4385b93a3b8a54e202e4686
SHA5120e4f0b2c73bfaad31fe270c8550daeea68362ba17795cac9b2cc0be467a5dd4b8a40efc98d3171dcfc9a11c7e3f0f82bbb45844352f07276b0c7f47280736072
-
Filesize
1.2MB
MD576405e8d63c9c55be0a654c26d870166
SHA1efab2139b64f7291bb2f6487b0ddca3d682315db
SHA256dc512d94fa874e64712ff2c4aad1918ef35651761bd868a0d53862340e44143c
SHA512c71dc073b630f10712c92f4ee73da81ace37dc3098e6aedcb36b9c990ac2c08e75be0cc25c0e7112bd7830a3c7177fec9c3046e54b709c86407372f7c2fbc464