Analysis
-
max time kernel
151s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
53e6eab5bf54ff8acc45092550e00a1d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53e6eab5bf54ff8acc45092550e00a1d.exe
Resource
win10v2004-20231215-en
General
-
Target
53e6eab5bf54ff8acc45092550e00a1d.exe
-
Size
5.5MB
-
MD5
53e6eab5bf54ff8acc45092550e00a1d
-
SHA1
fda3c71b093af24f356ebefd2fdcb411aa542b0b
-
SHA256
7770503c5021c14fde349eaf6d8ae9d36c8eca35ec1589ee5aead06b3de33f9f
-
SHA512
cc4e8c21e83779eb6faac1adc64c5f837c65aae796f8cba5e916b7fdd5b9abcc4abcd5ff45965a00989128451a5e78af3315e889a8a7505e6f00fd3ceac31008
-
SSDEEP
98304:7uHPBwbu62ntT5h/eqIZLFdpTmbszcHCCZat9d6Z/iRvKNMzojGFHliavUQ7UWQk:0pwitntTvPI9pTKsgHCdV3CQoygaMx6
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winexec32 = "C:\\Documents and Settings\\All Users\\Menu Iniciar\\Programas\\Inicializar\\winexec32.exe" 53e6eab5bf54ff8acc45092550e00a1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winexec32 = "C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\winexec32.exe" 53e6eab5bf54ff8acc45092550e00a1d.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\wscnntfyy.dat 53e6eab5bf54ff8acc45092550e00a1d.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2860 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2384 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 53e6eab5bf54ff8acc45092550e00a1d.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2840 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 28 PID 2412 wrote to memory of 2840 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 28 PID 2412 wrote to memory of 2840 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 28 PID 2412 wrote to memory of 2840 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 28 PID 2412 wrote to memory of 2384 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 30 PID 2412 wrote to memory of 2384 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 30 PID 2412 wrote to memory of 2384 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 30 PID 2412 wrote to memory of 2384 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 30 PID 2412 wrote to memory of 2860 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 31 PID 2412 wrote to memory of 2860 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 31 PID 2412 wrote to memory of 2860 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 31 PID 2412 wrote to memory of 2860 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 31 PID 2412 wrote to memory of 2760 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 34 PID 2412 wrote to memory of 2760 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 34 PID 2412 wrote to memory of 2760 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 34 PID 2412 wrote to memory of 2760 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 34 PID 2412 wrote to memory of 2680 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 35 PID 2412 wrote to memory of 2680 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 35 PID 2412 wrote to memory of 2680 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 35 PID 2412 wrote to memory of 2680 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 35 PID 2412 wrote to memory of 2872 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 36 PID 2412 wrote to memory of 2872 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 36 PID 2412 wrote to memory of 2872 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 36 PID 2412 wrote to memory of 2872 2412 53e6eab5bf54ff8acc45092550e00a1d.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\53e6eab5bf54ff8acc45092550e00a1d.exe"C:\Users\Admin\AppData\Local\Temp\53e6eab5bf54ff8acc45092550e00a1d.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /TN startt /f2⤵PID:2840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\sys.bat /sc onstart /ru system2⤵
- Creates scheduled task(s)
PID:2384
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
PID:2860
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2760
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2680
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1