Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
568a5b71f9807eb6a4ddf26285dd949a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
568a5b71f9807eb6a4ddf26285dd949a.exe
Resource
win10v2004-20231215-en
General
-
Target
568a5b71f9807eb6a4ddf26285dd949a.exe
-
Size
51KB
-
MD5
568a5b71f9807eb6a4ddf26285dd949a
-
SHA1
832b5583214f50c4ea31e732879faef0dd245529
-
SHA256
6302ed025efc3902f2b8a18430f9f78956b0acf43710a75c5cdf82d98ef6eb35
-
SHA512
5a36f2c07560a8fad21581b08be920d2adb7af3e6140963279dfb165f144965a7d6997d056317549819d62b5eed20b090929079bbb4c00fc671f2075ddd95e64
-
SSDEEP
1536:UF+qxQcJxJljitFbOlFu2a+PpcVioN43:ObxJT9m4lFuH+ci
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2988 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2680 servet.exe 2884 servet.exe -
Loads dropped DLL 3 IoCs
pid Process 2116 568a5b71f9807eb6a4ddf26285dd949a.exe 2116 568a5b71f9807eb6a4ddf26285dd949a.exe 2680 servet.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\servet.exe servet.exe File created C:\Windows\SysWOW64\servet.exe 568a5b71f9807eb6a4ddf26285dd949a.exe File opened for modification C:\Windows\SysWOW64\servet.exe 568a5b71f9807eb6a4ddf26285dd949a.exe File created C:\Windows\SysWOW64\Deledomn.bat 568a5b71f9807eb6a4ddf26285dd949a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1996 set thread context of 2116 1996 568a5b71f9807eb6a4ddf26285dd949a.exe 27 PID 2680 set thread context of 2884 2680 servet.exe 29 -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2116 1996 568a5b71f9807eb6a4ddf26285dd949a.exe 27 PID 1996 wrote to memory of 2116 1996 568a5b71f9807eb6a4ddf26285dd949a.exe 27 PID 1996 wrote to memory of 2116 1996 568a5b71f9807eb6a4ddf26285dd949a.exe 27 PID 1996 wrote to memory of 2116 1996 568a5b71f9807eb6a4ddf26285dd949a.exe 27 PID 1996 wrote to memory of 2116 1996 568a5b71f9807eb6a4ddf26285dd949a.exe 27 PID 1996 wrote to memory of 2116 1996 568a5b71f9807eb6a4ddf26285dd949a.exe 27 PID 2116 wrote to memory of 2680 2116 568a5b71f9807eb6a4ddf26285dd949a.exe 28 PID 2116 wrote to memory of 2680 2116 568a5b71f9807eb6a4ddf26285dd949a.exe 28 PID 2116 wrote to memory of 2680 2116 568a5b71f9807eb6a4ddf26285dd949a.exe 28 PID 2116 wrote to memory of 2680 2116 568a5b71f9807eb6a4ddf26285dd949a.exe 28 PID 2680 wrote to memory of 2884 2680 servet.exe 29 PID 2680 wrote to memory of 2884 2680 servet.exe 29 PID 2680 wrote to memory of 2884 2680 servet.exe 29 PID 2680 wrote to memory of 2884 2680 servet.exe 29 PID 2680 wrote to memory of 2884 2680 servet.exe 29 PID 2680 wrote to memory of 2884 2680 servet.exe 29 PID 2116 wrote to memory of 2988 2116 568a5b71f9807eb6a4ddf26285dd949a.exe 30 PID 2116 wrote to memory of 2988 2116 568a5b71f9807eb6a4ddf26285dd949a.exe 30 PID 2116 wrote to memory of 2988 2116 568a5b71f9807eb6a4ddf26285dd949a.exe 30 PID 2116 wrote to memory of 2988 2116 568a5b71f9807eb6a4ddf26285dd949a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\568a5b71f9807eb6a4ddf26285dd949a.exe"C:\Users\Admin\AppData\Local\Temp\568a5b71f9807eb6a4ddf26285dd949a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\568a5b71f9807eb6a4ddf26285dd949a.exeC:\Users\Admin\AppData\Local\Temp\568a5b71f9807eb6a4ddf26285dd949a.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\servet.exeC:\Windows\system32\servet.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\servet.exeC:\Windows\SysWOW64\servet.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deledomn.bat3⤵
- Deletes itself
PID:2988
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD54106016dc915abc93553d47fdc84497c
SHA17a503ff7ea13fd8d17e2e0600d2bea4e8fe7c763
SHA25622683421055ce9f9a9129b800912c7c4de471b69713677ef4042b2f34b3d288d
SHA512ad8577f9916697a7cfeb73e8ab63830aa171aa1834571cb496868b662a59df0a331e1b1a88816ade4d8a7c13d4ddec628e77a24bdb7808cc2f1dd1807d7dc393
-
Filesize
51KB
MD5568a5b71f9807eb6a4ddf26285dd949a
SHA1832b5583214f50c4ea31e732879faef0dd245529
SHA2566302ed025efc3902f2b8a18430f9f78956b0acf43710a75c5cdf82d98ef6eb35
SHA5125a36f2c07560a8fad21581b08be920d2adb7af3e6140963279dfb165f144965a7d6997d056317549819d62b5eed20b090929079bbb4c00fc671f2075ddd95e64