Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
56bb1e20c2466e6da63466596a1d5a0b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56bb1e20c2466e6da63466596a1d5a0b.exe
Resource
win10v2004-20231215-en
General
-
Target
56bb1e20c2466e6da63466596a1d5a0b.exe
-
Size
375KB
-
MD5
56bb1e20c2466e6da63466596a1d5a0b
-
SHA1
64df1fad2fbe7dc8fdf447ca2f54f36fd185714e
-
SHA256
710b550ef5ce611eb838a9804f83ccb1e8f1771b388dc64fdc98a0697b922d10
-
SHA512
bac70caf36f48725d0bfbb0c6ab63e8d4126a6ca228e8b2f8be4589c3be6a8690d1d5c2e4c06e97b129a05b75801c7791ebf00e5440860a47ff3f0e8e6bb5c02
-
SSDEEP
6144:8UvbxtEDfFXPXZMtdxDKPQswHiG3ptAmvdo/w5TVkE47zV:p/yFXZMfxe4tzptPK456E43V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2688 6XkcebT4dwoilE.exe -
Executes dropped EXE 2 IoCs
pid Process 2776 6XkcebT4dwoilE.exe 2688 6XkcebT4dwoilE.exe -
Loads dropped DLL 4 IoCs
pid Process 2028 56bb1e20c2466e6da63466596a1d5a0b.exe 2028 56bb1e20c2466e6da63466596a1d5a0b.exe 2028 56bb1e20c2466e6da63466596a1d5a0b.exe 2688 6XkcebT4dwoilE.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\8jJ2Lh8ct = "C:\\ProgramData\\7sgIrFPcNp\\6XkcebT4dwoilE.exe" 56bb1e20c2466e6da63466596a1d5a0b.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2832 set thread context of 2028 2832 56bb1e20c2466e6da63466596a1d5a0b.exe 28 PID 2776 set thread context of 2688 2776 6XkcebT4dwoilE.exe 30 PID 2688 set thread context of 2720 2688 6XkcebT4dwoilE.exe 31 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2028 2832 56bb1e20c2466e6da63466596a1d5a0b.exe 28 PID 2832 wrote to memory of 2028 2832 56bb1e20c2466e6da63466596a1d5a0b.exe 28 PID 2832 wrote to memory of 2028 2832 56bb1e20c2466e6da63466596a1d5a0b.exe 28 PID 2832 wrote to memory of 2028 2832 56bb1e20c2466e6da63466596a1d5a0b.exe 28 PID 2832 wrote to memory of 2028 2832 56bb1e20c2466e6da63466596a1d5a0b.exe 28 PID 2832 wrote to memory of 2028 2832 56bb1e20c2466e6da63466596a1d5a0b.exe 28 PID 2028 wrote to memory of 2776 2028 56bb1e20c2466e6da63466596a1d5a0b.exe 29 PID 2028 wrote to memory of 2776 2028 56bb1e20c2466e6da63466596a1d5a0b.exe 29 PID 2028 wrote to memory of 2776 2028 56bb1e20c2466e6da63466596a1d5a0b.exe 29 PID 2028 wrote to memory of 2776 2028 56bb1e20c2466e6da63466596a1d5a0b.exe 29 PID 2776 wrote to memory of 2688 2776 6XkcebT4dwoilE.exe 30 PID 2776 wrote to memory of 2688 2776 6XkcebT4dwoilE.exe 30 PID 2776 wrote to memory of 2688 2776 6XkcebT4dwoilE.exe 30 PID 2776 wrote to memory of 2688 2776 6XkcebT4dwoilE.exe 30 PID 2776 wrote to memory of 2688 2776 6XkcebT4dwoilE.exe 30 PID 2776 wrote to memory of 2688 2776 6XkcebT4dwoilE.exe 30 PID 2688 wrote to memory of 2720 2688 6XkcebT4dwoilE.exe 31 PID 2688 wrote to memory of 2720 2688 6XkcebT4dwoilE.exe 31 PID 2688 wrote to memory of 2720 2688 6XkcebT4dwoilE.exe 31 PID 2688 wrote to memory of 2720 2688 6XkcebT4dwoilE.exe 31 PID 2688 wrote to memory of 2720 2688 6XkcebT4dwoilE.exe 31 PID 2688 wrote to memory of 2720 2688 6XkcebT4dwoilE.exe 31 PID 2688 wrote to memory of 2720 2688 6XkcebT4dwoilE.exe 31 PID 2688 wrote to memory of 2720 2688 6XkcebT4dwoilE.exe 31 PID 2688 wrote to memory of 2720 2688 6XkcebT4dwoilE.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\56bb1e20c2466e6da63466596a1d5a0b.exe"C:\Users\Admin\AppData\Local\Temp\56bb1e20c2466e6da63466596a1d5a0b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\56bb1e20c2466e6da63466596a1d5a0b.exe"C:\Users\Admin\AppData\Local\Temp\56bb1e20c2466e6da63466596a1d5a0b.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\ProgramData\7sgIrFPcNp\6XkcebT4dwoilE.exe"C:\ProgramData\7sgIrFPcNp\6XkcebT4dwoilE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\ProgramData\7sgIrFPcNp\6XkcebT4dwoilE.exe"C:\ProgramData\7sgIrFPcNp\6XkcebT4dwoilE.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe"C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe" /i:26885⤵PID:2720
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD556bb1e20c2466e6da63466596a1d5a0b
SHA164df1fad2fbe7dc8fdf447ca2f54f36fd185714e
SHA256710b550ef5ce611eb838a9804f83ccb1e8f1771b388dc64fdc98a0697b922d10
SHA512bac70caf36f48725d0bfbb0c6ab63e8d4126a6ca228e8b2f8be4589c3be6a8690d1d5c2e4c06e97b129a05b75801c7791ebf00e5440860a47ff3f0e8e6bb5c02