Analysis
-
max time kernel
124s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
5718181bfb54486fb2d81adccadfaf0b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5718181bfb54486fb2d81adccadfaf0b.exe
Resource
win10v2004-20231215-en
General
-
Target
5718181bfb54486fb2d81adccadfaf0b.exe
-
Size
52KB
-
MD5
5718181bfb54486fb2d81adccadfaf0b
-
SHA1
ac5d3b01fa0bb3a51cf79ee3b34b084d50681155
-
SHA256
85579d6b414f97cf00c56de714fd246d86713d5fbcdaaf876c75d149c2a85702
-
SHA512
f92d37141154ca89c98c0a39a4c3c1297f742312e59235e88918ea66b4abbb3b51341eb973b51cd81382c800136a2390befcb14e77025c8924d3214d6764300b
-
SSDEEP
1536:hmdPf5yVtFsERanqZ8rO6W8IJR7aZRwIQIaLpDXDe:hm952cU8ZW8c7CRwHHlDTe
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\beep.sys 5718181bfb54486fb2d81adccadfaf0b.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MediaCeasdnter\Parameters\ServiceDll = "C:\\Windows\\system32\\NetNtEx.dll" 5718181bfb54486fb2d81adccadfaf0b.exe -
Deletes itself 1 IoCs
pid Process 2392 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2552 5718181bfb54486fb2d81adccadfaf0b.exe 1744 svchost.exe -
resource yara_rule behavioral1/files/0x000d000000012325-6.dat vmprotect -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\NetNtEx.dll 5718181bfb54486fb2d81adccadfaf0b.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 484 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2552 5718181bfb54486fb2d81adccadfaf0b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2392 2552 5718181bfb54486fb2d81adccadfaf0b.exe 30 PID 2552 wrote to memory of 2392 2552 5718181bfb54486fb2d81adccadfaf0b.exe 30 PID 2552 wrote to memory of 2392 2552 5718181bfb54486fb2d81adccadfaf0b.exe 30 PID 2552 wrote to memory of 2392 2552 5718181bfb54486fb2d81adccadfaf0b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5718181bfb54486fb2d81adccadfaf0b.exe"C:\Users\Admin\AppData\Local\Temp\5718181bfb54486fb2d81adccadfaf0b.exe"1⤵
- Drops file in Drivers directory
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\571818~1.EXE > nul2⤵
- Deletes itself
PID:2392
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵PID:1808
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵
- Loads dropped DLL
PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD534cd55087a743507c440f937237c9b6a
SHA1fdf7db5bb55ee2f2cd3ff80a36a626fc2f799451
SHA2563ef31cb608e7ec51e631a4f689c005c89f60d0a4b3592c02b2de33c4ac589581
SHA512ca8b62c3ff904e789739de646db49c722765ba10c7d36aa6de9a496bec837cb8a8ac7b0c1c615994d77267d99d11501eb370c16368a8644e6ea6c7bfebe75127