Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
585e7bb53a3b676614de1cfa844e8c4e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
585e7bb53a3b676614de1cfa844e8c4e.exe
Resource
win10v2004-20231222-en
General
-
Target
585e7bb53a3b676614de1cfa844e8c4e.exe
-
Size
116KB
-
MD5
585e7bb53a3b676614de1cfa844e8c4e
-
SHA1
b4734f071a645b7fff8bb58826205600ca6445ed
-
SHA256
e4703b9a702649087efa7a074bf75e003ef2291efea601f4dd2aa78693bf8e3a
-
SHA512
354067838983a3fb94155d7487ba7c23d43115bcf4ed299291b54a579bd8b7aa13dae03ab3b3cc2c395056b365d53542fe4b42805c52e01b151d0ae47f6e6542
-
SSDEEP
3072:66Aipz39gBu6f6q789ckd0hcLEOknMQVBsAB2EOuFhFdOP618O:E09go6f18WS0hvOMMQVBsAB2Lu/OPe
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2740 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 8968b91d.exe -
Loads dropped DLL 2 IoCs
pid Process 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 2376 585e7bb53a3b676614de1cfa844e8c4e.exe -
resource yara_rule behavioral1/files/0x000a0000000141b0-11.dat upx behavioral1/memory/2648-19-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-23-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-24-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-25-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-26-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-27-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-28-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-29-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-30-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-31-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-32-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-33-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-34-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-35-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-36-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2648-37-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qosname32 = "rundll32.exe qosname32.dll,orul" 585e7bb53a3b676614de1cfa844e8c4e.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\5dbe985b.dll 585e7bb53a3b676614de1cfa844e8c4e.exe File opened for modification C:\Windows\SysWOW64\5dbe985b.dll 585e7bb53a3b676614de1cfa844e8c4e.exe File created C:\Windows\SysWOW64\qosname32.dll 585e7bb53a3b676614de1cfa844e8c4e.exe File opened for modification C:\Windows\SysWOW64\qosname32.dll 585e7bb53a3b676614de1cfa844e8c4e.exe File created C:\Windows\SysWOW64\5736674b.dll 585e7bb53a3b676614de1cfa844e8c4e.exe File opened for modification C:\Windows\SysWOW64\5736674b.dll 585e7bb53a3b676614de1cfa844e8c4e.exe File created C:\Windows\SysWOW64\de7aa25e.dll 585e7bb53a3b676614de1cfa844e8c4e.exe File opened for modification C:\Windows\SysWOW64\de7aa25e.dll 585e7bb53a3b676614de1cfa844e8c4e.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2992 sc.exe 2548 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2992 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 28 PID 2376 wrote to memory of 2992 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 28 PID 2376 wrote to memory of 2992 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 28 PID 2376 wrote to memory of 2992 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 28 PID 2376 wrote to memory of 2548 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 30 PID 2376 wrote to memory of 2548 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 30 PID 2376 wrote to memory of 2548 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 30 PID 2376 wrote to memory of 2548 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 30 PID 2376 wrote to memory of 2740 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 32 PID 2376 wrote to memory of 2740 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 32 PID 2376 wrote to memory of 2740 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 32 PID 2376 wrote to memory of 2740 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 32 PID 2376 wrote to memory of 2648 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 34 PID 2376 wrote to memory of 2648 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 34 PID 2376 wrote to memory of 2648 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 34 PID 2376 wrote to memory of 2648 2376 585e7bb53a3b676614de1cfa844e8c4e.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\585e7bb53a3b676614de1cfa844e8c4e.exe"C:\Users\Admin\AppData\Local\Temp\585e7bb53a3b676614de1cfa844e8c4e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qosname32 type= share start= auto DisplayName= "Microsoft Windows GetQosByName Service Provider" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\qosname32.dll,orul"2⤵
- Launches sc.exe
PID:2992
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qosname32 "Microsoft Windows GetQosByName Service Provider"2⤵
- Launches sc.exe
PID:2548
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe firewall add portopening TCP 1513 messenger2⤵
- Modifies Windows Firewall
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\8968b91d.exe"C:\Users\Admin\AppData\Local\Temp\8968b91d.exe"2⤵
- Executes dropped EXE
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5ee4f00c27ba7f34d7f66d6ee3bf06b1e
SHA11743581ef8f89bff75508857ce9f9db70212b03d
SHA256cbecf191acb3bac4bbdcbcb1f90f769654c33bf8d95541be4ffc6ee1caaa9379
SHA51224abaaa1ca085ed8d7a043c9bee935e3f7b2f5b8aa2c41de8a6b6b299d00e16f09cceb95741cf3c8c82948020977ccde445f5da8f6d7de431b9be5d39d8c96c8