Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
58e8762d00486fa09a0b924601f87851.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58e8762d00486fa09a0b924601f87851.exe
Resource
win10v2004-20231215-en
General
-
Target
58e8762d00486fa09a0b924601f87851.exe
-
Size
14KB
-
MD5
58e8762d00486fa09a0b924601f87851
-
SHA1
ebcf1d5e36cad6272aa2c49cbace19834e3f949a
-
SHA256
2fb9eb1508f0bf4ff36993e56cb45329def23ef6eed215a09e2f3715f6e467a1
-
SHA512
71eadc0808e55f93ace5d49947da21f8b2be10ce7c235f14dcad6b12375e718caece23d964fdfbbe1920a6be55a85c8b57b5d4bf078dd52d0f18a9c61059269d
-
SSDEEP
384:emWDlkSA2Ji8MJpHX7P8dE00zK2Ge3jnlc4eYsel:emQfKpHuEZzKZcrlcjYvl
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\adsntzt.dll = "{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}" 58e8762d00486fa09a0b924601f87851.exe -
Loads dropped DLL 1 IoCs
pid Process 4616 58e8762d00486fa09a0b924601f87851.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\adsntzt.tmp 58e8762d00486fa09a0b924601f87851.exe File opened for modification C:\Windows\SysWOW64\adsntzt.tmp 58e8762d00486fa09a0b924601f87851.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}\InProcServer32 58e8762d00486fa09a0b924601f87851.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}\InProcServer32\ = "C:\\Windows\\SysWow64\\adsntzt.dll" 58e8762d00486fa09a0b924601f87851.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}\InProcServer32\ThreadingModel = "Apartment" 58e8762d00486fa09a0b924601f87851.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA} 58e8762d00486fa09a0b924601f87851.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4616 58e8762d00486fa09a0b924601f87851.exe 4616 58e8762d00486fa09a0b924601f87851.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4616 58e8762d00486fa09a0b924601f87851.exe 4616 58e8762d00486fa09a0b924601f87851.exe 4616 58e8762d00486fa09a0b924601f87851.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2348 4616 58e8762d00486fa09a0b924601f87851.exe 101 PID 4616 wrote to memory of 2348 4616 58e8762d00486fa09a0b924601f87851.exe 101 PID 4616 wrote to memory of 2348 4616 58e8762d00486fa09a0b924601f87851.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\58e8762d00486fa09a0b924601f87851.exe"C:\Users\Admin\AppData\Local\Temp\58e8762d00486fa09a0b924601f87851.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\C553.tmp.bat2⤵PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5ceab7ba67dcfd806a2ead607d24ed171
SHA137cb8f02a90df806e7586b97824ffd48eabce917
SHA256972b0f0dd3717a7f7dd4807589803f84764a958fa841e3e8c91d8bd13aef50aa
SHA512e269e902fc30afbeae36508f85b98bddd5acec64b5bcdc927d74ac8e209adaf6bd142f4e2095df7d66282a5ff5642048998edca203af08c30a11409e66d79420
-
Filesize
1.0MB
MD550fc46b0de7ddcf686e7010e2c056b10
SHA104fe9defcbca95d60639b89deaba8dfaae49f0bc
SHA256e2a4fd9a57ffb31de5168843e19d2fe81c7cf4cbed2db1138486fa3e161c1075
SHA5123d89b8943a2ed5217d7abe45ab87b2e954b8bef9dfc084d86c15884cdff9c279d137f17677e8cf559a9ca13ddb043f5f10a05d8bb9401e92506ddb778450ff51