Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-01-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
5b9c80203aaa855d9ff901ff339e45a0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5b9c80203aaa855d9ff901ff339e45a0.exe
Resource
win10v2004-20231215-en
General
-
Target
5b9c80203aaa855d9ff901ff339e45a0.exe
-
Size
144KB
-
MD5
5b9c80203aaa855d9ff901ff339e45a0
-
SHA1
1fe0634955e39dd9fb5427989c620b5dc1616016
-
SHA256
5cad046575f0e32b5e6fded63e48ea43683337c6ee18e2219bba8e8e8fa1e934
-
SHA512
30743c41c5278a656c7b12f12785c54986e19e11fca4ee9b26025819bf37532b47cbaa0c941ea53bac01887b3b3ecec26a2d531c60bd83be837af55cc04a30cb
-
SSDEEP
3072:mX4ItJyAeytfNOo60kBjQx+r80hb4IoG9nIua:InySNOor9K80tNVn
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 5b9c80203aaa855d9ff901ff339e45a0.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Public\E-73473-3674-74335\msnrsmsn.exe = "C:\\Users\\Public\\E-73473-3674-74335\\msnrsmsn.exe:*:Enabled:Microsoft3264OSUpdate" 5b9c80203aaa855d9ff901ff339e45a0.exe -
Executes dropped EXE 2 IoCs
pid Process 2608 msnrsmsn.exe 2756 msnrsmsn.exe -
Loads dropped DLL 3 IoCs
pid Process 2412 5b9c80203aaa855d9ff901ff339e45a0.exe 2412 5b9c80203aaa855d9ff901ff339e45a0.exe 2608 msnrsmsn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft3264OSUpdate = "C:\\Users\\Public\\E-73473-3674-74335\\msnrsmsn.exe" 5b9c80203aaa855d9ff901ff339e45a0.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1936 set thread context of 2412 1936 5b9c80203aaa855d9ff901ff339e45a0.exe 28 PID 2608 set thread context of 2756 2608 msnrsmsn.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2412 1936 5b9c80203aaa855d9ff901ff339e45a0.exe 28 PID 1936 wrote to memory of 2412 1936 5b9c80203aaa855d9ff901ff339e45a0.exe 28 PID 1936 wrote to memory of 2412 1936 5b9c80203aaa855d9ff901ff339e45a0.exe 28 PID 1936 wrote to memory of 2412 1936 5b9c80203aaa855d9ff901ff339e45a0.exe 28 PID 1936 wrote to memory of 2412 1936 5b9c80203aaa855d9ff901ff339e45a0.exe 28 PID 1936 wrote to memory of 2412 1936 5b9c80203aaa855d9ff901ff339e45a0.exe 28 PID 1936 wrote to memory of 2412 1936 5b9c80203aaa855d9ff901ff339e45a0.exe 28 PID 1936 wrote to memory of 2412 1936 5b9c80203aaa855d9ff901ff339e45a0.exe 28 PID 1936 wrote to memory of 2412 1936 5b9c80203aaa855d9ff901ff339e45a0.exe 28 PID 2412 wrote to memory of 2608 2412 5b9c80203aaa855d9ff901ff339e45a0.exe 29 PID 2412 wrote to memory of 2608 2412 5b9c80203aaa855d9ff901ff339e45a0.exe 29 PID 2412 wrote to memory of 2608 2412 5b9c80203aaa855d9ff901ff339e45a0.exe 29 PID 2412 wrote to memory of 2608 2412 5b9c80203aaa855d9ff901ff339e45a0.exe 29 PID 2608 wrote to memory of 2756 2608 msnrsmsn.exe 30 PID 2608 wrote to memory of 2756 2608 msnrsmsn.exe 30 PID 2608 wrote to memory of 2756 2608 msnrsmsn.exe 30 PID 2608 wrote to memory of 2756 2608 msnrsmsn.exe 30 PID 2608 wrote to memory of 2756 2608 msnrsmsn.exe 30 PID 2608 wrote to memory of 2756 2608 msnrsmsn.exe 30 PID 2608 wrote to memory of 2756 2608 msnrsmsn.exe 30 PID 2608 wrote to memory of 2756 2608 msnrsmsn.exe 30 PID 2608 wrote to memory of 2756 2608 msnrsmsn.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b9c80203aaa855d9ff901ff339e45a0.exe"C:\Users\Admin\AppData\Local\Temp\5b9c80203aaa855d9ff901ff339e45a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\5b9c80203aaa855d9ff901ff339e45a0.exe"C:\Users\Admin\AppData\Local\Temp\5b9c80203aaa855d9ff901ff339e45a0.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Public\E-73473-3674-74335\msnrsmsn.exe"C:\Users\Public\E-73473-3674-74335\msnrsmsn.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Public\E-73473-3674-74335\msnrsmsn.exe"C:\Users\Public\E-73473-3674-74335\msnrsmsn.exe"4⤵
- Executes dropped EXE
PID:2756
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD55b9c80203aaa855d9ff901ff339e45a0
SHA11fe0634955e39dd9fb5427989c620b5dc1616016
SHA2565cad046575f0e32b5e6fded63e48ea43683337c6ee18e2219bba8e8e8fa1e934
SHA51230743c41c5278a656c7b12f12785c54986e19e11fca4ee9b26025819bf37532b47cbaa0c941ea53bac01887b3b3ecec26a2d531c60bd83be837af55cc04a30cb