Overview
overview
7Static
static
75c476b47ec...f9.exe
windows7-x64
75c476b47ec...f9.exe
windows10-2004-x64
7$TEMP/Team...r_.exe
windows7-x64
7$TEMP/Team...r_.exe
windows10-2004-x64
7$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3$PLUGINSDI...64.dll
windows7-x64
3$PLUGINSDI...64.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...SC.dll
windows7-x64
3$PLUGINSDI...SC.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PROGRAMFI...AS.exe
windows7-x64
1$PROGRAMFI...AS.exe
windows10-2004-x64
1$TEMP/Team...TV.dll
windows7-x64
1$TEMP/Team...TV.dll
windows10-2004-x64
3$TEMP/Team...er.exe
windows7-x64
7$TEMP/Team...er.exe
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15-01-2024 05:41
Behavioral task
behavioral1
Sample
5c476b47ecc73dbd3412c5d37676f6f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c476b47ecc73dbd3412c5d37676f6f9.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$TEMP/TeamViewer/Version5/TeamViewer_.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$TEMP/TeamViewer/Version5/TeamViewer_.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/AccessControl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Base64.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Base64.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/SimpleSC.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/SimpleSC.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/TvGetVersion.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisFirewall.dll
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisFirewall.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
$PROGRAMFILES/TeamViewer/Version5/SAS.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
$PROGRAMFILES/TeamViewer/Version5/SAS.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
$TEMP/TeamViewer/Version5/TV.dll
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
$TEMP/TeamViewer/Version5/TV.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
$TEMP/TeamViewer/Version5/TeamViewer.exe
Resource
win7-20231215-en
General
-
Target
5c476b47ecc73dbd3412c5d37676f6f9.exe
-
Size
2.5MB
-
MD5
5c476b47ecc73dbd3412c5d37676f6f9
-
SHA1
5c5bb58226cc903fb5b230d2fe0359f017dd1772
-
SHA256
bacf1ae72d809382dc9ceba302a3f1fc91542620767e9d34e5caab2a2619e133
-
SHA512
f713ee497720206a33880186fef7eec169911b258c052b7b9e0e4b3a9f259e0ed4ebf4f4249449b7068870ea167fb5558287c88136a9bdd6a1655e98fec76f1a
-
SSDEEP
49152:j0Ii8g9VPJlLQBkK8q3ws6krWiSERpTT8TnrKPMaU9R0Q02p+4:wIi8g9BMBLVWixrsTOvIJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2192 TeamViewer_.exe -
Loads dropped DLL 7 IoCs
pid Process 1256 5c476b47ecc73dbd3412c5d37676f6f9.exe 2192 TeamViewer_.exe 2192 TeamViewer_.exe 2192 TeamViewer_.exe 2192 TeamViewer_.exe 2192 TeamViewer_.exe 2192 TeamViewer_.exe -
resource yara_rule behavioral1/memory/1256-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x0007000000015c93-4.dat upx behavioral1/memory/1256-6-0x0000000002EC0000-0x0000000002F09000-memory.dmp upx behavioral1/files/0x0007000000015c93-9.dat upx behavioral1/memory/2192-11-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/files/0x0007000000015c93-12.dat upx behavioral1/memory/1256-10-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x0007000000015c93-8.dat upx behavioral1/memory/2192-226-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 TeamViewer_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2192 1256 5c476b47ecc73dbd3412c5d37676f6f9.exe 28 PID 1256 wrote to memory of 2192 1256 5c476b47ecc73dbd3412c5d37676f6f9.exe 28 PID 1256 wrote to memory of 2192 1256 5c476b47ecc73dbd3412c5d37676f6f9.exe 28 PID 1256 wrote to memory of 2192 1256 5c476b47ecc73dbd3412c5d37676f6f9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c476b47ecc73dbd3412c5d37676f6f9.exe"C:\Users\Admin\AppData\Local\Temp\5c476b47ecc73dbd3412c5d37676f6f9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\temp\TeamViewer\Version5\TeamViewer_.exe"C:\Users\Admin\temp\TeamViewer\Version5\TeamViewer_.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661B
MD5d49491c7ba7bd565e1b8ff473cd84c8e
SHA12522272cf01af17f8ace15a29759f7629ebdc94e
SHA2560be1c22c6f540d98cd55d7f434f57aedffc67a19df4e4957f75eb034a7b3d9bb
SHA5122207da44794bd8b8ed1161a0a1990d13824c91b651711d20fbd14769f898a95168884e217f24465b309901215961f3bcb287214b61c5ce2fbc020e8e21cb7b3c
-
Filesize
975B
MD569a491a30f8fd22d3210847d54274a19
SHA17e19eb2b1424bb487708f91001d0a001e214ebb8
SHA25649a8ab22496032d8286c7fa71d1e5fc3f13079572d45e4140d1b24be57202b53
SHA5124ac8b38c91eb466cc31e8256cd7a59bf10ff088a3ff233510277be969134c7da2c784fb1254323c2a3e502d2daa98561c160d321a153914b65f97c6bec79207b
-
Filesize
1KB
MD51f32f636bcedeb37a7913e76fc000a51
SHA15232af60428db5dc5b32bd218330966cc71bf06d
SHA25643edfbd7e7461241b61aadccf1629bf0694501b675433544b44a84866a3f5226
SHA5122a1509abf3ea24f35db5e9b123f23dfdb9e9f4c83b50a12a9821b7323731bfedd8cd8967931433b62d937218aac50fb34772597ba7df17aa214d878b6c7bd1f1
-
Filesize
1004B
MD53b52a6054afbd25bd44d2408cb0434d1
SHA15d625fdeaad64f68d34c68dd1c34c63baf4a71f2
SHA256d47b487080592c3680f94d60721e8c75fc0f728d7c039dca4c45a5ce4fbf5e46
SHA512d5ffb7e9aaad4cee74758b77be84ab6aa5366a6d01c9316f1b5d79bb09bb36c762a1aa857e8c5570997d925d7198be6447a8663e721b46f0250008a86b99c6ba
-
Filesize
983B
MD5cc38fe264db13629dbac09fb999f4f7f
SHA151db7d5f9fa53ae98856575b55c4d69ee0cfc6b0
SHA2560ebbe20b46d7cb70a57c730bf65f73c219c03a0bcffc36fa7a4adefd2623141d
SHA512fbb4ef383b4a4b18f0fac1dede037213ffd16f8bd9a98e4d326817953b2b2ce577f4a5696cddbbf4a84a595cf1dc85e4b0501cfb988eac909f698789e73033e5
-
Filesize
263KB
MD57013cf59244be19076328d7ce9b29220
SHA13b37e50d836f201e7a74366c95b5d1a26c40aac7
SHA25601cd322c7f3c86609bd71c3e3b4efae273c2bc40826c47f8befb4abcbdbfa9bd
SHA5120534f08c1a659413482fbc0601ef360645834f4c831befc950a2b2c15e5e89c6f334f475545a619249d1f8c9ecfaebe9f08de249cfd2dd1a6aff40ce386d3f60
-
Filesize
327KB
MD5e4c06a19aff9d315c829cd2188678499
SHA1bd76c76935270a3b826be2620c426e5764c94d36
SHA256e129b36461ae4994e322a90a9903896525df93daf83975b501e4bad9907e786f
SHA5122373f915d1c0ceb8eee79620c4740582c4ed399d2c0d34b10fe7883d9cb7bc1463e228a88cbb9e6f8d901827f6729afcd96b77149646d9ea2a299e2d81d95fd8
-
Filesize
241KB
MD593578b3fac4ebfea802c235fb6652862
SHA156448d5f80286f28ca71526b5d45759c81056d39
SHA256efc3be99138663dd0cf3e0a6d58f097c6b8ac2353d5980483f46677076db624b
SHA51282428214736970cd3dfd56247a22972c815fab96a55e80638a39680899c7d88013eae0f953ec933c8cf86a027f1320a3e94cc7178897c9e614ac92157fc22640
-
Filesize
14KB
MD50dc0cc7a6d9db685bf05a7e5f3ea4781
SHA15d8b6268eeec9d8d904bc9d988a4b588b392213f
SHA2568e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
SHA512814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
13KB
MD5eb062eb8b2c498c03b1542ccde87ad90
SHA144432fa3d16baa6bd5243fab7187204d4c0a2166
SHA25681888a1166ae594aef28084d00c5d59e899e8f0b6bc632f99df08fba3ad77c3b
SHA512e21af0d46cb71ecbe764915fc9ef67ebbe3c0dd428b4816adb7e966aafb761aa72248a21392236bf4ce068be855e9a43f3ccf96db612edef3cb17e1a10afe4e1
-
Filesize
4KB
MD51e8e11f465afdabe97f529705786b368
SHA1ea42bed65df6618c5f5648567d81f3935e70a2a0
SHA2567d099352c82612ab27ddfd7310c1aa049b58128fb04ea6ea55816a40a6f6487b
SHA51216566a8c1738e26962139aae893629098dc759e4ac87df3e8eb9819df4e0e422421836bb1e4240377e00fb2f4408ce40f40eee413d0f6dd2f3a4e27a52d49a0b
-
Filesize
357KB
MD5844d5e0e0f3cbca18a733e148bacd36a
SHA1bedeb9bafb35e9bb1889956f769e567f3d700426
SHA25677b0a975b68693f255fa901f76fd8b65e38c96b547586812f954a5fa0741e0ac
SHA512d9da73624a8f8ae3e96e991cc228f107f7290f8001c33a2b5f4846753f9a758bf144ca584f7510f057f1ead9cc203045e463aef40d05bfc573f6ed58e1e14451