Resubmissions
23/01/2024, 10:05
240123-l4tfssaah8 723/01/2024, 09:19
240123-laka2ahafl 523/01/2024, 09:10
240123-k5b3gahaam 723/01/2024, 09:01
240123-ky2pjshfc7 5Analysis
-
max time kernel
300s -
max time network
298s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
MnWk2NzwYZzZNNi.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
MnWk2NzwYZzZNNi.exe
Resource
win10v2004-20231215-en
General
-
Target
MnWk2NzwYZzZNNi.exe
-
Size
818KB
-
MD5
c6560e26f17910f67064bfa362d1752b
-
SHA1
80d7cfaea3eef83ab4185c20a688f75649d78cc7
-
SHA256
c646d31222431f14557700abea27a36daccc5f2d097d963164b392b25939d2b4
-
SHA512
3baa602f7242b70501e5f28b3b524057affdf4305ded3b26ba378edc427cfac4d57a66050c43b0bcf1598123aa109e7f16d385ec0bdbb1bc672cd3d91e36ff86
-
SSDEEP
12288:5hTkm2iNPBJI38aXnoQ83GpAVokdQK4beNYstaGUhn8oD0mTbVArj/aVAPTdQhHK:5hwm1xu8aXnE+Ajdd46DaGUhb0my
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2848 dllhost.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2316 set thread context of 3020 2316 MnWk2NzwYZzZNNi.exe 28 PID 3020 set thread context of 1352 3020 MnWk2NzwYZzZNNi.exe 7 PID 3020 set thread context of 2848 3020 MnWk2NzwYZzZNNi.exe 29 PID 2848 set thread context of 1352 2848 dllhost.exe 7 -
description ioc Process Key created \Registry\User\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 dllhost.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2316 MnWk2NzwYZzZNNi.exe 2316 MnWk2NzwYZzZNNi.exe 3020 MnWk2NzwYZzZNNi.exe 3020 MnWk2NzwYZzZNNi.exe 3020 MnWk2NzwYZzZNNi.exe 3020 MnWk2NzwYZzZNNi.exe 3020 MnWk2NzwYZzZNNi.exe 3020 MnWk2NzwYZzZNNi.exe 3020 MnWk2NzwYZzZNNi.exe 3020 MnWk2NzwYZzZNNi.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1352 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3020 MnWk2NzwYZzZNNi.exe 1352 Explorer.EXE 1352 Explorer.EXE 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe 2848 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2316 MnWk2NzwYZzZNNi.exe Token: SeShutdownPrivilege 1352 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1352 Explorer.EXE 1352 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1352 Explorer.EXE 1352 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3020 2316 MnWk2NzwYZzZNNi.exe 28 PID 2316 wrote to memory of 3020 2316 MnWk2NzwYZzZNNi.exe 28 PID 2316 wrote to memory of 3020 2316 MnWk2NzwYZzZNNi.exe 28 PID 2316 wrote to memory of 3020 2316 MnWk2NzwYZzZNNi.exe 28 PID 2316 wrote to memory of 3020 2316 MnWk2NzwYZzZNNi.exe 28 PID 2316 wrote to memory of 3020 2316 MnWk2NzwYZzZNNi.exe 28 PID 2316 wrote to memory of 3020 2316 MnWk2NzwYZzZNNi.exe 28 PID 1352 wrote to memory of 2848 1352 Explorer.EXE 29 PID 1352 wrote to memory of 2848 1352 Explorer.EXE 29 PID 1352 wrote to memory of 2848 1352 Explorer.EXE 29 PID 1352 wrote to memory of 2848 1352 Explorer.EXE 29 PID 2848 wrote to memory of 2372 2848 dllhost.exe 33 PID 2848 wrote to memory of 2372 2848 dllhost.exe 33 PID 2848 wrote to memory of 2372 2848 dllhost.exe 33 PID 2848 wrote to memory of 2372 2848 dllhost.exe 33 PID 2848 wrote to memory of 2372 2848 dllhost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\MnWk2NzwYZzZNNi.exe"C:\Users\Admin\AppData\Local\Temp\MnWk2NzwYZzZNNi.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\MnWk2NzwYZzZNNi.exe"C:\Users\Admin\AppData\Local\Temp\MnWk2NzwYZzZNNi.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3020
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2372
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
489KB
MD5910ae9fbda13a82f9410303b653fe0c6
SHA13de02829408f5320b01e4209c79cf4a9d45cde86
SHA25611ba415b7e3b91c4587dc73bec82caf92f62724d0e49782151e7764acca43cb5
SHA512a7564409603dec6184920aed608024db319e8548b872a022eecd91501c12da2fde5fab5b6ce6772f1ba5724cce9151ce79214bed5cb3b13d39e5e9ea254e51b0
-
Filesize
932KB
MD5661fd92d4eaeea3740649af5a484d7c8
SHA1c93f868890fee1475f8ec9e7607e26f5dce67d54
SHA25658a478f0560ea22c1bc194263f07cf6f3ecfe47d0c8b534a7bba185f28a1141f
SHA5121fac03c20139fde41d121e0adbd02d127261ce061509996087fc1c80baf2fe0d0f70fed6b83d38a85cfa2e07d038ff809161c7ecce31ec44ac8b89740d3db15d