Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
7127440e9d76292b88e36df44ed5479b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7127440e9d76292b88e36df44ed5479b.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$TEMP/kR9R5GkiZB.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$TEMP/kR9R5GkiZB.dll
Resource
win10v2004-20231215-en
General
-
Target
7127440e9d76292b88e36df44ed5479b.exe
-
Size
68KB
-
MD5
7127440e9d76292b88e36df44ed5479b
-
SHA1
ab3b0b9ec6530e9dbdc1d70fd3c7572954a47046
-
SHA256
5d2d957299e0b7b24198393dfb954fd03822dcf46874abcc5054d971ab446b81
-
SHA512
e23c5dbd21baf496143003f11a6976a16b5f16f9f92ce7e45abcacaa4ce5db3a2ccfffe39ac13e1d7eed828dd10ce3692e552f9f28a4e85db36b91c5340b98b2
-
SSDEEP
1536:KpgpHzb9dZVX9fHMvG0D3XJbC4b6B08HnSIdBky7xwrc+HpQQ:IgXdZt9P6D3XJbC4mB0QHj7xwrc2pQQ
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2552 rundll32.exe 6 2552 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2616 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 rundll32.exe 2552 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2552 1704 7127440e9d76292b88e36df44ed5479b.exe 28 PID 1704 wrote to memory of 2552 1704 7127440e9d76292b88e36df44ed5479b.exe 28 PID 1704 wrote to memory of 2552 1704 7127440e9d76292b88e36df44ed5479b.exe 28 PID 1704 wrote to memory of 2552 1704 7127440e9d76292b88e36df44ed5479b.exe 28 PID 1704 wrote to memory of 2552 1704 7127440e9d76292b88e36df44ed5479b.exe 28 PID 1704 wrote to memory of 2552 1704 7127440e9d76292b88e36df44ed5479b.exe 28 PID 1704 wrote to memory of 2552 1704 7127440e9d76292b88e36df44ed5479b.exe 28 PID 2552 wrote to memory of 2652 2552 rundll32.exe 31 PID 2552 wrote to memory of 2652 2552 rundll32.exe 31 PID 2552 wrote to memory of 2652 2552 rundll32.exe 31 PID 2552 wrote to memory of 2652 2552 rundll32.exe 31 PID 2652 wrote to memory of 2616 2652 cmd.exe 33 PID 2652 wrote to memory of 2616 2652 cmd.exe 33 PID 2652 wrote to memory of 2616 2652 cmd.exe 33 PID 2652 wrote to memory of 2616 2652 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7127440e9d76292b88e36df44ed5479b.exe"C:\Users\Admin\AppData\Local\Temp\7127440e9d76292b88e36df44ed5479b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\kR9R5GkiZB.dll",Install C:\Users\Admin\AppData\Local\Temp\kR9R5GkiZB2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd.exe /e:on /d /c ping -n 6 127.0.0.1 && DEL /F "C:\Users\Admin\AppData\Local\Temp\kR9R5GkiZB.dll" >> nul3⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\PING.EXEping -n 6 127.0.0.14⤵
- Runs ping.exe
PID:2616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024B
MD5f9b6dd91cfc5b00f139d33c158c50071
SHA1f67efc562f2924b5b7904984bb525cb7474e5037
SHA25628bb8f1a843d14efc541f063900f1d27fb747a2a887f23df05d13792c92ed6bf
SHA5124d277702b0b68225bf36dd256ea186de839ad3462841cc92864436cf5d46aca323bfaadb2a68a13bf4470ed8f6870dcb13ff1d3dd11a444fcfd57b75f499847f
-
Filesize
67KB
MD50926c75dcfb71173c22ed89e44ea6f78
SHA1012ecac790739f5b92f207ff9f1cbb4dc86516e3
SHA25640055fa711c4e132099cc760c6b8f10423233b6543be153d7e895a5af1070d55
SHA5124f761af8f8bec360ae3842d57f12648f6cfca1355954e55b882b983022849b8004dfca61015a913ccf2f0f0e93b6dd853d4710c7d5bdbf738a7c3a12f1ba3608