Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
75a5b31d37d41f4c2f30703d90585861.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75a5b31d37d41f4c2f30703d90585861.exe
Resource
win10v2004-20231215-en
General
-
Target
75a5b31d37d41f4c2f30703d90585861.exe
-
Size
13KB
-
MD5
75a5b31d37d41f4c2f30703d90585861
-
SHA1
ab0fff31acbff44c3b104864988cf299e0ec7a04
-
SHA256
6815e7018b26ae888576c94ea2ae2e2a43f63f6017f2502cc8be086ec384f7f6
-
SHA512
e37f5e51535a9b38f14ab3f99b942bb217ac4f355a1081a00c5eb0be27eef92e57d7ea309ef26df0e79785a7956ce3bead923311988b504802413afe85f90a6a
-
SSDEEP
384:L7VbKFt3s4yThhXFUSGNclIOATSdqg+vwfZ+pk:XFKFtc4yThVbGNcllArRvy
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2676 Mann.exe 2312 Mann.exe -
Loads dropped DLL 2 IoCs
pid Process 1420 75a5b31d37d41f4c2f30703d90585861.exe 1420 75a5b31d37d41f4c2f30703d90585861.exe -
Enumerates connected drives 3 TTPs 12 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Mann.exe File opened (read-only) \??\H: Mann.exe File opened (read-only) \??\E: Mann.exe File opened (read-only) \??\G: Mann.exe File opened (read-only) \??\H: Mann.exe File opened (read-only) \??\G: Mann.exe File opened (read-only) \??\I: Mann.exe File opened (read-only) \??\J: Mann.exe File opened (read-only) \??\K: Mann.exe File opened (read-only) \??\J: Mann.exe File opened (read-only) \??\K: Mann.exe File opened (read-only) \??\E: Mann.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mann.exe 75a5b31d37d41f4c2f30703d90585861.exe File created C:\Windows\SysWOW64\Mann.exe Mann.exe File created C:\Windows\SysWOW64\note2.ini 75a5b31d37d41f4c2f30703d90585861.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2788 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1420 75a5b31d37d41f4c2f30703d90585861.exe 1420 75a5b31d37d41f4c2f30703d90585861.exe 2676 Mann.exe 2676 Mann.exe 2676 Mann.exe 2676 Mann.exe 2312 Mann.exe 2676 Mann.exe 2676 Mann.exe 2312 Mann.exe 2312 Mann.exe 2312 Mann.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2676 Mann.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1420 75a5b31d37d41f4c2f30703d90585861.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2676 1420 75a5b31d37d41f4c2f30703d90585861.exe 28 PID 1420 wrote to memory of 2676 1420 75a5b31d37d41f4c2f30703d90585861.exe 28 PID 1420 wrote to memory of 2676 1420 75a5b31d37d41f4c2f30703d90585861.exe 28 PID 1420 wrote to memory of 2676 1420 75a5b31d37d41f4c2f30703d90585861.exe 28 PID 2676 wrote to memory of 2852 2676 Mann.exe 30 PID 2676 wrote to memory of 2852 2676 Mann.exe 30 PID 2676 wrote to memory of 2852 2676 Mann.exe 30 PID 2676 wrote to memory of 2852 2676 Mann.exe 30 PID 1420 wrote to memory of 2900 1420 75a5b31d37d41f4c2f30703d90585861.exe 31 PID 1420 wrote to memory of 2900 1420 75a5b31d37d41f4c2f30703d90585861.exe 31 PID 1420 wrote to memory of 2900 1420 75a5b31d37d41f4c2f30703d90585861.exe 31 PID 1420 wrote to memory of 2900 1420 75a5b31d37d41f4c2f30703d90585861.exe 31 PID 2900 wrote to memory of 2788 2900 cmd.exe 33 PID 2900 wrote to memory of 2788 2900 cmd.exe 33 PID 2900 wrote to memory of 2788 2900 cmd.exe 33 PID 2900 wrote to memory of 2788 2900 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\75a5b31d37d41f4c2f30703d90585861.exe"C:\Users\Admin\AppData\Local\Temp\75a5b31d37d41f4c2f30703d90585861.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\Mann.exeC:\Windows\system32\Mann.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\Mann.exe > nul3⤵PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c echo ping 127.1 -n 3 >nul 2>nul >c:\2.bat&echo del C:\Windows\system32\75a5b31d37d41f4c2f30703d90585861.exe>>c:\2.bat&echo del c:\2.bat>>c:\2.bat&c:\2.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 33⤵
- Runs ping.exe
PID:2788
-
-
-
C:\Windows\SysWOW64\Mann.exeC:\Windows\SysWOW64\Mann.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94B
MD512a691da2b1c89c0fa585fa1d7465285
SHA1e206fafdfea9e0dc7271eb25b7b388ec1d3e6c70
SHA256c0354d5d8f2ecee0ebf975a62c1b4f86ee8cdbecb07f164d8e1a766f57047696
SHA5124507e9b11c19663dd007cb46a1f06da826f95aadf2bb54f94976133be87a600051e7bc8b31b5f0ff032e6de18352f88be305c2ebf6ca94e2c7cfd5e05c3cbb30
-
Filesize
18KB
MD52c6d407c7df7e9a65083b4cf90cb09ec
SHA169e40c8063a9312482affd5f56d59ffccb323b70
SHA25690d0b221198a49dc3540d05963119ae769e3d754ee9c1677352557749d1a2cce
SHA512f83f97cd9181a49fc1d7053f80dae840609268d904b30202c36b292b8d3a60140c7a2e3afda465e7ac18681c818a42c8d01eec73cbc6953658b1a959d3b8c63b