Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
7465296d24134378902d098d6298da9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7465296d24134378902d098d6298da9e.exe
Resource
win10v2004-20231222-en
General
-
Target
7465296d24134378902d098d6298da9e.exe
-
Size
239KB
-
MD5
7465296d24134378902d098d6298da9e
-
SHA1
5209a7189ae4a62ea6de83f0a055c692743ff046
-
SHA256
c1846dd6c690054aeff048693b93d9964684e4de28986da1f1b46ea119ba671a
-
SHA512
23c3c41d733d3ed39497c8abd43a6a3a5eb959ef90c87366f60563b3ed5fa26e0cb2769e9822e774952876031a644009c1676ca71e6bbf1fcd3c55547be3477d
-
SSDEEP
6144:75y0M+pV5IfH2DdaJ/aBF5ddroSFs6+aTSbDGIeKsq78Z:n3ufH2ZWaZhFs62O7KsqYZ
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\serf\Parameters\ServiceDll = "C:\\Windows\\system32\\wser.dll" 7465296d24134378902d098d6298da9e.exe -
Deletes itself 1 IoCs
pid Process 2348 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2332 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wser.dll 7465296d24134378902d098d6298da9e.exe File opened for modification C:\Windows\SysWOW64\wser.dll 7465296d24134378902d098d6298da9e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2348 2420 7465296d24134378902d098d6298da9e.exe 29 PID 2420 wrote to memory of 2348 2420 7465296d24134378902d098d6298da9e.exe 29 PID 2420 wrote to memory of 2348 2420 7465296d24134378902d098d6298da9e.exe 29 PID 2420 wrote to memory of 2348 2420 7465296d24134378902d098d6298da9e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7465296d24134378902d098d6298da9e.exe"C:\Users\Admin\AppData\Local\Temp\7465296d24134378902d098d6298da9e.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\7465296d24134378902d098d6298da9e.exe"2⤵
- Deletes itself
PID:2348
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526KB
MD5fcfb47d5bc12a68093f08ffa136de2a1
SHA17753692ad3622195d3a5d424f1bda19dad929071
SHA256d888a1d163545798a1143d4499e00b0c935d0fdf64e3ceea3c0dd23e51270baa
SHA51265355260410cae299d057e29b28093a189e4933302f3fb1fdae90cb1b7b917ef3411f6b129684ac9e8dd4a60aab5bd345da15bc7920ad1cc0aef7c598a1a7111