Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:45
Static task
static1
Behavioral task
behavioral1
Sample
7500abde570e37dfe1a450f98e6774f2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7500abde570e37dfe1a450f98e6774f2.exe
Resource
win10v2004-20231215-en
General
-
Target
7500abde570e37dfe1a450f98e6774f2.exe
-
Size
94KB
-
MD5
7500abde570e37dfe1a450f98e6774f2
-
SHA1
31c3044778d2e18379af8cc03f4e3500154894c0
-
SHA256
3a07c871cd53f42ebb9bc5136f12ebac6d68b90b6392dfec2b134f4aedb61672
-
SHA512
a73730e1995413b6cd9614c8df0dbf680800497c88deb531e05a193fb564cd2f6a00ac46a60ecf318fb13c2b987644819159161755e37f9be1660739913dc8a1
-
SSDEEP
768:Q6quHUzxzOOTdqqYJTScKx8UJklOquH+npqigVjfqXPXkfyUhV:Q6BJTRK1k8IpWjw0fZ/
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
Processes:
7500abde570e37dfe1a450f98e6774f2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\dpvvoxmh.dll = "{2876D76C-CAAA-4313-AF97-8D1D9A2A1087}" 7500abde570e37dfe1a450f98e6774f2.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2672 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
7500abde570e37dfe1a450f98e6774f2.exepid process 1852 7500abde570e37dfe1a450f98e6774f2.exe -
Drops file in System32 directory 3 IoCs
Processes:
7500abde570e37dfe1a450f98e6774f2.exedescription ioc process File created C:\Windows\SysWOW64\dpvvoxmh.tmp 7500abde570e37dfe1a450f98e6774f2.exe File opened for modification C:\Windows\SysWOW64\dpvvoxmh.tmp 7500abde570e37dfe1a450f98e6774f2.exe File opened for modification C:\Windows\SysWOW64\dpvvoxmh.nls 7500abde570e37dfe1a450f98e6774f2.exe -
Modifies registry class 4 IoCs
Processes:
7500abde570e37dfe1a450f98e6774f2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2876D76C-CAAA-4313-AF97-8D1D9A2A1087}\InProcServer32\ = "C:\\Windows\\SysWow64\\dpvvoxmh.dll" 7500abde570e37dfe1a450f98e6774f2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2876D76C-CAAA-4313-AF97-8D1D9A2A1087}\InProcServer32\ThreadingModel = "Apartment" 7500abde570e37dfe1a450f98e6774f2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2876D76C-CAAA-4313-AF97-8D1D9A2A1087} 7500abde570e37dfe1a450f98e6774f2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2876D76C-CAAA-4313-AF97-8D1D9A2A1087}\InProcServer32 7500abde570e37dfe1a450f98e6774f2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7500abde570e37dfe1a450f98e6774f2.exepid process 1852 7500abde570e37dfe1a450f98e6774f2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
7500abde570e37dfe1a450f98e6774f2.exepid process 1852 7500abde570e37dfe1a450f98e6774f2.exe 1852 7500abde570e37dfe1a450f98e6774f2.exe 1852 7500abde570e37dfe1a450f98e6774f2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
7500abde570e37dfe1a450f98e6774f2.exedescription pid process target process PID 1852 wrote to memory of 2672 1852 7500abde570e37dfe1a450f98e6774f2.exe cmd.exe PID 1852 wrote to memory of 2672 1852 7500abde570e37dfe1a450f98e6774f2.exe cmd.exe PID 1852 wrote to memory of 2672 1852 7500abde570e37dfe1a450f98e6774f2.exe cmd.exe PID 1852 wrote to memory of 2672 1852 7500abde570e37dfe1a450f98e6774f2.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7500abde570e37dfe1a450f98e6774f2.exe"C:\Users\Admin\AppData\Local\Temp\7500abde570e37dfe1a450f98e6774f2.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\8EC8.tmp.bat2⤵
- Deletes itself
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD569c78b41602f6243654d2ffafaedb954
SHA1d4e8de5ba354080ab8bc4b796e8f9ee8b73eaf38
SHA256ea13cfe15e335efdad087dc5852a7072d4fd66fcfe290bab935cfd4cd28ef7ab
SHA5127428fb419117080a975792782e6f1a6abdc57cd2dcca7c01e52fa68c4c20738d1c7442a26f83780aea1abb645903d3168e985f1f3fa0c07707ef49a092d9ce12
-
Filesize
731KB
MD5018a5c8effa5800bbf934a536aa630cc
SHA193bef36f4ed280ec28bd89f6079caa699e88bc88
SHA25655b2e85ec87fabb2b6707efb50f64a22cbb89ec552cd76153fe9f21b09e3e6e2
SHA51210cca28077b31e6bbb9f82a2ef9687389ad50bdfd159ed69e93db7fdeea416755141e4d94eaf53fd9e14d4545cf22bf5b958b0da2cdd423651c562b21319bfea
-
Filesize
629KB
MD56ed1a56739e6d1b1cc30180683798bdc
SHA18fbb1e9534f99b6fea63fea8fb23e85c5529761a
SHA2560c8a43240bf665fb6588808d1748f7f4d9fd17a73f6e3aace27dbedd882671f7
SHA512af3b409882a7c340211b6d658e713e330aa521dc09ff549fdf583ac190f41a74a926c40ba3158b1bd64664a9e497d1f93fb4006d2275a8a9b85ff6c34acb0ecf