Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
778f9b2f5ed649514c82b93e5f314a69.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
778f9b2f5ed649514c82b93e5f314a69.exe
Resource
win10v2004-20231215-en
General
-
Target
778f9b2f5ed649514c82b93e5f314a69.exe
-
Size
581KB
-
MD5
778f9b2f5ed649514c82b93e5f314a69
-
SHA1
7417a710e30731874c84b86afc543f4c3187b749
-
SHA256
34fb84c46783bebdf15caede429ba6d72ebdba23360a8067df0f01463614c538
-
SHA512
d42c8edbb48828122e655bf086e5ce1f1d137339cb3163d3975ef0086fb5b1204c54a0cd1bb043b5ac5c5632b377b726a6fa82842ad46d86deb18490c0ec6a56
-
SSDEEP
12288:yMH8l0btikVa39/jGsF3Z4mxxuW2+rDxVkVnKrpJp+:yTN9/j1QmXuWbr980c
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\stisvr.dll\Parameters\ServiceDll = "C:\\Windows\\system32\\stisvr.dll" 778f9b2f5ed649514c82b93e5f314a69.exe -
Deletes itself 1 IoCs
pid Process 2684 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2676 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\stisvr.dll 778f9b2f5ed649514c82b93e5f314a69.exe File opened for modification C:\Windows\SysWOW64\stisvr.dll 778f9b2f5ed649514c82b93e5f314a69.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2684 2040 778f9b2f5ed649514c82b93e5f314a69.exe 29 PID 2040 wrote to memory of 2684 2040 778f9b2f5ed649514c82b93e5f314a69.exe 29 PID 2040 wrote to memory of 2684 2040 778f9b2f5ed649514c82b93e5f314a69.exe 29 PID 2040 wrote to memory of 2684 2040 778f9b2f5ed649514c82b93e5f314a69.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\778f9b2f5ed649514c82b93e5f314a69.exe"C:\Users\Admin\AppData\Local\Temp\778f9b2f5ed649514c82b93e5f314a69.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\778f9b2f5ed649514c82b93e5f314a69.exe"2⤵
- Deletes itself
PID:2684
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD5ed9da1a7bb38c06774367b1d596464fc
SHA1db1d31bc903028957bbffaff790be6140cc3490c
SHA2569780e550a0b207251b8ecb10246a11da624df781047f12e396c43627af31b915
SHA512ccc0e158bce48a16c9b98e49fe5329d3d5be8f0580c30a980aa83c2d3138d49cc833ee4068117b226000e290b7ce9ca9c6da0749f9e04aa87cf52081484c80d3
-
Filesize
144KB
MD52966e445f2499f7ed2cc1578d782d83a
SHA108941bec6e676a77a18c154cbb3b8dc476abf5dd
SHA256ebac36ed2af0348fc20496ff6340679e4025878f16c1ae62d54f7993f2a08d78
SHA51205ca59a64bcb2519cf0085b853c48adaa4877b1cc48479b990f57d7b1aee481c4561e3cb02f14a3d2cd76e0c7314c188843e197aa359adf40a3d9327408dc3a5