Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
778f9b2f5ed649514c82b93e5f314a69.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
778f9b2f5ed649514c82b93e5f314a69.exe
Resource
win10v2004-20231215-en
General
-
Target
778f9b2f5ed649514c82b93e5f314a69.exe
-
Size
581KB
-
MD5
778f9b2f5ed649514c82b93e5f314a69
-
SHA1
7417a710e30731874c84b86afc543f4c3187b749
-
SHA256
34fb84c46783bebdf15caede429ba6d72ebdba23360a8067df0f01463614c538
-
SHA512
d42c8edbb48828122e655bf086e5ce1f1d137339cb3163d3975ef0086fb5b1204c54a0cd1bb043b5ac5c5632b377b726a6fa82842ad46d86deb18490c0ec6a56
-
SSDEEP
12288:yMH8l0btikVa39/jGsF3Z4mxxuW2+rDxVkVnKrpJp+:yTN9/j1QmXuWbr980c
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\stisvr.dll\Parameters\ServiceDll = "C:\\Windows\\system32\\stisvr.dll" 778f9b2f5ed649514c82b93e5f314a69.exe -
Loads dropped DLL 1 IoCs
pid Process 4132 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\stisvr.dll 778f9b2f5ed649514c82b93e5f314a69.exe File opened for modification C:\Windows\SysWOW64\stisvr.dll 778f9b2f5ed649514c82b93e5f314a69.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 888 wrote to memory of 316 888 778f9b2f5ed649514c82b93e5f314a69.exe 91 PID 888 wrote to memory of 316 888 778f9b2f5ed649514c82b93e5f314a69.exe 91 PID 888 wrote to memory of 316 888 778f9b2f5ed649514c82b93e5f314a69.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\778f9b2f5ed649514c82b93e5f314a69.exe"C:\Users\Admin\AppData\Local\Temp\778f9b2f5ed649514c82b93e5f314a69.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\778f9b2f5ed649514c82b93e5f314a69.exe"2⤵PID:316
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:4132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD58f169e224836eab72f2f83bfcd133016
SHA15642efaaf54744768205879d5668a5815944de4d
SHA2569ccc10023d52cdbe97448efa3da9449ead71ccbb25cc376ecdfa9bffc1418188
SHA51294fa2bd2e6a023a67f46c4be3951ca46fcb618f458e9f4d7656cb907b99ad497945c6a28bbc9e43bdc82bb032c6cc3ac4751e135e2a9ccc8a0b48d4dd7e827c6
-
Filesize
144KB
MD5279a35666281d1a2b950f09be4e2afa1
SHA175d381c5644af57d9608db0fd625766d686b1d04
SHA256961cb5de73ab8caeef947704c5a27d207c32f611ecb8fa368c9620e18a1dfe05
SHA5129209dc2b07c2e9600c23ddb88ac13cf98f89a0e6417836f6bcca41e72464aa08add744664c8ed1ce3756883c42cf18e0f8a1946c2db514d3399facc6fa9fd8e7