Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
7aa7fc632ccfac14698818beed61e0b2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7aa7fc632ccfac14698818beed61e0b2.exe
Resource
win10v2004-20231222-en
General
-
Target
7aa7fc632ccfac14698818beed61e0b2.exe
-
Size
14KB
-
MD5
7aa7fc632ccfac14698818beed61e0b2
-
SHA1
edc300d5f80467cd868f4cb4a91e5ddfc3a5c69b
-
SHA256
8e61cb0bba0bd8ae420b2f6c30d8a65caa862ca2476f1f7107125793f2d3b41d
-
SHA512
0cb0d6e9dd30274270055a77c72bf985ed151e4f8a6a8798a4cd8fffee37586328330617cbe7b8257d75c314a264a50b57937eba2f2157c6f32bec4bfa509e81
-
SSDEEP
384:qyBOLizJwC3nMrnho7XMm0GxsylWXdRlHpp3T9XUM+B:sIwunanh20GxfgdDpp3TGR
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\tscfgwmijxsj.dll = "{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}" 7aa7fc632ccfac14698818beed61e0b2.exe -
Deletes itself 1 IoCs
pid Process 2484 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 7aa7fc632ccfac14698818beed61e0b2.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tscfgwmijxsj.nls 7aa7fc632ccfac14698818beed61e0b2.exe File created C:\Windows\SysWOW64\tscfgwmijxsj.tmp 7aa7fc632ccfac14698818beed61e0b2.exe File opened for modification C:\Windows\SysWOW64\tscfgwmijxsj.tmp 7aa7fc632ccfac14698818beed61e0b2.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8} 7aa7fc632ccfac14698818beed61e0b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32 7aa7fc632ccfac14698818beed61e0b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32\ = "C:\\Windows\\SysWow64\\tscfgwmijxsj.dll" 7aa7fc632ccfac14698818beed61e0b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32\ThreadingModel = "Apartment" 7aa7fc632ccfac14698818beed61e0b2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2932 7aa7fc632ccfac14698818beed61e0b2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2932 7aa7fc632ccfac14698818beed61e0b2.exe 2932 7aa7fc632ccfac14698818beed61e0b2.exe 2932 7aa7fc632ccfac14698818beed61e0b2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2484 2932 7aa7fc632ccfac14698818beed61e0b2.exe 28 PID 2932 wrote to memory of 2484 2932 7aa7fc632ccfac14698818beed61e0b2.exe 28 PID 2932 wrote to memory of 2484 2932 7aa7fc632ccfac14698818beed61e0b2.exe 28 PID 2932 wrote to memory of 2484 2932 7aa7fc632ccfac14698818beed61e0b2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aa7fc632ccfac14698818beed61e0b2.exe"C:\Users\Admin\AppData\Local\Temp\7aa7fc632ccfac14698818beed61e0b2.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\87F5.tmp.bat2⤵
- Deletes itself
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD59ee0621d578c6a21e06d5fdd32e88962
SHA167d025ca516041e1274d7280e438478869cfdd4b
SHA2563e595feb193f53b4582f619796a0c39175b7e90dd03a66ae2f9007322843fb72
SHA512df1bb95a3450951ed6544465a6cf81a7a67afbf2a2a7b58b2d63fbddf63146c1c13065dd5fb8df3c43cba0c914a9b5ec45488c697d53ce400b82e209fced6226
-
Filesize
428B
MD5fe5c2f283dbe60e4d4a9984fc096382f
SHA1fe928759fdc257642a31f138f7a00455312ad9c1
SHA25605aa99136ef8d1a41ef1f1cf9753ee34d3722ba1330d8049c968048ae2c58c5a
SHA5126b85465d57c461e9fc3eef0119456511718d75ac93b7f5bd5013c61430801cf83a1186d3b7e58508231480ec1de30c79cfabe17d6b3fc26f159ee078c7923eba
-
Filesize
965KB
MD5ffcc599191c402adb8acdd1778cb67dd
SHA17a02262e5a042d462cfb7c2fe080d0e0839f07ae
SHA2563d25a3f24455be705df0d5e2def5039932ce85e4fb60d2d05f8238f9dec20720
SHA5128befa3a2b9fcec0ebff68fdcf454a8277f0d5363c5f61a5bd85a4585a398c4a8c0b11f659caf57537a8286cd08824d6169c270450a71885475a2cd8391d6c330
-
Filesize
453KB
MD56ee6fb2c14a94bcfdcac30be3f55d017
SHA17ddcc7b79cfbb688b2e0941ba0294545c8888260
SHA2566b831ca3e99286b6b36031ded8df9d5822ec54478d16f89fd13717df5f9bb614
SHA512345a1131e0cbbb39ce18ea2fcf910f4d86b98f3afbfd39a6918d3e8d79411c77ab48902c6361899be57bd2b01b56e94777bbed647b1e58f227ab6bd253a84e95