Analysis
-
max time kernel
7s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
7bd2f6cdefbe68f19ca2c1ef51ef123b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7bd2f6cdefbe68f19ca2c1ef51ef123b.exe
Resource
win10v2004-20231215-en
General
-
Target
7bd2f6cdefbe68f19ca2c1ef51ef123b.exe
-
Size
366KB
-
MD5
7bd2f6cdefbe68f19ca2c1ef51ef123b
-
SHA1
5aaaea86e6c8c293a8b43608fe78c4cdf12d1fd8
-
SHA256
6544118830e6ff6143dad5f2211b41497270f109232437512bb66626c8b96af0
-
SHA512
e11859897660ce96314e4f6924c66db74693c4232f2a04b06aa386103297217ea84760b90fed455500581ae5c5bd26fe044d3453ea31bfdc497d8c60fc953100
-
SSDEEP
6144:Nd8tdJzSxgZkAy4zN7fJjBSAuoYxdbeomzVQUgSRBWSwvP6bQ7yMP+DE827NXN:N44ajyCfJN+oYxBez5QU1u6b7MP+Dd2H
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2716 msebtis.exe 3036 mschpxk.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\msebtis.exe 7bd2f6cdefbe68f19ca2c1ef51ef123b.exe File opened for modification C:\Windows\SysWOW64\msebtis.exe 7bd2f6cdefbe68f19ca2c1ef51ef123b.exe File created C:\Windows\SysWOW64\mschpxk.exe msebtis.exe File opened for modification C:\Windows\SysWOW64\mschpxk.exe msebtis.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 7bd2f6cdefbe68f19ca2c1ef51ef123b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 7bd2f6cdefbe68f19ca2c1ef51ef123b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key msebtis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ msebtis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" msebtis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 7bd2f6cdefbe68f19ca2c1ef51ef123b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2716 2348 7bd2f6cdefbe68f19ca2c1ef51ef123b.exe 87 PID 2348 wrote to memory of 2716 2348 7bd2f6cdefbe68f19ca2c1ef51ef123b.exe 87 PID 2348 wrote to memory of 2716 2348 7bd2f6cdefbe68f19ca2c1ef51ef123b.exe 87 PID 2716 wrote to memory of 3036 2716 msebtis.exe 88 PID 2716 wrote to memory of 3036 2716 msebtis.exe 88 PID 2716 wrote to memory of 3036 2716 msebtis.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bd2f6cdefbe68f19ca2c1ef51ef123b.exe"C:\Users\Admin\AppData\Local\Temp\7bd2f6cdefbe68f19ca2c1ef51ef123b.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\msebtis.exeC:\Windows\system32\msebtis.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\mschpxk.exeC:\Windows\system32\mschpxk.exe3⤵
- Executes dropped EXE
PID:3036
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366KB
MD57bd2f6cdefbe68f19ca2c1ef51ef123b
SHA15aaaea86e6c8c293a8b43608fe78c4cdf12d1fd8
SHA2566544118830e6ff6143dad5f2211b41497270f109232437512bb66626c8b96af0
SHA512e11859897660ce96314e4f6924c66db74693c4232f2a04b06aa386103297217ea84760b90fed455500581ae5c5bd26fe044d3453ea31bfdc497d8c60fc953100