Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 04:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7ee6c89d7b7f59cacfa7a75cca87730b.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
7ee6c89d7b7f59cacfa7a75cca87730b.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
7ee6c89d7b7f59cacfa7a75cca87730b.exe
-
Size
68KB
-
MD5
7ee6c89d7b7f59cacfa7a75cca87730b
-
SHA1
b0b23e8e3ab99beba099c4bcbadbedcc1485d79b
-
SHA256
efb043386da18742723e97ccdaefe94bcb4d345fcc0fe95929d35197746bc790
-
SHA512
c8ca7f0fcf91861f25a56e162732644ca91d6f131655fc455583f2e6a64e6df792155c8c9e1bfcd775d7f2a19aeda8b6f8b06a699c052a9600f10ff5b06ba389
-
SSDEEP
1536:WgHFtI/kpwbv+eWKDZ3+ZFnJrvtCSyzNDAKUT9X:p+DCZKRWFnxvtCQTx
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2988-4-0x0000000000400000-0x000000000044A000-memory.dmp upx behavioral1/memory/2988-7-0x0000000000400000-0x000000000044A000-memory.dmp upx behavioral1/memory/2988-8-0x0000000000400000-0x000000000044A000-memory.dmp upx behavioral1/memory/2988-9-0x0000000000400000-0x000000000044A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssysif = "C:\\Windows\\system32\\7ee6c89d7b7f59cacfa7a75cca87730b.exe" reg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\7ee6c89d7b7f59cacfa7a75cca87730b.exe cmd.exe File opened for modification C:\Windows\SysWOW64\7ee6c89d7b7f59cacfa7a75cca87730b.exe cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1868 set thread context of 2988 1868 7ee6c89d7b7f59cacfa7a75cca87730b.exe 28 -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2988 1868 7ee6c89d7b7f59cacfa7a75cca87730b.exe 28 PID 1868 wrote to memory of 2988 1868 7ee6c89d7b7f59cacfa7a75cca87730b.exe 28 PID 1868 wrote to memory of 2988 1868 7ee6c89d7b7f59cacfa7a75cca87730b.exe 28 PID 1868 wrote to memory of 2988 1868 7ee6c89d7b7f59cacfa7a75cca87730b.exe 28 PID 1868 wrote to memory of 2988 1868 7ee6c89d7b7f59cacfa7a75cca87730b.exe 28 PID 1868 wrote to memory of 2988 1868 7ee6c89d7b7f59cacfa7a75cca87730b.exe 28 PID 2988 wrote to memory of 2192 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 31 PID 2988 wrote to memory of 2192 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 31 PID 2988 wrote to memory of 2192 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 31 PID 2988 wrote to memory of 2192 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 31 PID 2988 wrote to memory of 1760 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 33 PID 2988 wrote to memory of 1760 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 33 PID 2988 wrote to memory of 1760 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 33 PID 2988 wrote to memory of 1760 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 33 PID 2988 wrote to memory of 944 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 35 PID 2988 wrote to memory of 944 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 35 PID 2988 wrote to memory of 944 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 35 PID 2988 wrote to memory of 944 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 35 PID 944 wrote to memory of 1028 944 cmd.exe 37 PID 944 wrote to memory of 1028 944 cmd.exe 37 PID 944 wrote to memory of 1028 944 cmd.exe 37 PID 944 wrote to memory of 1028 944 cmd.exe 37 PID 2988 wrote to memory of 1540 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 38 PID 2988 wrote to memory of 1540 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 38 PID 2988 wrote to memory of 1540 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 38 PID 2988 wrote to memory of 1540 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 38 PID 1540 wrote to memory of 1264 1540 cmd.exe 40 PID 1540 wrote to memory of 1264 1540 cmd.exe 40 PID 1540 wrote to memory of 1264 1540 cmd.exe 40 PID 1540 wrote to memory of 1264 1540 cmd.exe 40 PID 2988 wrote to memory of 2528 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 41 PID 2988 wrote to memory of 2528 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 41 PID 2988 wrote to memory of 2528 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 41 PID 2988 wrote to memory of 2528 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 41 PID 2988 wrote to memory of 2804 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 43 PID 2988 wrote to memory of 2804 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 43 PID 2988 wrote to memory of 2804 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 43 PID 2988 wrote to memory of 2804 2988 7ee6c89d7b7f59cacfa7a75cca87730b.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ee6c89d7b7f59cacfa7a75cca87730b.exe"C:\Users\Admin\AppData\Local\Temp\7ee6c89d7b7f59cacfa7a75cca87730b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\7ee6c89d7b7f59cacfa7a75cca87730b.exeC:\Users\Admin\AppData\Local\Temp\7ee6c89d7b7f59cacfa7a75cca87730b.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy /Y "C:\Users\Admin\AppData\Local\Temp\7ee6c89d7b7f59cacfa7a75cca87730b.exe" C:\Windows\system32\3⤵
- Drops file in System32 directory
PID:2192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del /Q /F C:\Windows\temp\7ee6c89d7b7f59cacfa7a75cca87730b.exe3⤵PID:1760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\reg.exe delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v mssysif /f3⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v mssysif /f4⤵PID:1028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /v mssysif /d "C:\Windows\system32\7ee6c89d7b7f59cacfa7a75cca87730b.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /v mssysif /d "C:\Windows\system32\7ee6c89d7b7f59cacfa7a75cca87730b.exe"4⤵
- Adds Run key to start application
PID:1264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c type "C:\Windows\Tasks\1372180767-0020"3⤵PID:2528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c type "C:\Windows\Tasks\1372180767-0020"3⤵PID:2804
-
-