Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
7f14fac8adc4e9911136dbbe8b38a66e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f14fac8adc4e9911136dbbe8b38a66e.exe
Resource
win10v2004-20231222-en
General
-
Target
7f14fac8adc4e9911136dbbe8b38a66e.exe
-
Size
78KB
-
MD5
7f14fac8adc4e9911136dbbe8b38a66e
-
SHA1
7eefaf15d19d42e599d56eef51f6fba6a8d6ea36
-
SHA256
51719ae2a172429b08a3007034cc0e9676992883102875cd01dbab0616d3d43d
-
SHA512
8808e1078b9001b94402b5aaf9fda9c5bbfed67d2738906b335395be77856d8c56110de689fe084f8242ec5fb8a7d160cfc7912d5ede58dde4170fd1136672a4
-
SSDEEP
1536:+NOKj56g87beFp+5JUh0H67gr/9iXNuiYEhpdRgVU0YC7i:+NR6v2H+5JUqa7y/9i9OgdcjYC7i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2856 SMSS32.exe -
Drops file in System32 directory 23 IoCs
description ioc Process File created C:\Windows\SysWOW64\SMSS32.exe 7f14fac8adc4e9911136dbbe8b38a66e.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File opened for modification C:\Windows\SysWOW64\SMSS32.exe 7f14fac8adc4e9911136dbbe8b38a66e.exe File created C:\Windows\SysWOW64\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe File created C:\Windows\SysWOW64\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe\SMSS32.exe SMSS32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1372 7f14fac8adc4e9911136dbbe8b38a66e.exe 1372 7f14fac8adc4e9911136dbbe8b38a66e.exe 2856 SMSS32.exe 2856 SMSS32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2856 1372 7f14fac8adc4e9911136dbbe8b38a66e.exe 89 PID 1372 wrote to memory of 2856 1372 7f14fac8adc4e9911136dbbe8b38a66e.exe 89 PID 1372 wrote to memory of 2856 1372 7f14fac8adc4e9911136dbbe8b38a66e.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f14fac8adc4e9911136dbbe8b38a66e.exe"C:\Users\Admin\AppData\Local\Temp\7f14fac8adc4e9911136dbbe8b38a66e.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\SMSS32.exeC:\Windows\system32\SMSS32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD57f14fac8adc4e9911136dbbe8b38a66e
SHA17eefaf15d19d42e599d56eef51f6fba6a8d6ea36
SHA25651719ae2a172429b08a3007034cc0e9676992883102875cd01dbab0616d3d43d
SHA5128808e1078b9001b94402b5aaf9fda9c5bbfed67d2738906b335395be77856d8c56110de689fe084f8242ec5fb8a7d160cfc7912d5ede58dde4170fd1136672a4