Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
89678289736124fc58686e09c5cfc13a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
89678289736124fc58686e09c5cfc13a.exe
Resource
win10v2004-20231215-en
General
-
Target
89678289736124fc58686e09c5cfc13a.exe
-
Size
13KB
-
MD5
89678289736124fc58686e09c5cfc13a
-
SHA1
a38cfdd6a53b6ed4dfa02dde05015f40bd25e234
-
SHA256
8b77fc24e7bffbd595c5aeba1b628f2a3820b0ceb77aca880d19cc324a3b8ce0
-
SHA512
8ebaa5236e87a2e176bafd4f1f4d140faf38170f273676a21c0cafc408f78c2e4dd4c6127cb49b3ccdea9f895b35f180e9c5b8e76915ccf9facb96227bb6be34
-
SSDEEP
384:4cJoXJz6ttH0lbX4qHmOpOmjuwli/roDiCF2yPP:4pXJuY4hG5g/8VAy3
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\sewmwrii.dll = "{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}" 89678289736124fc58686e09c5cfc13a.exe -
Loads dropped DLL 1 IoCs
pid Process 4968 89678289736124fc58686e09c5cfc13a.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\sewmwrii.tmp 89678289736124fc58686e09c5cfc13a.exe File opened for modification C:\Windows\SysWOW64\sewmwrii.tmp 89678289736124fc58686e09c5cfc13a.exe File opened for modification C:\Windows\SysWOW64\sewmwrii.nls 89678289736124fc58686e09c5cfc13a.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F} 89678289736124fc58686e09c5cfc13a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32 89678289736124fc58686e09c5cfc13a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32\ = "C:\\Windows\\SysWow64\\sewmwrii.dll" 89678289736124fc58686e09c5cfc13a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32\ThreadingModel = "Apartment" 89678289736124fc58686e09c5cfc13a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4968 89678289736124fc58686e09c5cfc13a.exe 4968 89678289736124fc58686e09c5cfc13a.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4968 89678289736124fc58686e09c5cfc13a.exe 4968 89678289736124fc58686e09c5cfc13a.exe 4968 89678289736124fc58686e09c5cfc13a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4968 wrote to memory of 2848 4968 89678289736124fc58686e09c5cfc13a.exe 90 PID 4968 wrote to memory of 2848 4968 89678289736124fc58686e09c5cfc13a.exe 90 PID 4968 wrote to memory of 2848 4968 89678289736124fc58686e09c5cfc13a.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\89678289736124fc58686e09c5cfc13a.exe"C:\Users\Admin\AppData\Local\Temp\89678289736124fc58686e09c5cfc13a.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\D8AD.tmp.bat2⤵PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5916fa2c2243d08105f4ca97f30a0da61
SHA1fcd0a477b8e297902c6cde5c479bf935e970520d
SHA256ffb5a3e6d3d5ba67513e07b6e518bc5a3c2664920d0001f4a7e0c0c4c26b26c4
SHA5124daff4dfd003f006b595379d9613dc52830ba61a4b220c3e4eeb20260f2bff555f99c612534eb4980e9c4839aae99f50e4d6530ed2a202d0f4138f35b4ac0f62
-
Filesize
722KB
MD5a158466f0a11d5b0d4ff99eb39e9f453
SHA17ddf973fc8a4e8e81040d6f801564e9c8838bc51
SHA2569ef2c46b18945bb1ad065793f409ac93017c5f8a68a46b5d593dea5a59281e06
SHA5129e0b74e2b649f11c05e517c8d881b6ffeb63309c7e7b1819c6c39931444cb10b770bfd9407d2de6d03d6cd98e0ad18ca203c59b59852c405a3358ebe3cfdbd51