Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
8c68b87c65f73bcea5673628650994eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c68b87c65f73bcea5673628650994eb.exe
Resource
win10v2004-20231215-en
General
-
Target
8c68b87c65f73bcea5673628650994eb.exe
-
Size
15KB
-
MD5
8c68b87c65f73bcea5673628650994eb
-
SHA1
0fcc3e3e506c8f3d8f9132b1fe64b30bb11f13fb
-
SHA256
5f6aa4009a9b488a25f1b6eb3cf1bcee64c81fddde773bdd2c5f427bd3f0fb1b
-
SHA512
0e902b7a6cb926b647bf74b1989bb75829f4b9ac0a99a290bbd30d30d55bb483e414059be60786f5f06ca49190381cb48b977d00c568fa974316724eb8abe24d
-
SSDEEP
384:q7SLy9ZFe7lqU6iBOzjao0CT/nTLuoKA69z9dI9bWY2:q7Sm8lROzLDLJkd9dAb0
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\lweurqhx.dll = "{71A78CD4-E470-4a18-8457-E0E0283DD507}" 8c68b87c65f73bcea5673628650994eb.exe -
Loads dropped DLL 1 IoCs
pid Process 4588 8c68b87c65f73bcea5673628650994eb.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lweurqhx.tmp 8c68b87c65f73bcea5673628650994eb.exe File created C:\Windows\SysWOW64\lweurqhx.tmp 8c68b87c65f73bcea5673628650994eb.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32 8c68b87c65f73bcea5673628650994eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32\ = "C:\\Windows\\SysWow64\\lweurqhx.dll" 8c68b87c65f73bcea5673628650994eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32\ThreadingModel = "Apartment" 8c68b87c65f73bcea5673628650994eb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507} 8c68b87c65f73bcea5673628650994eb.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4588 8c68b87c65f73bcea5673628650994eb.exe 4588 8c68b87c65f73bcea5673628650994eb.exe 4588 8c68b87c65f73bcea5673628650994eb.exe 4588 8c68b87c65f73bcea5673628650994eb.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4588 8c68b87c65f73bcea5673628650994eb.exe 4588 8c68b87c65f73bcea5673628650994eb.exe 4588 8c68b87c65f73bcea5673628650994eb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4588 wrote to memory of 1832 4588 8c68b87c65f73bcea5673628650994eb.exe 92 PID 4588 wrote to memory of 1832 4588 8c68b87c65f73bcea5673628650994eb.exe 92 PID 4588 wrote to memory of 1832 4588 8c68b87c65f73bcea5673628650994eb.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c68b87c65f73bcea5673628650994eb.exe"C:\Users\Admin\AppData\Local\Temp\8c68b87c65f73bcea5673628650994eb.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\838.tmp.bat2⤵PID:1832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD55f61d9c2504d14815ad596cb4f73c8ca
SHA1d10b85cdb37e345440a27d5f565ce165e8cad8f0
SHA256830a0522037c582162f346fdc705cc5015cb01eeecac7749825f6aa07ad0942c
SHA5123b7ca2f4a48fbff8fe51dcd99abbdd89e6ba26e23bc4d9579d6bad8ef3ee3adb3ecb9b71f3f350039b58b4b7f5b454dde099fc73631f0075c2aece54c3c72737
-
Filesize
2.5MB
MD52f89d95a24a606ad0459a85c28bf30a8
SHA12a4043c4c9efec6663305f07b05c569afc431f19
SHA256d43104d456a3048d900b5eaa3509953beb39aeb4eead949531cfc8a471d02bf0
SHA51215d709e8e05b72addb0e38d28b26f31954b875978df3eeadbbc43428f13fbd7253817dd773e94cfc4f258b6fb79ca0a1e26ef02fbd99fa98946f2ab7617c1bf9