Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
8c9ee2556eb31f2b7608c54b335f5e39.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c9ee2556eb31f2b7608c54b335f5e39.exe
Resource
win10v2004-20231222-en
General
-
Target
8c9ee2556eb31f2b7608c54b335f5e39.exe
-
Size
139KB
-
MD5
8c9ee2556eb31f2b7608c54b335f5e39
-
SHA1
82f3f250019e361bf90f7b2d649ecd55634460e1
-
SHA256
16449ddb6b1d88368da42175a126041d24b90d1498760e8e12dd340ed30f5666
-
SHA512
2279b0fe536f287f895385628c58d3668417b3d51a62f32fc50187e92377b7cfae79587195175c79bab87538c522fbf2819683b76995d71e2f7b06e75de9d67a
-
SSDEEP
3072:JMTdQO2oWRrMu4Ubc6mFG/SyTOSd0+uZRpQNnJSKa4PO8T:J41SVwDcdTddbMLQNnza+T
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2812 netsh.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iffef.exe 8c9ee2556eb31f2b7608c54b335f5e39.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iffef.exe 8c9ee2556eb31f2b7608c54b335f5e39.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iffef.exe krpmrk.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iffef.exe krpmrk.exe -
Executes dropped EXE 2 IoCs
pid Process 2976 krpmrk.exe 2660 krpmrk.exe -
Loads dropped DLL 2 IoCs
pid Process 2220 8c9ee2556eb31f2b7608c54b335f5e39.exe 2220 8c9ee2556eb31f2b7608c54b335f5e39.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lddvjcdq = "C:\\Users\\Admin\\AppData\\Local\\krpmrk.exe" krpmrk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\lddvjcdq = "C:\\Users\\Admin\\AppData\\Local\\krpmrk.exe" krpmrk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lddvjcdq = "C:\\Users\\Admin\\AppData\\Local\\krpmrk.exe" 8c9ee2556eb31f2b7608c54b335f5e39.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\lddvjcdq = "C:\\Users\\Admin\\AppData\\Local\\krpmrk.exe" 8c9ee2556eb31f2b7608c54b335f5e39.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3024 set thread context of 2220 3024 8c9ee2556eb31f2b7608c54b335f5e39.exe 28 PID 2976 set thread context of 2660 2976 krpmrk.exe 31 -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2220 3024 8c9ee2556eb31f2b7608c54b335f5e39.exe 28 PID 3024 wrote to memory of 2220 3024 8c9ee2556eb31f2b7608c54b335f5e39.exe 28 PID 3024 wrote to memory of 2220 3024 8c9ee2556eb31f2b7608c54b335f5e39.exe 28 PID 3024 wrote to memory of 2220 3024 8c9ee2556eb31f2b7608c54b335f5e39.exe 28 PID 3024 wrote to memory of 2220 3024 8c9ee2556eb31f2b7608c54b335f5e39.exe 28 PID 3024 wrote to memory of 2220 3024 8c9ee2556eb31f2b7608c54b335f5e39.exe 28 PID 3024 wrote to memory of 2220 3024 8c9ee2556eb31f2b7608c54b335f5e39.exe 28 PID 3024 wrote to memory of 2220 3024 8c9ee2556eb31f2b7608c54b335f5e39.exe 28 PID 2220 wrote to memory of 2812 2220 8c9ee2556eb31f2b7608c54b335f5e39.exe 29 PID 2220 wrote to memory of 2812 2220 8c9ee2556eb31f2b7608c54b335f5e39.exe 29 PID 2220 wrote to memory of 2812 2220 8c9ee2556eb31f2b7608c54b335f5e39.exe 29 PID 2220 wrote to memory of 2812 2220 8c9ee2556eb31f2b7608c54b335f5e39.exe 29 PID 2220 wrote to memory of 2976 2220 8c9ee2556eb31f2b7608c54b335f5e39.exe 30 PID 2220 wrote to memory of 2976 2220 8c9ee2556eb31f2b7608c54b335f5e39.exe 30 PID 2220 wrote to memory of 2976 2220 8c9ee2556eb31f2b7608c54b335f5e39.exe 30 PID 2220 wrote to memory of 2976 2220 8c9ee2556eb31f2b7608c54b335f5e39.exe 30 PID 2976 wrote to memory of 2660 2976 krpmrk.exe 31 PID 2976 wrote to memory of 2660 2976 krpmrk.exe 31 PID 2976 wrote to memory of 2660 2976 krpmrk.exe 31 PID 2976 wrote to memory of 2660 2976 krpmrk.exe 31 PID 2976 wrote to memory of 2660 2976 krpmrk.exe 31 PID 2976 wrote to memory of 2660 2976 krpmrk.exe 31 PID 2976 wrote to memory of 2660 2976 krpmrk.exe 31 PID 2976 wrote to memory of 2660 2976 krpmrk.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c9ee2556eb31f2b7608c54b335f5e39.exe"C:\Users\Admin\AppData\Local\Temp\8c9ee2556eb31f2b7608c54b335f5e39.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\8c9ee2556eb31f2b7608c54b335f5e39.exeC:\Users\Admin\AppData\Local\Temp\8c9ee2556eb31f2b7608c54b335f5e39.exe2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram 1.exe 1 ENABLE3⤵
- Modifies Windows Firewall
PID:2812
-
-
C:\Users\Admin\AppData\Local\krpmrk.exe"C:\Users\Admin\AppData\Local\krpmrk.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\krpmrk.exeC:\Users\Admin\AppData\Local\krpmrk.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:2660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5ffe089cec521df4c363c118c1c831027
SHA17a6fd22b305bdcfb595e3d71cf8da5cf20ca980e
SHA2567d0fb88bd07bcf60b2a03dce9c43303425d192b0de3bf9179895d088cfa84351
SHA512112c7a8e25616c3918ebb3efde90224db031e7126f89b2a522d7db8b2a3e6a508261fcaec656f334bfa13c5e094b380843913132a4fab4e9c2a008232fe48617
-
Filesize
139KB
MD58c9ee2556eb31f2b7608c54b335f5e39
SHA182f3f250019e361bf90f7b2d649ecd55634460e1
SHA25616449ddb6b1d88368da42175a126041d24b90d1498760e8e12dd340ed30f5666
SHA5122279b0fe536f287f895385628c58d3668417b3d51a62f32fc50187e92377b7cfae79587195175c79bab87538c522fbf2819683b76995d71e2f7b06e75de9d67a