Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
8e23232583859fe5e31caf3db27fb6f6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e23232583859fe5e31caf3db27fb6f6.exe
Resource
win10v2004-20231215-en
General
-
Target
8e23232583859fe5e31caf3db27fb6f6.exe
-
Size
61KB
-
MD5
8e23232583859fe5e31caf3db27fb6f6
-
SHA1
99da5bcef8c09cb87e0fac28ea3eb094fb9186fc
-
SHA256
d12e401525c316a381a7521d1d411dde756450f73732c03008f4c9c850ef3134
-
SHA512
9954b029856f8e8c8130433d91d3a85bf9dc6bcd76ff8659cda0931c79e2e82daeaa5afce32af948f10a734cf122c70272d5a57a1f71bd25d0db9ab4bf8637a3
-
SSDEEP
1536:brqWVs15u2n21h5GvyJ2McgOxFVdTpFYcPs/7xYpyg:BVeZ0VwFVdFet/2g
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4944 SmcSVR.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\SmcSVR = "C:\\Windows\\SmcSVR.exe" 8e23232583859fe5e31caf3db27fb6f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SmcSVR = "C:\\Windows\\SmcSVR.exe" 8e23232583859fe5e31caf3db27fb6f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\SmcSVR = "C:\\Windows\\SmcSVR.exe" SmcSVR.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SmcSVR = "C:\\Windows\\SmcSVR.exe" SmcSVR.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\SmcSVR.exe 8e23232583859fe5e31caf3db27fb6f6.exe File opened for modification C:\Windows\SmcSVR.exe 8e23232583859fe5e31caf3db27fb6f6.exe File created C:\Windows\SmcSVR.exe SmcSVR.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LIG SmcSVR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LIG\Fo SmcSVR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LIG\Fo = "1" SmcSVR.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe 4944 SmcSVR.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4944 SmcSVR.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 436 wrote to memory of 4944 436 8e23232583859fe5e31caf3db27fb6f6.exe 85 PID 436 wrote to memory of 4944 436 8e23232583859fe5e31caf3db27fb6f6.exe 85 PID 436 wrote to memory of 4944 436 8e23232583859fe5e31caf3db27fb6f6.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e23232583859fe5e31caf3db27fb6f6.exe"C:\Users\Admin\AppData\Local\Temp\8e23232583859fe5e31caf3db27fb6f6.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SmcSVR.exeC:\Windows\SmcSVR.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:4944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD58e23232583859fe5e31caf3db27fb6f6
SHA199da5bcef8c09cb87e0fac28ea3eb094fb9186fc
SHA256d12e401525c316a381a7521d1d411dde756450f73732c03008f4c9c850ef3134
SHA5129954b029856f8e8c8130433d91d3a85bf9dc6bcd76ff8659cda0931c79e2e82daeaa5afce32af948f10a734cf122c70272d5a57a1f71bd25d0db9ab4bf8637a3