Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
98e0505ee71259272c365fb13d223ff4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98e0505ee71259272c365fb13d223ff4.exe
Resource
win10v2004-20231222-en
General
-
Target
98e0505ee71259272c365fb13d223ff4.exe
-
Size
14KB
-
MD5
98e0505ee71259272c365fb13d223ff4
-
SHA1
1a66aaadd74fcd5ec1280a2330c26e4dacec89e4
-
SHA256
bb82b7c39db66cc9b25fc36a752d183cb7becb460ec8fdccc954a639b987f68a
-
SHA512
5e3123b6adfcbe65918acf6cbf492e532b45376d93ef8aedcc45417296e04024a20409b909807d0c3727ebb7444871be9468f0e6078883acd9f610106afc89ee
-
SSDEEP
192:UKolLDIGpeXSjvnS8KcTmhiXsN9R+aVexqpvoGTUISWIOoMjqujMzk7NOpE/tw:U3VZgXSjvS8FTbsNySV9zTBroe2k5Jt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3056 scopedll.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 scopedll.exe -
Loads dropped DLL 2 IoCs
pid Process 2828 98e0505ee71259272c365fb13d223ff4.exe 2828 98e0505ee71259272c365fb13d223ff4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Scopedll = "c:\\windows\\syswow64\\scopedll.exe" scopedll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\Scopedll = "c:\\windows\\syswow64\\scopedll.exe" scopedll.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\scopedll.exe 98e0505ee71259272c365fb13d223ff4.exe File opened for modification C:\Windows\SysWOW64\scopedll.exe 98e0505ee71259272c365fb13d223ff4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2828 wrote to memory of 3056 2828 98e0505ee71259272c365fb13d223ff4.exe 28 PID 2828 wrote to memory of 3056 2828 98e0505ee71259272c365fb13d223ff4.exe 28 PID 2828 wrote to memory of 3056 2828 98e0505ee71259272c365fb13d223ff4.exe 28 PID 2828 wrote to memory of 3056 2828 98e0505ee71259272c365fb13d223ff4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\98e0505ee71259272c365fb13d223ff4.exe"C:\Users\Admin\AppData\Local\Temp\98e0505ee71259272c365fb13d223ff4.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\scopedll.exeC:\Windows\system32\scopedll.exe 5EA1355FD8066C91 c:\users\admin\appdata\local\temp\98e0505ee71259272c365fb13d223ff4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD5c6733f95c52655549809b6a5a3d7b162
SHA17001d3decca741db05f5d0d20af13caf6864998b
SHA25615d10b179c3e090c44b191261ad2dce0be6c51a5c3cf0c155a47bd01937d548a
SHA512724fcd8dedffa097335fe0464ab41250afbb65c696757ecdbab12642b99d561f1b85ec2fc28509d8b560a0dff8b0d86d230d38aae6ef612698fc6c8a0d9951b9
-
Filesize
14KB
MD598e0505ee71259272c365fb13d223ff4
SHA11a66aaadd74fcd5ec1280a2330c26e4dacec89e4
SHA256bb82b7c39db66cc9b25fc36a752d183cb7becb460ec8fdccc954a639b987f68a
SHA5125e3123b6adfcbe65918acf6cbf492e532b45376d93ef8aedcc45417296e04024a20409b909807d0c3727ebb7444871be9468f0e6078883acd9f610106afc89ee