Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
ac97b20edcbafa7d6d2cab6040451b10.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ac97b20edcbafa7d6d2cab6040451b10.exe
Resource
win10v2004-20240226-en
General
-
Target
ac97b20edcbafa7d6d2cab6040451b10.exe
-
Size
65KB
-
MD5
ac97b20edcbafa7d6d2cab6040451b10
-
SHA1
ad671ad399a9a71fa6bbc39599aec84480d8a8e7
-
SHA256
798e6d771016bd324773e1b6c700a84dc2bf79e4951b3fc47feef1dcece33626
-
SHA512
aa0a5839af959012f9f9dcb3d875cab4f704269059a2d51b85ad1c4c065142328ad11fb561d2e613096682a4006eca5c011f26f4b9e8b876403b55196ef5e1bf
-
SSDEEP
1536:l+n+yUIDbf1RoSG++GNdKX3SqRE6Bybgftsmb:k+PIDLY++Gu3SqexStsmb
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ac97b20edcbafa7d6d2cab6040451b10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mcc16 = "rundll32 \"C:\\Windows\\Downlo~1\\mcc16.dll\",start" ac97b20edcbafa7d6d2cab6040451b10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ztjw9b0i = "rundll32 \"C:\\Windows\\Downlo~1\\ztjw9b0i.dll\",Run" ac97b20edcbafa7d6d2cab6040451b10.exe -
Loads dropped DLL 8 IoCs
pid Process 2576 rundll32.exe 2576 rundll32.exe 2576 rundll32.exe 2576 rundll32.exe 2600 rundll32.exe 2600 rundll32.exe 2600 rundll32.exe 2600 rundll32.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Downlo~1\ztjw9b0i.dll ac97b20edcbafa7d6d2cab6040451b10.exe File created C:\Windows\-8073-80-59 ac97b20edcbafa7d6d2cab6040451b10.exe File opened for modification C:\Windows\Downlo~1\mcc16.dll ac97b20edcbafa7d6d2cab6040451b10.exe File created C:\Windows\Downlo~1\mcc16.dll ac97b20edcbafa7d6d2cab6040451b10.exe File created C:\Windows\b049b0c5 ac97b20edcbafa7d6d2cab6040451b10.exe File opened for modification C:\Windows\Downlo~1\ztjw9b0i.dll ac97b20edcbafa7d6d2cab6040451b10.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2576 rundll32.exe 2600 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1844 ac97b20edcbafa7d6d2cab6040451b10.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2576 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 28 PID 1844 wrote to memory of 2576 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 28 PID 1844 wrote to memory of 2576 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 28 PID 1844 wrote to memory of 2576 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 28 PID 1844 wrote to memory of 2576 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 28 PID 1844 wrote to memory of 2576 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 28 PID 1844 wrote to memory of 2576 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 28 PID 2576 wrote to memory of 1188 2576 rundll32.exe 7 PID 1844 wrote to memory of 2600 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 29 PID 1844 wrote to memory of 2600 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 29 PID 1844 wrote to memory of 2600 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 29 PID 1844 wrote to memory of 2600 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 29 PID 1844 wrote to memory of 2600 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 29 PID 1844 wrote to memory of 2600 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 29 PID 1844 wrote to memory of 2600 1844 ac97b20edcbafa7d6d2cab6040451b10.exe 29 PID 2600 wrote to memory of 1188 2600 rundll32.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac97b20edcbafa7d6d2cab6040451b10.exe"C:\Users\Admin\AppData\Local\Temp\ac97b20edcbafa7d6d2cab6040451b10.exe"1⤵
- Adds policy Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\Downlo~1\mcc16.dll",start2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\Downlo~1\ztjw9b0i.dll",Run2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5d14a6d6036067babaf54d032fc898c12
SHA1406039f8ea25005a70a72a099eaa394dec681f01
SHA25690d121e0590a0a019e54632fa7a1810b4d8169d3cb6daaa6bfe052ea3ebbc918
SHA512878daa82a00ac723ef08062941c0f69d9f3089efec2875b2754d02b83391161e030deefdf69b3bbb0d0c1e9f874d1b7ac3779d383aefa2d884de53d243466c34
-
Filesize
64KB
MD56db4ebf3c1e6d9dfe61781bdd43264ac
SHA105faa66d21c82466f718b0a5f60dbaf2067768f1
SHA256b59ba39bcb8ba9dbd484d363bd57a059b1f886431dffe3ac607553b4ddee72e6
SHA5120b8d06d3e4c79012837984fdb18b7cefcd0631df80feb187de4a690554d3e0f7f357d36bb25754903043a7b764de7cca36106314a057e631981703e85dc30cae