Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 02:28
Behavioral task
behavioral1
Sample
ad74dfb3410189f2e82193c25ca63ab9.exe
Resource
win7-20240221-en
General
-
Target
ad74dfb3410189f2e82193c25ca63ab9.exe
-
Size
32KB
-
MD5
ad74dfb3410189f2e82193c25ca63ab9
-
SHA1
21114580a75e91118deae99094de18e802224677
-
SHA256
75c88f741c31b5e99fe90c40972542fec2048c50cfc0df2e7cad01499ed714be
-
SHA512
3c20ff1f6e05c9544582a89356b2974b2333e6562b710454914aca0e30c764c1a911883fa68803d151a0572ddb84c9c20957aa8d4e0c335bceee9a668156d8b9
-
SSDEEP
384:DqxwqnceJueQ6bvMqewXhg3AhJbORm52iKOLnE18p3OuTeqRKpZmVmmVEdraq2bS:uxwVeJiZ0hPhJbu7qLFVOiTRKpZIDU0
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
pid Process 2580 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2580 rundll32.exe -
resource yara_rule behavioral1/memory/332-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/332-11-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\ksuser.dll ad74dfb3410189f2e82193c25ca63ab9.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll ad74dfb3410189f2e82193c25ca63ab9.exe File created C:\Windows\SysWOW64\msimg32.dll ad74dfb3410189f2e82193c25ca63ab9.exe File opened for modification C:\Windows\SysWOW64\yuksuser.dll ad74dfb3410189f2e82193c25ca63ab9.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll ad74dfb3410189f2e82193c25ca63ab9.exe File created C:\Windows\SysWOW64\yumidimap.dll ad74dfb3410189f2e82193c25ca63ab9.exe File created C:\Windows\SysWOW64\midimap.dll ad74dfb3410189f2e82193c25ca63ab9.exe File created C:\Windows\SysWOW64\yumsimg32.dll ad74dfb3410189f2e82193c25ca63ab9.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll ad74dfb3410189f2e82193c25ca63ab9.exe File created C:\Windows\SysWOW64\sysapp5.dll ad74dfb3410189f2e82193c25ca63ab9.exe File created C:\Windows\SysWOW64\yuksuser.dll ad74dfb3410189f2e82193c25ca63ab9.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2056 sc.exe 2768 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 332 ad74dfb3410189f2e82193c25ca63ab9.exe 332 ad74dfb3410189f2e82193c25ca63ab9.exe 332 ad74dfb3410189f2e82193c25ca63ab9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 332 ad74dfb3410189f2e82193c25ca63ab9.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 332 wrote to memory of 2828 332 ad74dfb3410189f2e82193c25ca63ab9.exe 28 PID 332 wrote to memory of 2828 332 ad74dfb3410189f2e82193c25ca63ab9.exe 28 PID 332 wrote to memory of 2828 332 ad74dfb3410189f2e82193c25ca63ab9.exe 28 PID 332 wrote to memory of 2828 332 ad74dfb3410189f2e82193c25ca63ab9.exe 28 PID 332 wrote to memory of 2056 332 ad74dfb3410189f2e82193c25ca63ab9.exe 30 PID 332 wrote to memory of 2056 332 ad74dfb3410189f2e82193c25ca63ab9.exe 30 PID 332 wrote to memory of 2056 332 ad74dfb3410189f2e82193c25ca63ab9.exe 30 PID 332 wrote to memory of 2056 332 ad74dfb3410189f2e82193c25ca63ab9.exe 30 PID 332 wrote to memory of 2768 332 ad74dfb3410189f2e82193c25ca63ab9.exe 31 PID 332 wrote to memory of 2768 332 ad74dfb3410189f2e82193c25ca63ab9.exe 31 PID 332 wrote to memory of 2768 332 ad74dfb3410189f2e82193c25ca63ab9.exe 31 PID 332 wrote to memory of 2768 332 ad74dfb3410189f2e82193c25ca63ab9.exe 31 PID 332 wrote to memory of 2580 332 ad74dfb3410189f2e82193c25ca63ab9.exe 33 PID 332 wrote to memory of 2580 332 ad74dfb3410189f2e82193c25ca63ab9.exe 33 PID 332 wrote to memory of 2580 332 ad74dfb3410189f2e82193c25ca63ab9.exe 33 PID 332 wrote to memory of 2580 332 ad74dfb3410189f2e82193c25ca63ab9.exe 33 PID 332 wrote to memory of 2580 332 ad74dfb3410189f2e82193c25ca63ab9.exe 33 PID 332 wrote to memory of 2580 332 ad74dfb3410189f2e82193c25ca63ab9.exe 33 PID 332 wrote to memory of 2580 332 ad74dfb3410189f2e82193c25ca63ab9.exe 33 PID 2828 wrote to memory of 2716 2828 net.exe 35 PID 2828 wrote to memory of 2716 2828 net.exe 35 PID 2828 wrote to memory of 2716 2828 net.exe 35 PID 2828 wrote to memory of 2716 2828 net.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad74dfb3410189f2e82193c25ca63ab9.exe"C:\Users\Admin\AppData\Local\Temp\ad74dfb3410189f2e82193c25ca63ab9.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵PID:2716
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
PID:2056
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
PID:2768
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1709173721.dat, ServerMain c:\users\admin\appdata\local\temp\ad74dfb3410189f2e82193c25ca63ab9.exe2⤵
- Deletes itself
- Loads dropped DLL
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5280d1dcda064c5f221e4d7d6def2762c
SHA15fc150cda048ac254f1280301130577544414f73
SHA2564ad51810e813e023937e06071c6aa530a6f7fae8d6868050c22ba957c803e508
SHA512426b27cb0269f3e99aa1cc36be32619d2c0fa6498d371c745830d65306c29ef64e64faadee5a1e39d2bf7c914d84b191a8276043bc626e04ea4222734f144154