Analysis
-
max time kernel
162s -
max time network
203s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
b59e6ed4184115457e5045117e8e95f1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b59e6ed4184115457e5045117e8e95f1.exe
Resource
win10v2004-20240226-en
General
-
Target
b59e6ed4184115457e5045117e8e95f1.exe
-
Size
560KB
-
MD5
b59e6ed4184115457e5045117e8e95f1
-
SHA1
feab3523e15087129e8c44b0cd8cb9ed46e8d7ed
-
SHA256
e2106120e16acb7455d98e6068ddc160ad562832104258bcded3090f5aaf2a9c
-
SHA512
709a5ce5f91826155a062775e0ac18bac9276f632202e6e20d48fa040d56ee0dd2da5542288b4c61c0c7a8981078bb33c5cfe40ec70ab9805e6770a56ac8b3ed
-
SSDEEP
12288:kTQghS7CmcR3DvfVYhp/8+hwaQQrprRlgHJIBohE:kTQN7dovfVykJaQQdrRKpIBoK
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\netns\Parameters\ServiceDll = "C:\\Windows\\System32\\sysns.dll" b59e6ed4184115457e5045117e8e95f1.exe -
Deletes itself 1 IoCs
pid Process 2604 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2560 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sysns.dll b59e6ed4184115457e5045117e8e95f1.exe File created C:\Windows\SysWOW64\sysns.dll b59e6ed4184115457e5045117e8e95f1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2660 b59e6ed4184115457e5045117e8e95f1.exe 2660 b59e6ed4184115457e5045117e8e95f1.exe 2660 b59e6ed4184115457e5045117e8e95f1.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeRestorePrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeRestorePrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeRestorePrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeRestorePrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeRestorePrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeBackupPrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeRestorePrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeRestorePrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeRestorePrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeRestorePrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe Token: SeRestorePrivilege 2660 b59e6ed4184115457e5045117e8e95f1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2604 2660 b59e6ed4184115457e5045117e8e95f1.exe 31 PID 2660 wrote to memory of 2604 2660 b59e6ed4184115457e5045117e8e95f1.exe 31 PID 2660 wrote to memory of 2604 2660 b59e6ed4184115457e5045117e8e95f1.exe 31 PID 2660 wrote to memory of 2604 2660 b59e6ed4184115457e5045117e8e95f1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b59e6ed4184115457e5045117e8e95f1.exe"C:\Users\Admin\AppData\Local\Temp\b59e6ed4184115457e5045117e8e95f1.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\b59e6ed4184115457e5045117e8e95f1.exe"2⤵
- Deletes itself
PID:2604
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netns1⤵
- Loads dropped DLL
PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
487KB
MD50e9420cf69d2b89b2802bd191191216e
SHA190583bad182792a2d6e1b468a834d3eafb00d53b
SHA2566b7bd4312d366bd629fcc5bb7a5e8046bfdd14b5f4f3781e4cf3b291bcffedfb
SHA512172865d3617dd065e32c8cbdcb8f8ae578624b63c115709fb466ce1a13ec4916c87876664dbc0a4cbf3300acb5dd112657b6b147f350e167bd409366026b9a44