Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
bdd522d760e0f66b08fca4b21845fbc3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bdd522d760e0f66b08fca4b21845fbc3.exe
Resource
win10v2004-20240226-en
General
-
Target
bdd522d760e0f66b08fca4b21845fbc3.exe
-
Size
175KB
-
MD5
bdd522d760e0f66b08fca4b21845fbc3
-
SHA1
a03dc47e2237f2c12f1f298aa3ad9ac5ac39ab5e
-
SHA256
e12b9172e8be141907529cd981ea57db8aa2ed0ce21d3fa8ef0d7d59f1216d9e
-
SHA512
4ee09868cd160eec271f30106863b358262484c43cf42393d2918fe6d8ae1ea83822070ff3ecb30ba941bb33320be3b22f1413a0c604cd8291b95fc8810ea250
-
SSDEEP
3072:EQKskHJn+Y5imxacyZ10zPRQHh/MTD8desoMVhZH3sPUMMnMMMMMX7I7Da:oHFLA0K70zPRI58D8dfoMVDH3scMMnMC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 poju.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 bdd522d760e0f66b08fca4b21845fbc3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\{19F71248-7EB4-80A4-4F53-7AA2BAD9F811} = "C:\\Users\\Admin\\AppData\\Roaming\\Nepo\\poju.exe" poju.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2100 bdd522d760e0f66b08fca4b21845fbc3.exe 2100 bdd522d760e0f66b08fca4b21845fbc3.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe 2904 poju.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2100 bdd522d760e0f66b08fca4b21845fbc3.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2904 2100 bdd522d760e0f66b08fca4b21845fbc3.exe 28 PID 2100 wrote to memory of 2904 2100 bdd522d760e0f66b08fca4b21845fbc3.exe 28 PID 2100 wrote to memory of 2904 2100 bdd522d760e0f66b08fca4b21845fbc3.exe 28 PID 2100 wrote to memory of 2904 2100 bdd522d760e0f66b08fca4b21845fbc3.exe 28 PID 2904 wrote to memory of 1124 2904 poju.exe 19 PID 2904 wrote to memory of 1124 2904 poju.exe 19 PID 2904 wrote to memory of 1124 2904 poju.exe 19 PID 2904 wrote to memory of 1124 2904 poju.exe 19 PID 2904 wrote to memory of 1124 2904 poju.exe 19 PID 2904 wrote to memory of 1180 2904 poju.exe 20 PID 2904 wrote to memory of 1180 2904 poju.exe 20 PID 2904 wrote to memory of 1180 2904 poju.exe 20 PID 2904 wrote to memory of 1180 2904 poju.exe 20 PID 2904 wrote to memory of 1180 2904 poju.exe 20 PID 2904 wrote to memory of 1264 2904 poju.exe 21 PID 2904 wrote to memory of 1264 2904 poju.exe 21 PID 2904 wrote to memory of 1264 2904 poju.exe 21 PID 2904 wrote to memory of 1264 2904 poju.exe 21 PID 2904 wrote to memory of 1264 2904 poju.exe 21 PID 2904 wrote to memory of 2004 2904 poju.exe 23 PID 2904 wrote to memory of 2004 2904 poju.exe 23 PID 2904 wrote to memory of 2004 2904 poju.exe 23 PID 2904 wrote to memory of 2004 2904 poju.exe 23 PID 2904 wrote to memory of 2004 2904 poju.exe 23 PID 2904 wrote to memory of 2100 2904 poju.exe 27 PID 2904 wrote to memory of 2100 2904 poju.exe 27 PID 2904 wrote to memory of 2100 2904 poju.exe 27 PID 2904 wrote to memory of 2100 2904 poju.exe 27 PID 2904 wrote to memory of 2100 2904 poju.exe 27 PID 2904 wrote to memory of 2496 2904 poju.exe 29 PID 2904 wrote to memory of 2496 2904 poju.exe 29 PID 2904 wrote to memory of 2496 2904 poju.exe 29 PID 2904 wrote to memory of 2496 2904 poju.exe 29 PID 2904 wrote to memory of 2496 2904 poju.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\bdd522d760e0f66b08fca4b21845fbc3.exe"C:\Users\Admin\AppData\Local\Temp\bdd522d760e0f66b08fca4b21845fbc3.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Roaming\Nepo\poju.exe"C:\Users\Admin\AppData\Roaming\Nepo\poju.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2004
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e68e247cd1eb54e81bcd9f9f3f5371b6
SHA1c210f82789ce5b6e341f2c77441f811cfa421444
SHA25601de0aed5ec715aa7f22b2f7dc1e720129843b50c307336b8f47ebb4d670938f
SHA5124078069502d066ee1e9cd42ebfbd4c8bc1cb4a32c64dbd23ea29ba183f79a89a1a524de633ee9d6b5fce32a0f411d18c6f4491e2c033471dda804bcb2a9c181b