Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
be2200f8a4cc7c28ff19270892118293.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be2200f8a4cc7c28ff19270892118293.exe
Resource
win10v2004-20240226-en
General
-
Target
be2200f8a4cc7c28ff19270892118293.exe
-
Size
624KB
-
MD5
be2200f8a4cc7c28ff19270892118293
-
SHA1
cfa00c4099caa993cbea984fc576f67e89134c92
-
SHA256
d6afcce63997e5f072c32edcc0409fdcd3fe695468933c4e7271e9ddcf471ee5
-
SHA512
3ab366dcdc803b724b250ba592e4d10c7c7cd327226609f13a442048c7dfd46a23c7a0a06a3c2bce036abf16d22826017b560e1e74e22ba5834bb54d763758e0
-
SSDEEP
12288:WOwNxGUDwMeIkZajwu4diroeJsISWAT4lFMvwmb1TLnWI5NVmpI:WOsxGUDIa0ZirRsrWAT4lFWwmb1/WYNT
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0034000000015cb6-91.dat aspack_v212_v242 behavioral1/files/0x0007000000015d4e-107.dat aspack_v212_v242 -
Executes dropped EXE 5 IoCs
pid Process 2732 dtxservice.exe 2456 fps.exe 2968 mps.exe 2772 iss32.exe 2804 CRSS.EXE -
Loads dropped DLL 2 IoCs
pid Process 2240 be2200f8a4cc7c28ff19270892118293.exe 2240 be2200f8a4cc7c28ff19270892118293.exe -
resource yara_rule behavioral1/files/0x0007000000015d42-99.dat upx behavioral1/memory/2772-103-0x0000000000400000-0x0000000000407000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\dtxservice.exe -atm" be2200f8a4cc7c28ff19270892118293.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dtxservice.exe be2200f8a4cc7c28ff19270892118293.exe File opened for modification C:\Windows\SysWOW64\dtxservice.exe be2200f8a4cc7c28ff19270892118293.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\ktd32.atm CRSS.EXE File opened for modification C:\Windows\ktd32.atm dtxservice.exe File created C:\Windows\fps.exe dtxservice.exe File created C:\Windows\mps.exe dtxservice.exe File created C:\Windows\icq.dll dtxservice.exe File created C:\Windows\kdd32.atm dtxservice.exe File created C:\Windows\mps.atm mps.exe File created C:\Windows\iss32.exe dtxservice.exe File created C:\Windows\CRSS.EXE dtxservice.exe File created C:\Windows\kt.atm dtxservice.exe File created C:\Windows\fps.atm fps.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2240 be2200f8a4cc7c28ff19270892118293.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2804 CRSS.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2732 2240 be2200f8a4cc7c28ff19270892118293.exe 28 PID 2240 wrote to memory of 2732 2240 be2200f8a4cc7c28ff19270892118293.exe 28 PID 2240 wrote to memory of 2732 2240 be2200f8a4cc7c28ff19270892118293.exe 28 PID 2240 wrote to memory of 2732 2240 be2200f8a4cc7c28ff19270892118293.exe 28 PID 2732 wrote to memory of 2456 2732 dtxservice.exe 29 PID 2732 wrote to memory of 2456 2732 dtxservice.exe 29 PID 2732 wrote to memory of 2456 2732 dtxservice.exe 29 PID 2732 wrote to memory of 2456 2732 dtxservice.exe 29 PID 2732 wrote to memory of 2968 2732 dtxservice.exe 30 PID 2732 wrote to memory of 2968 2732 dtxservice.exe 30 PID 2732 wrote to memory of 2968 2732 dtxservice.exe 30 PID 2732 wrote to memory of 2968 2732 dtxservice.exe 30 PID 2732 wrote to memory of 2772 2732 dtxservice.exe 31 PID 2732 wrote to memory of 2772 2732 dtxservice.exe 31 PID 2732 wrote to memory of 2772 2732 dtxservice.exe 31 PID 2732 wrote to memory of 2772 2732 dtxservice.exe 31 PID 2732 wrote to memory of 2804 2732 dtxservice.exe 32 PID 2732 wrote to memory of 2804 2732 dtxservice.exe 32 PID 2732 wrote to memory of 2804 2732 dtxservice.exe 32 PID 2732 wrote to memory of 2804 2732 dtxservice.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\be2200f8a4cc7c28ff19270892118293.exe"C:\Users\Admin\AppData\Local\Temp\be2200f8a4cc7c28ff19270892118293.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\dtxservice.exeC:\Windows\system32\dtxservice.exe -atm2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\fps.exeC:\Windows\fps.exe /stext C:\Windows\fps.atm3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2456
-
-
C:\Windows\mps.exeC:\Windows\mps.exe /stext C:\Windows\mps.atm3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2968
-
-
C:\Windows\iss32.exeC:\Windows\iss32.exe3⤵
- Executes dropped EXE
PID:2772
-
-
C:\Windows\CRSS.EXEC:\Windows\CRSS.EXE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5067c3c377e0346290862dc8791e81fb0
SHA19a4d3a6ad5fd102eb32a6f1229c80c15dc495409
SHA25618cbf1415419f9f27425cea06c32e9a2f041ec52a39d78d58922efbb698b9d76
SHA5120c0f0a1e4144accb97d159096cbd4003e77ca0ac792727002c2fe402dc12471a16e90ae3622f1f96d25a333af36a4dccbe80a6689bed080ba32e28dd845960aa
-
Filesize
14KB
MD516d0b87ea242e563ccbf13fbfc279915
SHA1a56a456b48f5318ca57cce4d75e2f0e3493850d4
SHA2561a4cef71598d42e1765c89fa5f0d91141e313c89d25418d7dc5e2b4b9bfc07aa
SHA512ee9b92a5c17bcf17812d18bb9f0e993537a9a1c1bb4938442aef9005046c4547be61380cf5cf01c7a710b07d5d0e116a4a8e8263d3ad73fef1e0c1de196f6cc0
-
Filesize
3KB
MD5d36a7e657fb830da92a59bccb67948a5
SHA1730d2499b9ffffa7a3e29b9f973728f2c9547827
SHA2560f855337f81800b5df27abd91f85c9a4187ac553e0a65b2a9719d5db1df08b39
SHA5120a24a2f87fcf35937520bde130862af7f40b3fcb29c8f09a197faa5e11a33b7db35b765b2494f719b28ef51060add5324aff441a825a3c87287fa64665e140c8
-
Filesize
8KB
MD551abb91f79fc8057f9ac61877fb480d5
SHA142790a05bb6cc05292977d70bf9ae60350aca1d7
SHA2566bd988e0c55f611e20ff740c76870dc892505725e9852580fe23bade1a8978fa
SHA5124b115ec069cecd082e72c5728aab8902ee018705ed9ad11731e47efd0f6d5d8e2412485d4713cb4ab20bfdd3d03f5919b2bb60a361af6ac69e7566a4fc015413
-
Filesize
29B
MD5d4d0a66ac4c1820c90f62f77099b547a
SHA1c8f96649ec9865804efc925472b931005925f3ff
SHA256997394c51fb18768bbb7a8e6cfe7bdec1efa0bdd82ed3507f3f1cc46ab459ff1
SHA5129ab9b7d786bdbd2e5bd596060930c64ee1496cbdf423bd283fbecee13501adeb149d4aa7290d410dd153a255ef6513e6a8356a88740efa4badb3190fb5388ebb
-
Filesize
17KB
MD54bad43105d4d557ae90d2f094e4bb833
SHA11d80ae0e7806c6cb2425131604373acb62ef8991
SHA256918d1c42a73d79c4296f8fe3683070803916df4f5a236e84aabf665215e266e2
SHA512278a11bb0fb2f17b91e1dc63d6b9a6376c332a41fdcedcd55d96b208b39b769e7edd1f41a614a80e24f409ba098a06b3da6848a6ab9ad0ff37e5154376ef681c
-
Filesize
624KB
MD5be2200f8a4cc7c28ff19270892118293
SHA1cfa00c4099caa993cbea984fc576f67e89134c92
SHA256d6afcce63997e5f072c32edcc0409fdcd3fe695468933c4e7271e9ddcf471ee5
SHA5123ab366dcdc803b724b250ba592e4d10c7c7cd327226609f13a442048c7dfd46a23c7a0a06a3c2bce036abf16d22826017b560e1e74e22ba5834bb54d763758e0