Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
bf7e052ab31d773942b1ded15520c7f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf7e052ab31d773942b1ded15520c7f3.exe
Resource
win10v2004-20240226-en
General
-
Target
bf7e052ab31d773942b1ded15520c7f3.exe
-
Size
24KB
-
MD5
bf7e052ab31d773942b1ded15520c7f3
-
SHA1
ba2f288a9bc50f16d25421a0dcf629758ca52a25
-
SHA256
e77160fbf8a1b25edfb2d235127162f0de19fd30af4c136d220fe674b002b544
-
SHA512
d24cf454a5dd878249e2d04d6df6852d1399328cb48ba7b74410d5acc155b65de6599c295322a38e816ef0bbbf0065021374315ce5e8b7c5d1ff17f58449a34f
-
SSDEEP
384:ZLIR145WA+rS/EsMmRBtKyu9kw+CBY4TmbLJNcdrnYh8TPzdfeOKmE/AhWcu:Jh9Z/v5BLTOqlNsrnuCPzFeOK1Awc
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run bf7e052ab31d773942b1ded15520c7f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\rare = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bf7e052ab31d773942b1ded15520c7f3.exe" bf7e052ab31d773942b1ded15520c7f3.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 imsmn.exe -
Loads dropped DLL 2 IoCs
pid Process 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe -
resource yara_rule behavioral1/memory/2956-3-0x0000000000450000-0x0000000000458000-memory.dmp upx behavioral1/files/0x0008000000012254-7.dat upx behavioral1/memory/2988-10-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe 2988 imsmn.exe 2956 bf7e052ab31d773942b1ded15520c7f3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2988 2956 bf7e052ab31d773942b1ded15520c7f3.exe 28 PID 2956 wrote to memory of 2988 2956 bf7e052ab31d773942b1ded15520c7f3.exe 28 PID 2956 wrote to memory of 2988 2956 bf7e052ab31d773942b1ded15520c7f3.exe 28 PID 2956 wrote to memory of 2988 2956 bf7e052ab31d773942b1ded15520c7f3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7e052ab31d773942b1ded15520c7f3.exe"C:\Users\Admin\AppData\Local\Temp\bf7e052ab31d773942b1ded15520c7f3.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\imsmn.exeC:\Users\Admin\AppData\Local\Temp\imsmn.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d03b25f1662a26d6922e6d24828cd509
SHA17d3c8e5c4ade92e6d692a63a2fc8b56089dc6193
SHA256f34dc3e7292f569c454bc492c9bf3e19c3cb4650dc2397b6437367facb2e39dd
SHA51269cff54d7f0f48a28a0f338d47ec6a599d83968972983a778577bedd7d830a831ad6adb29ad000c63d94d9ae625e74555bfb45c1d257aceb3d44be1814c82d8d