Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
c58715637ad798caaf07dcb2656e3ebe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c58715637ad798caaf07dcb2656e3ebe.exe
Resource
win10v2004-20240226-en
General
-
Target
c58715637ad798caaf07dcb2656e3ebe.exe
-
Size
22KB
-
MD5
c58715637ad798caaf07dcb2656e3ebe
-
SHA1
252126360690e7711e4087913d53a66aba17d604
-
SHA256
7d00e776beae8174766c0f23eb6ffd45be9a1a363f9e99d8730d3fa124c7da5e
-
SHA512
993080d3cea005aa6c6cdd64f3efdcfb93dfda48b608da234dff5dd46990f244275eba1b9782e4767c2e80bd5511f4dd7374ba292c3e33ee640b3caf6d346904
-
SSDEEP
384:AX3yCe0wo1uEIAEIFB2SEnApeUT1ATeZKKGo9LBrRBVbOeQw9wqS7AGKha:UEJBAEIFBbENI1Ay0K1BBrrhTwqoKh
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts c58715637ad798caaf07dcb2656e3ebe.exe -
Executes dropped EXE 1 IoCs
pid Process 1580 ntsys.exe -
Loads dropped DLL 1 IoCs
pid Process 1580 ntsys.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\ntsys.exe c58715637ad798caaf07dcb2656e3ebe.exe File created C:\Windows\ntkros.dll c58715637ad798caaf07dcb2656e3ebe.exe File opened for modification C:\Windows\ntsys.exe c58715637ad798caaf07dcb2656e3ebe.exe File opened for modification C:\Windows\ntkros.dll c58715637ad798caaf07dcb2656e3ebe.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3652 1760 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 c58715637ad798caaf07dcb2656e3ebe.exe 1760 c58715637ad798caaf07dcb2656e3ebe.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe 1580 ntsys.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1580 1760 c58715637ad798caaf07dcb2656e3ebe.exe 87 PID 1760 wrote to memory of 1580 1760 c58715637ad798caaf07dcb2656e3ebe.exe 87 PID 1760 wrote to memory of 1580 1760 c58715637ad798caaf07dcb2656e3ebe.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c58715637ad798caaf07dcb2656e3ebe.exe"C:\Users\Admin\AppData\Local\Temp\c58715637ad798caaf07dcb2656e3ebe.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\ntsys.exe"C:\Windows\ntsys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 4842⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1760 -ip 17601⤵PID:3932
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD57d603dfd94f1d38d647c497d7dce4747
SHA15356cd4dc1efba6c131c3082f6b61febe8662823
SHA2562c773572da1f373f5cc427ce95fb50200b168264849ad80d8a39b2b8df50ca01
SHA51289e0c204a3ffb37ff0c9e73f2564a05e197d50d5024f1b6a0981c8bbcfa888cc1b44cf4dfe8f8f33edb3e25dd8c22d1abeab46468ee6e1d601b190372aadb78c
-
Filesize
7KB
MD5820232ceadafae815dfeb18359297be4
SHA1c86e4192a183f26ffba6460b8806409f4140f537
SHA2568f1fe4437ead74dd2f3e4aad99e3645b91441fda7ed04b44325ec7b9af032068
SHA512c843e1425dc7c33991a958518a9dd365aeed5381617aa943d4e4a321c73c8d459fea702c81a946404e0957749b5acc7c84a322e1b1e6e74cd91f1fc316fa62f4