Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 23:45
Behavioral task
behavioral1
Sample
c9efdd0ee4aa9e56e8adcd9d6ad40837.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9efdd0ee4aa9e56e8adcd9d6ad40837.exe
Resource
win10v2004-20240226-en
General
-
Target
c9efdd0ee4aa9e56e8adcd9d6ad40837.exe
-
Size
309KB
-
MD5
c9efdd0ee4aa9e56e8adcd9d6ad40837
-
SHA1
e96de10714e9e69339d2629661923c4842c59e24
-
SHA256
28384587434989df15f8c74201ee3d29e10374c5c9646a070d2948d4ca94052f
-
SHA512
6233c1eb60c000ab0497da92e6513f47ffb58c211c37944bdb9e7014b3f8712b9b5666827cc595c718309c250a0765a625d7ebde9ea93dcddc01eb3106ef8342
-
SSDEEP
6144:o8ldhm4x6FxHwjstWzUtJnbfvWSKpQ+jOvYBTObn3w01oov0KAb:lldcGEHwYiaJzWMAOvyq51olKAb
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2488 .exe 2392 .exe 304 .exe -
Loads dropped DLL 4 IoCs
pid Process 2908 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 2908 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 2488 .exe 2392 .exe -
resource yara_rule behavioral1/memory/2332-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2908-10-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2908-12-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2908-14-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2908-19-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2332-20-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2908-21-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2908-22-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2908-24-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2908-25-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2908-29-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2908-32-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/files/0x000300000000b1f3-38.dat upx behavioral1/memory/2488-69-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2908-68-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2392-72-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2392-73-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2392-77-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/2392-87-0x0000000000390000-0x0000000000399000-memory.dmp upx behavioral1/memory/2392-91-0x0000000000400000-0x00000000004DD000-memory.dmp upx behavioral1/memory/304-93-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\TMP32$1.Nil c9efdd0ee4aa9e56e8adcd9d6ad40837.exe File created C:\Windows\SysWOW64\TMP32$26--- c9efdd0ee4aa9e56e8adcd9d6ad40837.exe File created C:\Windows\SysWOW64\TMP32$1.Nil .exe File created C:\Windows\SysWOW64\TMP32$26--- .exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2332 set thread context of 2908 2332 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 28 PID 2488 set thread context of 2392 2488 .exe 32 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier c9efdd0ee4aa9e56e8adcd9d6ad40837.exe Key opened \REGISTRY\MACHINE\hardware\DESCRIPTION\System\CentralProcessor\0 .exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier .exe Key opened \REGISTRY\MACHINE\hardware\DESCRIPTION\System\CentralProcessor\0 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2332 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 2488 .exe 304 .exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2908 2332 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 28 PID 2332 wrote to memory of 2908 2332 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 28 PID 2332 wrote to memory of 2908 2332 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 28 PID 2332 wrote to memory of 2908 2332 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 28 PID 2332 wrote to memory of 2908 2332 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 28 PID 2332 wrote to memory of 2908 2332 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 28 PID 2332 wrote to memory of 2908 2332 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 28 PID 2332 wrote to memory of 2908 2332 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 28 PID 2908 wrote to memory of 2488 2908 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 31 PID 2908 wrote to memory of 2488 2908 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 31 PID 2908 wrote to memory of 2488 2908 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 31 PID 2908 wrote to memory of 2488 2908 c9efdd0ee4aa9e56e8adcd9d6ad40837.exe 31 PID 2488 wrote to memory of 2392 2488 .exe 32 PID 2488 wrote to memory of 2392 2488 .exe 32 PID 2488 wrote to memory of 2392 2488 .exe 32 PID 2488 wrote to memory of 2392 2488 .exe 32 PID 2488 wrote to memory of 2392 2488 .exe 32 PID 2488 wrote to memory of 2392 2488 .exe 32 PID 2488 wrote to memory of 2392 2488 .exe 32 PID 2488 wrote to memory of 2392 2488 .exe 32 PID 2392 wrote to memory of 304 2392 .exe 33 PID 2392 wrote to memory of 304 2392 .exe 33 PID 2392 wrote to memory of 304 2392 .exe 33 PID 2392 wrote to memory of 304 2392 .exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9efdd0ee4aa9e56e8adcd9d6ad40837.exe"C:\Users\Admin\AppData\Local\Temp\c9efdd0ee4aa9e56e8adcd9d6ad40837.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\c9efdd0ee4aa9e56e8adcd9d6ad40837.exeC:\Users\Admin\AppData\Local\Temp\c9efdd0ee4aa9e56e8adcd9d6ad40837.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\.exe.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\.exeC:\Users\Admin\AppData\Local\Temp\.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\.exe.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5816bfd02f0b5e2cf41e57379d9812694
SHA1d84a9a9bdd03a95b55ae27a9d71b801651bd1405
SHA256533aaf7c4a429cd6cfd89287bdc1f8acad603c5b44164798d1cde0cba468fce1
SHA512064c90614a50e9df684d200afbbd206d2a819324e2ce641d34404a0d11613dd721879d8907239f763eb095c04609ed5199fd3279a1b79245de23bf16f65540e6
-
Filesize
309KB
MD5c9efdd0ee4aa9e56e8adcd9d6ad40837
SHA1e96de10714e9e69339d2629661923c4842c59e24
SHA25628384587434989df15f8c74201ee3d29e10374c5c9646a070d2948d4ca94052f
SHA5126233c1eb60c000ab0497da92e6513f47ffb58c211c37944bdb9e7014b3f8712b9b5666827cc595c718309c250a0765a625d7ebde9ea93dcddc01eb3106ef8342