Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
c7852339c20c297a02691e6b16cb69c7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7852339c20c297a02691e6b16cb69c7.exe
Resource
win10v2004-20240226-en
General
-
Target
c7852339c20c297a02691e6b16cb69c7.exe
-
Size
152KB
-
MD5
c7852339c20c297a02691e6b16cb69c7
-
SHA1
a04bc6ca673f8cc43ff5802ec1f158e4bb1fae62
-
SHA256
7eee944a5319a78072ce6ae2f76b5581a0e10abd8656002827eb247dbcfe9e5d
-
SHA512
7f4cca5f39918818da5443bebb61dbc73266e7130ab748e5c0e467299ea080d88d28709b88129cc723376e05aed533c9d0ca709a8b22fec8a50d7047d6fa1fde
-
SSDEEP
3072:Xr30nVYoE4weBRoIt/BJg2icxOrBa5XJX9JndT5ql:b4nBDt/BJRic4rgpJXvnd
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 1952 c7852339c20c297a02691e6b16cb69c7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 3036 regedit.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe 1952 c7852339c20c297a02691e6b16cb69c7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2632 1952 c7852339c20c297a02691e6b16cb69c7.exe 28 PID 1952 wrote to memory of 2632 1952 c7852339c20c297a02691e6b16cb69c7.exe 28 PID 1952 wrote to memory of 2632 1952 c7852339c20c297a02691e6b16cb69c7.exe 28 PID 1952 wrote to memory of 2632 1952 c7852339c20c297a02691e6b16cb69c7.exe 28 PID 2632 wrote to memory of 3036 2632 regedt32.exe 29 PID 2632 wrote to memory of 3036 2632 regedt32.exe 29 PID 2632 wrote to memory of 3036 2632 regedt32.exe 29 PID 2632 wrote to memory of 3036 2632 regedt32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7852339c20c297a02691e6b16cb69c7.exe"C:\Users\Admin\AppData\Local\Temp\c7852339c20c297a02691e6b16cb69c7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\regedt32.exe"C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"2⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"3⤵
- Runs .reg file with regedit
PID:3036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD598edae8c8480ba90a69a2b4a44355cf2
SHA18e66a262318c5eff48ab324709ab58d184a17f24
SHA25670264e987f775c94bf73f30c046ec33ec686add3c61515a6f48c76800a6bd2a7
SHA512d8e94c5d271b87b7d8f3590bc05ab601f39f46ed99966d5460e4a20f8880fbfb95f9ff2239cfca315a61782e8b2e55317c5a3572eb63f03f8c283466f19beaea
-
Filesize
41KB
MD588618d48774cc6c82a1d633e886ca4d1
SHA1df2de6fcc9609be6594491cd213c4cbcad1c1265
SHA256c54ce4eae95902973eafa76dbcb0a3c6bf48456e46126cd00400c986ea2932e2
SHA5121182930584e6d4fd32ac5423e9a6f3dab63c32c5a3220debb5354ac73a8e2119c2b6e874a6da0326fd402ce69cd83f6c3839e8f033be0f4252aaada50c38029a