Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe
Resource
win10v2004-20240226-en
General
-
Target
442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe
-
Size
30KB
-
MD5
8a648b886e5defae42964b0a7e30d20b
-
SHA1
53c78a76e49f4db374cbf0a47e5cc121d92cd118
-
SHA256
442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79
-
SHA512
1fff1b90153d220eb73685361f54564737a865874fc43e4306b8c94c8ba4b0c3b7aa5b6f2df45fd2b2bce43c136e429e6354eb82e85c2c6d41e402a4c0e11d37
-
SSDEEP
768:qZL/0F24lercjO4sTZg5ZLvn2IuWZ0kqKNPWQHpt:OLsF2Kerc64sTiX2IV0Dhut
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2696 WINWORD.exe 2868 WINWORD.exe -
Loads dropped DLL 4 IoCs
pid Process 2176 442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe 2176 442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe 2628 cmd.exe 2628 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\WINWORD = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\WINWORD.exe -r" WINWORD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2812 PING.EXE 2672 PING.EXE 2580 PING.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2696 2176 442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe 28 PID 2176 wrote to memory of 2696 2176 442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe 28 PID 2176 wrote to memory of 2696 2176 442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe 28 PID 2176 wrote to memory of 2696 2176 442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe 28 PID 2696 wrote to memory of 2628 2696 WINWORD.exe 29 PID 2696 wrote to memory of 2628 2696 WINWORD.exe 29 PID 2696 wrote to memory of 2628 2696 WINWORD.exe 29 PID 2696 wrote to memory of 2628 2696 WINWORD.exe 29 PID 2628 wrote to memory of 2812 2628 cmd.exe 31 PID 2628 wrote to memory of 2812 2628 cmd.exe 31 PID 2628 wrote to memory of 2812 2628 cmd.exe 31 PID 2628 wrote to memory of 2812 2628 cmd.exe 31 PID 2628 wrote to memory of 2672 2628 cmd.exe 32 PID 2628 wrote to memory of 2672 2628 cmd.exe 32 PID 2628 wrote to memory of 2672 2628 cmd.exe 32 PID 2628 wrote to memory of 2672 2628 cmd.exe 32 PID 2628 wrote to memory of 2580 2628 cmd.exe 33 PID 2628 wrote to memory of 2580 2628 cmd.exe 33 PID 2628 wrote to memory of 2580 2628 cmd.exe 33 PID 2628 wrote to memory of 2580 2628 cmd.exe 33 PID 2628 wrote to memory of 2868 2628 cmd.exe 34 PID 2628 wrote to memory of 2868 2628 cmd.exe 34 PID 2628 wrote to memory of 2868 2628 cmd.exe 34 PID 2628 wrote to memory of 2868 2628 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe"C:\Users\Admin\AppData\Local\Temp\442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" -r2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 2&del "C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"&ping 127.0.0.1 -n 2&rename "C:\Users\Admin\AppData\Roaming\Mozilla\00007F0F" WINWORD.exe&ping 127.0.0.1 -n 2&"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2812
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2672
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:2580
-
-
C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe"C:\Users\Admin\AppData\Roaming\Mozilla\WINWORD.exe" \r4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2868
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD547c8c2c790d4842a180aeaff0f7d758c
SHA1aa3ed44ab472d8f64ba80e604d5c2330341bd0bb
SHA256e640d5f50ff95c467dcec39c2f4bcaf2528d37d0375c960ea12bdbfe93352f5c
SHA51225ae0ed8e92b2e68e17a797c7d4fd5239b7441088c085a8fb2c03888c637d1c67345a2342358ace4a61dea92809d9e6dead605c102637407f483b20b0dddf216
-
Filesize
30KB
MD58a648b886e5defae42964b0a7e30d20b
SHA153c78a76e49f4db374cbf0a47e5cc121d92cd118
SHA256442f89554ded824b48b9612e0f5b6a01dadc3a11f5d83cbb4cc7b752f3c91b79
SHA5121fff1b90153d220eb73685361f54564737a865874fc43e4306b8c94c8ba4b0c3b7aa5b6f2df45fd2b2bce43c136e429e6354eb82e85c2c6d41e402a4c0e11d37