Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
ca778c6e3dcf8e49b07560af6d71ab9e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca778c6e3dcf8e49b07560af6d71ab9e.exe
Resource
win10v2004-20240226-en
General
-
Target
ca778c6e3dcf8e49b07560af6d71ab9e.exe
-
Size
2.3MB
-
MD5
ca778c6e3dcf8e49b07560af6d71ab9e
-
SHA1
0efcd3af122e8fe144259b9ee46ae46ae3fb66c1
-
SHA256
bff258915709665ae20a2a232238c39e514c0ecffb7747b00c8a06188d82ee5e
-
SHA512
d4ea9a531f5092c99e5744e7563da4efa42add67cf375d9aa7246689a1164dc1011a5528d0531fdeda11006e6b3543251bfab6c0cafffaa8590fa4df03eb9ac7
-
SSDEEP
24576:+7QFRUm/rCYAj8pXU+Cz/R/rCYAj8pXU+CrYAj8pXuAj8pXU+Cz/R/yYAj8pXU+s:EQFRHrmQG+ydrmQG+KQLQG+yd2QG+s
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2512 dwsn.exe -
Loads dropped DLL 2 IoCs
pid Process 2240 ca778c6e3dcf8e49b07560af6d71ab9e.exe 2240 ca778c6e3dcf8e49b07560af6d71ab9e.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main dwsn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 dwsn.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2512 dwsn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2512 dwsn.exe 2512 dwsn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2512 2240 ca778c6e3dcf8e49b07560af6d71ab9e.exe 28 PID 2240 wrote to memory of 2512 2240 ca778c6e3dcf8e49b07560af6d71ab9e.exe 28 PID 2240 wrote to memory of 2512 2240 ca778c6e3dcf8e49b07560af6d71ab9e.exe 28 PID 2240 wrote to memory of 2512 2240 ca778c6e3dcf8e49b07560af6d71ab9e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca778c6e3dcf8e49b07560af6d71ab9e.exe"C:\Users\Admin\AppData\Local\Temp\ca778c6e3dcf8e49b07560af6d71ab9e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\dwsn.exeC:\Users\Admin\AppData\Local\Temp\dwsn.exe -run C:\Users\Admin\AppData\Local\Temp\ca778c6e3dcf8e49b07560af6d71ab9e.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD51eaaf43c7de6202d3cdfdf40cc717d2a
SHA10a6a940345221e28d566d4cbe2b49f0cda49aa41
SHA256b2ddee52dd2d6aed12984daa58805aa870272abdd556f87143dccd2d808820cc
SHA512054b68cd8609d6dcd01fa37b9626479d88bfa362d75266e998ffe6b223ed232e22890c81ea3900970435af69f2d2d9ff9ad276517c45303c5194ceb836aba40f