Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
cb68a628b41c887f1d5cdac00d2d43a9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb68a628b41c887f1d5cdac00d2d43a9.exe
Resource
win10v2004-20240226-en
General
-
Target
cb68a628b41c887f1d5cdac00d2d43a9.exe
-
Size
9KB
-
MD5
cb68a628b41c887f1d5cdac00d2d43a9
-
SHA1
e9cc8d9432f757597bb42c3a7cb7653db10c17c3
-
SHA256
cdab1bbe69df6b327ed1d5662e90a35f51c3830dbd21f9e3f70da1a4d2d05b93
-
SHA512
8abd0536b3b389cad3f501a6145bfff1edf680165cc55b2fd818f6ef4928b66c24ef30763b2c4761cacb8acf741cf32e1005dd70840bf220ba0e6dd8ae4fc4c9
-
SSDEEP
192:5uyEnhtr+2pr/ZZtdxKfV32wrUX5tjwGPz95dmGirHuqYJa3:5u/dbZZUf1oLzp5JirTei
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\midimapjr = "{4F4F0064-71E0-4f0d-0012-708476C7815F}" cb68a628b41c887f1d5cdac00d2d43a9.exe -
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2276 cb68a628b41c887f1d5cdac00d2d43a9.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\midimapjr.tmp cb68a628b41c887f1d5cdac00d2d43a9.exe File opened for modification C:\Windows\SysWOW64\midimapjr.tmp cb68a628b41c887f1d5cdac00d2d43a9.exe File opened for modification C:\Windows\SysWOW64\midimapjr.dat cb68a628b41c887f1d5cdac00d2d43a9.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0012-708476C7815F}\InProcServer32 cb68a628b41c887f1d5cdac00d2d43a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0012-708476C7815F}\InProcServer32\ = "C:\\Windows\\SysWow64\\midimapjr.dll" cb68a628b41c887f1d5cdac00d2d43a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0012-708476C7815F}\InProcServer32\ThreadingModel = "Apartment" cb68a628b41c887f1d5cdac00d2d43a9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0012-708476C7815F} cb68a628b41c887f1d5cdac00d2d43a9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2276 cb68a628b41c887f1d5cdac00d2d43a9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2276 cb68a628b41c887f1d5cdac00d2d43a9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2576 2276 cb68a628b41c887f1d5cdac00d2d43a9.exe 28 PID 2276 wrote to memory of 2576 2276 cb68a628b41c887f1d5cdac00d2d43a9.exe 28 PID 2276 wrote to memory of 2576 2276 cb68a628b41c887f1d5cdac00d2d43a9.exe 28 PID 2276 wrote to memory of 2576 2276 cb68a628b41c887f1d5cdac00d2d43a9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb68a628b41c887f1d5cdac00d2d43a9.exe"C:\Users\Admin\AppData\Local\Temp\cb68a628b41c887f1d5cdac00d2d43a9.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1822.tmp.bat2⤵
- Deletes itself
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5cf23de1821586493735711cc013e6443
SHA101deaeb999dc2a9ddf58e8e870459de62727204e
SHA25606eef7239dfa77c6b3d0afaf4dfec12832a82b3c2a00c5d9f0570e1545daecde
SHA5123439633b6fcd453f3d83d700899d6aaaa9911f1ffd08a6065403bffcfe9c57012e626a306e01c96f386e9545bf5a290e739ac2aec28fb5d2fa79681974f14e29
-
Filesize
1.0MB
MD51869f5eeff8b571b7fd7361c3b1dcb9c
SHA12f8107abb2e1ea2bfa0c30e45a2d4748f67d12cd
SHA256291b5280fcf384878331b4e1c8e2df23127afe7968ab901c918e13d66c040fa2
SHA5126a5b5ef925eaeae2e8943d89e410ccf234aeb7ab2f95e99d9f05ba809460a7cc6bcf4b67a7e61cfd1a605789033d4f7a9d9aee63259aba2c19f4eb8103ce7dd5