Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
cd02ec9d4f2de7e1db1a9f78624eda10.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cd02ec9d4f2de7e1db1a9f78624eda10.exe
Resource
win10v2004-20240226-en
General
-
Target
cd02ec9d4f2de7e1db1a9f78624eda10.exe
-
Size
8KB
-
MD5
cd02ec9d4f2de7e1db1a9f78624eda10
-
SHA1
b9d1c848eb3314bdee88f784c620e24c6c6912c5
-
SHA256
bd28b9719c3a2c7618f0f2c81d8d11bc706f4ead27c680bea9cbc68c41a042b7
-
SHA512
67432a73414d906bcb4021abe639276640a452a1bafedf51860a59a1b84ca69a4076e7bbfb9a61ecc932c2bb65f31d834602a760e7689ca39c0c3fd27b16f518
-
SSDEEP
192:If/ImmYQ33G9Q/vBx/cFU4fXPfMbeHuLMOK23e/I3rOttXi0:IfgtYQ35FcFU4jZb23GI7w97
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 dnswatch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DNS Resolver = "C:\\Windows\\dnswatch.exe" cd02ec9d4f2de7e1db1a9f78624eda10.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\sysdebg32.dll cd02ec9d4f2de7e1db1a9f78624eda10.exe File created C:\Windows\sysdebg32.dll cd02ec9d4f2de7e1db1a9f78624eda10.exe File opened for modification C:\Windows\sysdbg32w.dat dnswatch.exe File created C:\Windows\sysdbg32z.dat dnswatch.exe File opened for modification C:\Windows\dnswatch.exe cd02ec9d4f2de7e1db1a9f78624eda10.exe File created C:\Windows\dnswatch.exe cd02ec9d4f2de7e1db1a9f78624eda10.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 dnswatch.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2796 2912 cd02ec9d4f2de7e1db1a9f78624eda10.exe 28 PID 2912 wrote to memory of 2796 2912 cd02ec9d4f2de7e1db1a9f78624eda10.exe 28 PID 2912 wrote to memory of 2796 2912 cd02ec9d4f2de7e1db1a9f78624eda10.exe 28 PID 2912 wrote to memory of 2796 2912 cd02ec9d4f2de7e1db1a9f78624eda10.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd02ec9d4f2de7e1db1a9f78624eda10.exe"C:\Users\Admin\AppData\Local\Temp\cd02ec9d4f2de7e1db1a9f78624eda10.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\dnswatch.exe"C:\Windows\dnswatch.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5cd02ec9d4f2de7e1db1a9f78624eda10
SHA1b9d1c848eb3314bdee88f784c620e24c6c6912c5
SHA256bd28b9719c3a2c7618f0f2c81d8d11bc706f4ead27c680bea9cbc68c41a042b7
SHA51267432a73414d906bcb4021abe639276640a452a1bafedf51860a59a1b84ca69a4076e7bbfb9a61ecc932c2bb65f31d834602a760e7689ca39c0c3fd27b16f518
-
Filesize
3KB
MD527289e9380e6ae8303cbe7bc2a141885
SHA1caa81fb370217a0b9a669fc9e7dcb83bbbb7a357
SHA2568d27c8629d41fb774458a2bb8bb3beb8ed470746689da3e414740c96d246294f
SHA512d971817a366cc5621502b0055db4465f516ba0121637da2500b04618d5cabc3ded2bb449fc3ec58850ba3e27a0547746395ef7afb5e3ce4664aa46ee114342c5