Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
d39de5973189eb4d0c884dfaa103597a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d39de5973189eb4d0c884dfaa103597a.exe
Resource
win10v2004-20240226-en
General
-
Target
d39de5973189eb4d0c884dfaa103597a.exe
-
Size
160KB
-
MD5
d39de5973189eb4d0c884dfaa103597a
-
SHA1
625766dd30fb1e2a077ca7c15b0f74de1dc5556c
-
SHA256
7277fc173a65e84426217ea49d790b19b5b5d8a3f24be2acca4f4e6a1635858e
-
SHA512
e99b39ad04ef89c68e7692aa9bfc2a90364b6d7f3bb2e3fa35924158256d85cab2971706220f6263fd21c668ade39a7c82043ee33d445826fb1b161067e28a1e
-
SSDEEP
3072:Zghg8Sn4dnbla5eree+ELWqqdSTvC6HWYppiAKNWlpt7ryfrb0l3icB6Cb:Zwq4Rl+erlRLcd5626pDX3BOzIl3icVb
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2528 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 0b91ef20.exe -
Loads dropped DLL 2 IoCs
pid Process 2584 d39de5973189eb4d0c884dfaa103597a.exe 2584 d39de5973189eb4d0c884dfaa103597a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\icfgnt532 = "rundll32.exe icfgnt532.dll,ojur" d39de5973189eb4d0c884dfaa103597a.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\0c25eba5.dll d39de5973189eb4d0c884dfaa103597a.exe File opened for modification C:\Windows\SysWOW64\0c25eba5.dll d39de5973189eb4d0c884dfaa103597a.exe File created C:\Windows\SysWOW64\2f4e72ed.dll d39de5973189eb4d0c884dfaa103597a.exe File opened for modification C:\Windows\SysWOW64\2f4e72ed.dll d39de5973189eb4d0c884dfaa103597a.exe File created C:\Windows\SysWOW64\icfgnt532.dll d39de5973189eb4d0c884dfaa103597a.exe File opened for modification C:\Windows\SysWOW64\icfgnt532.dll d39de5973189eb4d0c884dfaa103597a.exe File created C:\Windows\SysWOW64\d95f9d4e.dll d39de5973189eb4d0c884dfaa103597a.exe File opened for modification C:\Windows\SysWOW64\d95f9d4e.dll d39de5973189eb4d0c884dfaa103597a.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2612 sc.exe 2056 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2612 2584 d39de5973189eb4d0c884dfaa103597a.exe 28 PID 2584 wrote to memory of 2612 2584 d39de5973189eb4d0c884dfaa103597a.exe 28 PID 2584 wrote to memory of 2612 2584 d39de5973189eb4d0c884dfaa103597a.exe 28 PID 2584 wrote to memory of 2612 2584 d39de5973189eb4d0c884dfaa103597a.exe 28 PID 2584 wrote to memory of 2056 2584 d39de5973189eb4d0c884dfaa103597a.exe 30 PID 2584 wrote to memory of 2056 2584 d39de5973189eb4d0c884dfaa103597a.exe 30 PID 2584 wrote to memory of 2056 2584 d39de5973189eb4d0c884dfaa103597a.exe 30 PID 2584 wrote to memory of 2056 2584 d39de5973189eb4d0c884dfaa103597a.exe 30 PID 2584 wrote to memory of 2528 2584 d39de5973189eb4d0c884dfaa103597a.exe 32 PID 2584 wrote to memory of 2528 2584 d39de5973189eb4d0c884dfaa103597a.exe 32 PID 2584 wrote to memory of 2528 2584 d39de5973189eb4d0c884dfaa103597a.exe 32 PID 2584 wrote to memory of 2528 2584 d39de5973189eb4d0c884dfaa103597a.exe 32 PID 2584 wrote to memory of 2992 2584 d39de5973189eb4d0c884dfaa103597a.exe 34 PID 2584 wrote to memory of 2992 2584 d39de5973189eb4d0c884dfaa103597a.exe 34 PID 2584 wrote to memory of 2992 2584 d39de5973189eb4d0c884dfaa103597a.exe 34 PID 2584 wrote to memory of 2992 2584 d39de5973189eb4d0c884dfaa103597a.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d39de5973189eb4d0c884dfaa103597a.exe"C:\Users\Admin\AppData\Local\Temp\d39de5973189eb4d0c884dfaa103597a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create icfgnt532 type= share start= auto DisplayName= "Internet Connection Wizard" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\icfgnt532.dll,ojur"2⤵
- Launches sc.exe
PID:2612
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description icfgnt532 "Internet Connection Wizard"2⤵
- Launches sc.exe
PID:2056
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe firewall add portopening TCP 1648 messenger2⤵
- Modifies Windows Firewall
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\0b91ef20.exe"C:\Users\Admin\AppData\Local\Temp\0b91ef20.exe"2⤵
- Executes dropped EXE
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ab437ad2ca17aecbccbb582a9b426975
SHA168a333a6b8746bdc8f13d3e6bae11dfeb782706b
SHA2567d408f3a3197c7dc7a6ca0f6360c6102899019e2ddb222450539807b11437a6e
SHA5122e7feb013ea7a6105b7fa8b2040d47d14e06197aead6cae30a965f311863fdae4e58837579a6b6d4343450d59ea51c619f2cb5ae6cf88f2b5eb0857fc64f2dd9