Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
d50c00059b8bada7635aad724b3b8c49.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d50c00059b8bada7635aad724b3b8c49.exe
Resource
win10v2004-20240226-en
General
-
Target
d50c00059b8bada7635aad724b3b8c49.exe
-
Size
745KB
-
MD5
d50c00059b8bada7635aad724b3b8c49
-
SHA1
1d576fd7022e759bdde03f3ae6aa00de142d7b63
-
SHA256
a431746fedbcd0dbed704d4719cffc22e7fc1834092eb065c432f5c0f520a95b
-
SHA512
49fcc4ad732082a13546948433fed1651e1be56974969c11336009b0fc9c8648d6d83b357b906d3252e85135cfa44c14fa7e99c5e7777d39850d8103c4e32c7e
-
SSDEEP
12288:MBB4Ylaiu43KZsQ32VYHim7Y4clQ2VgqWNCT94fficFvoOHeyNqWPTVfE+D:isd4pQGmCm7+asg9ffjb+WPpc
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2196 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Print = "C:\\Windows\\system32\\Printer.scr" d50c00059b8bada7635aad724b3b8c49.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 384 d50c00059b8bada7635aad724b3b8c49.exe 384 d50c00059b8bada7635aad724b3b8c49.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 384 wrote to memory of 2196 384 d50c00059b8bada7635aad724b3b8c49.exe 28 PID 384 wrote to memory of 2196 384 d50c00059b8bada7635aad724b3b8c49.exe 28 PID 384 wrote to memory of 2196 384 d50c00059b8bada7635aad724b3b8c49.exe 28 PID 384 wrote to memory of 2196 384 d50c00059b8bada7635aad724b3b8c49.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d50c00059b8bada7635aad724b3b8c49.exe"C:\Users\Admin\AppData\Local\Temp\d50c00059b8bada7635aad724b3b8c49.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\windows\system32\Printer.scr Ftp..2⤵
- Modifies Windows Firewall
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1