Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
deff716a2284199464e649d3fa74bfd9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
deff716a2284199464e649d3fa74bfd9.exe
Resource
win10v2004-20240319-en
General
-
Target
deff716a2284199464e649d3fa74bfd9.exe
-
Size
38KB
-
MD5
deff716a2284199464e649d3fa74bfd9
-
SHA1
a4b20c725712eabf9f38ff6aba9a1cf262023e72
-
SHA256
aad87ee6abdc9ede1045813afc28c0fa1d8861cf2f4c1be51e4249f14c1accba
-
SHA512
65232dd68a8de6ec0f64aaa0f1d7bdf3708d7f7c053a7ee0d3b090388bfe344f456d3d14d866390bbe2c1ac52f41aeb29fed121e0ce64b6647a3ef0b0ecdf93a
-
SSDEEP
768:jerqpYJgAFVaqlkeDfCzNEMrkJX77A8w9afaLJWAE1:qJn8Phz4V/fakAE1
Malware Config
Signatures
-
Manipulates Digital Signatures 1 TTPs 9 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0\dcikpcfhalmblomhkcfcebnnefiledge fanbgjbfcakcbdaakendohofboodkibe = "live video" msevnt.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0\eepelkjedknhdppomifbalcigephpbhm oogiceeppfaakkobpghaaieajbbklmeb = "Proclaim Telcom, Inc." msevnt.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0\dcikpcfhalmblomhkcfcebnnefiledge iincedonfjiflkfielipkccnibngjpam = "live cams" msevnt.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0\eepelkjedknhdppomifbalcigephpbhm oogiceeppfaakkobpghaaieajbbklmeb = "Proclaim Telcom, Inc." deff716a2284199464e649d3fa74bfd9.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0\eepelkjedknhdppomifbalcigephpbhm oogiceeppfaakkobpghaaieajbbklmeb = "Proclaim Telcom, Inc." msevnt.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0\dcikpcfhalmblomhkcfcebnnefiledge iincedonfjiflkfielipkccnibngjpam = "live cams" msevnt.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0\dcikpcfhalmblomhkcfcebnnefiledge fanbgjbfcakcbdaakendohofboodkibe = "live video" msevnt.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0\dcikpcfhalmblomhkcfcebnnefiledge fanbgjbfcakcbdaakendohofboodkibe = "live video" deff716a2284199464e649d3fa74bfd9.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0\dcikpcfhalmblomhkcfcebnnefiledge iincedonfjiflkfielipkccnibngjpam = "live cams" deff716a2284199464e649d3fa74bfd9.exe -
Deletes itself 1 IoCs
pid Process 1532 msevnt.exe -
Executes dropped EXE 2 IoCs
pid Process 1532 msevnt.exe 2556 msevnt.exe -
Loads dropped DLL 6 IoCs
pid Process 2772 deff716a2284199464e649d3fa74bfd9.exe 2772 deff716a2284199464e649d3fa74bfd9.exe 1532 msevnt.exe 1532 msevnt.exe 1532 msevnt.exe 1532 msevnt.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msevnt = "c:\\windows\\system32\\msevnt.exe /nocomm" deff716a2284199464e649d3fa74bfd9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msevnt = "c:\\windows\\system32\\msevnt.exe /nocomm" msevnt.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\msevnt.exe deff716a2284199464e649d3fa74bfd9.exe File created \??\c:\windows\SysWOW64\msevnt.exe deff716a2284199464e649d3fa74bfd9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2772 wrote to memory of 1532 2772 deff716a2284199464e649d3fa74bfd9.exe 28 PID 2772 wrote to memory of 1532 2772 deff716a2284199464e649d3fa74bfd9.exe 28 PID 2772 wrote to memory of 1532 2772 deff716a2284199464e649d3fa74bfd9.exe 28 PID 2772 wrote to memory of 1532 2772 deff716a2284199464e649d3fa74bfd9.exe 28 PID 1532 wrote to memory of 2556 1532 msevnt.exe 29 PID 1532 wrote to memory of 2556 1532 msevnt.exe 29 PID 1532 wrote to memory of 2556 1532 msevnt.exe 29 PID 1532 wrote to memory of 2556 1532 msevnt.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\deff716a2284199464e649d3fa74bfd9.exe"C:\Users\Admin\AppData\Local\Temp\deff716a2284199464e649d3fa74bfd9.exe"1⤵
- Manipulates Digital Signatures
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\windows\SysWOW64\msevnt.exe"C:\windows\system32\msevnt.exe" -kill c:\users\admin\appdata\local\temp\deff716a2284199464e649d3fa74bfd9.exe /install2⤵
- Manipulates Digital Signatures
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\windows\SysWOW64\msevnt.exe"C:\windows\system32\msevnt.exe" -kill c:\windows\syswow64\msevnt.exe /install /install3⤵
- Manipulates Digital Signatures
- Executes dropped EXE
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5deff716a2284199464e649d3fa74bfd9
SHA1a4b20c725712eabf9f38ff6aba9a1cf262023e72
SHA256aad87ee6abdc9ede1045813afc28c0fa1d8861cf2f4c1be51e4249f14c1accba
SHA51265232dd68a8de6ec0f64aaa0f1d7bdf3708d7f7c053a7ee0d3b090388bfe344f456d3d14d866390bbe2c1ac52f41aeb29fed121e0ce64b6647a3ef0b0ecdf93a