Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
e15203ec4f6d0c1755d999aa31daed2c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e15203ec4f6d0c1755d999aa31daed2c.exe
Resource
win10v2004-20240226-en
General
-
Target
e15203ec4f6d0c1755d999aa31daed2c.exe
-
Size
30KB
-
MD5
e15203ec4f6d0c1755d999aa31daed2c
-
SHA1
4f5d35bd747732c45b0780e3175518fa40bc967a
-
SHA256
dfb5b62bba78bc765abe118b5ad37ed6215d62dc4e5697daf7c62314ce3920bc
-
SHA512
335cf80193b1f5a73782c33e3593e289567087e92a2ea6df87c42bcd7d3162becc35fc382e6ce62dd16f5257edfbd5115d0f3a9c20a3e48a4e126e9f34df8733
-
SSDEEP
768:jCHmSjdOj9BPoczaNPOwYtiW0YQw8LPO9gTRnn8C:2HCBQJVpYQZLPO9Cn8C
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List msconfig.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe -
Executes dropped EXE 1 IoCs
pid Process 1352 msconfig.exe -
Loads dropped DLL 2 IoCs
pid Process 1664 e15203ec4f6d0c1755d999aa31daed2c.exe 1664 e15203ec4f6d0c1755d999aa31daed2c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\msconfig.exe" msconfig.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1664 e15203ec4f6d0c1755d999aa31daed2c.exe 1352 msconfig.exe 1352 msconfig.exe 1352 msconfig.exe 1352 msconfig.exe 1352 msconfig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1352 1664 e15203ec4f6d0c1755d999aa31daed2c.exe 28 PID 1664 wrote to memory of 1352 1664 e15203ec4f6d0c1755d999aa31daed2c.exe 28 PID 1664 wrote to memory of 1352 1664 e15203ec4f6d0c1755d999aa31daed2c.exe 28 PID 1664 wrote to memory of 1352 1664 e15203ec4f6d0c1755d999aa31daed2c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e15203ec4f6d0c1755d999aa31daed2c.exe"C:\Users\Admin\AppData\Local\Temp\e15203ec4f6d0c1755d999aa31daed2c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Roaming\msconfig.exe"C:\Users\Admin\AppData\Roaming\msconfig.exe"2⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5e15203ec4f6d0c1755d999aa31daed2c
SHA14f5d35bd747732c45b0780e3175518fa40bc967a
SHA256dfb5b62bba78bc765abe118b5ad37ed6215d62dc4e5697daf7c62314ce3920bc
SHA512335cf80193b1f5a73782c33e3593e289567087e92a2ea6df87c42bcd7d3162becc35fc382e6ce62dd16f5257edfbd5115d0f3a9c20a3e48a4e126e9f34df8733