Analysis
-
max time kernel
90s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
General
-
Target
3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe
-
Size
631KB
-
MD5
7206084219e20fe7575aec63a3422a5c
-
SHA1
930508090c6ec226838189c1d6ca32035c2ac0ed
-
SHA256
3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4
-
SHA512
dc7d9d8788531b9b127d905d04d1a6731bc2ae499f96dac485cb995f82a57490af77bf500c60f169d82eea6e3fe8b1fa0a8f18a54cdd7efdc84757475bb7ba51
-
SSDEEP
6144:5z27B8gj9StARXpmTvIcw3/hxXYCckBWxTYDMnz5aO3xIiwETMAKo/x4Fl+c0XMF:hIXSQpmkBWxjniiwETmFmY
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2444 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2444 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe 2376 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2444 set thread context of 2376 2444 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe 30 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\magistratsregeringen.pho 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 676 2376 WerFault.exe 30 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2444 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2376 2444 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe 30 PID 2444 wrote to memory of 2376 2444 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe 30 PID 2444 wrote to memory of 2376 2444 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe 30 PID 2444 wrote to memory of 2376 2444 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe 30 PID 2444 wrote to memory of 2376 2444 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe 30 PID 2444 wrote to memory of 2376 2444 3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe"C:\Users\Admin\AppData\Local\Temp\3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe"C:\Users\Admin\AppData\Local\Temp\3fb935f3b274dddf25a926967ceb573ad0f990bff966583157849545c60c42e4.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 683⤵
- Program crash
PID:676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
11KB
MD5375e8a08471dc6f85f3828488b1147b3
SHA11941484ac710fc301a7d31d6f1345e32a21546af
SHA2564c86b238e64ecfaabe322a70fd78db229a663ccc209920f3385596a6e3205f78
SHA5125ba29db13723ddf27b265a4548606274b850d076ae1f050c64044f8ccd020585ad766c85c3e20003a22f356875f76fb3679c89547b0962580d8e5a42b082b9a8