Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe
Resource
win10v2004-20240419-en
General
-
Target
0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe
-
Size
138KB
-
MD5
36034fd87028dbaa1f02dad2c83c4d4e
-
SHA1
0d5ad8f49bb01be169f101a121e1230e1cca2a5c
-
SHA256
0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1
-
SHA512
66a998209f0386f6141cc0ee49a431cab75f2f16ec5f812778ee3c3b1affc70e66fac4bbf7972c33998a7414af4d60961c3c63f84cbb0ebd2d44d0f9b33cfad8
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPo:r7YubEwYXRWhpAJUHhzm4hUukS6KmecK
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2544 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2308 sc.exe 2584 sc.exe 2792 sc.exe 1872 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 2544 smss.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1872 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 28 PID 1984 wrote to memory of 1872 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 28 PID 1984 wrote to memory of 1872 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 28 PID 1984 wrote to memory of 1872 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 28 PID 1984 wrote to memory of 2308 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 30 PID 1984 wrote to memory of 2308 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 30 PID 1984 wrote to memory of 2308 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 30 PID 1984 wrote to memory of 2308 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 30 PID 1984 wrote to memory of 2544 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 32 PID 1984 wrote to memory of 2544 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 32 PID 1984 wrote to memory of 2544 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 32 PID 1984 wrote to memory of 2544 1984 0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe 32 PID 2544 wrote to memory of 2584 2544 smss.exe 33 PID 2544 wrote to memory of 2584 2544 smss.exe 33 PID 2544 wrote to memory of 2584 2544 smss.exe 33 PID 2544 wrote to memory of 2584 2544 smss.exe 33 PID 2544 wrote to memory of 2792 2544 smss.exe 35 PID 2544 wrote to memory of 2792 2544 smss.exe 35 PID 2544 wrote to memory of 2792 2544 smss.exe 35 PID 2544 wrote to memory of 2792 2544 smss.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe"C:\Users\Admin\AppData\Local\Temp\0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:1872
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:2308
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:2584
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD52f647b7ab48f1034ba90082c52a05629
SHA1db4d516dd9c73ce6343cfeb8b6f0dde5355f90f3
SHA256373d180f054101be76b083782fee8786f7017c4731b50925da4d0729e5506d7c
SHA512ec8ace158ed7ba6c0fabedcceaa1713acd1894d3aae15b4ffbe63b662686b70c8337a3a2eb355a63b13a0fb079b76f61d5a5c7f8092f97fe6a7ddd0a39e76f07