Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 18:40

General

  • Target

    0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe

  • Size

    138KB

  • MD5

    36034fd87028dbaa1f02dad2c83c4d4e

  • SHA1

    0d5ad8f49bb01be169f101a121e1230e1cca2a5c

  • SHA256

    0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1

  • SHA512

    66a998209f0386f6141cc0ee49a431cab75f2f16ec5f812778ee3c3b1affc70e66fac4bbf7972c33998a7414af4d60961c3c63f84cbb0ebd2d44d0f9b33cfad8

  • SSDEEP

    1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPo:r7YubEwYXRWhpAJUHhzm4hUukS6KmecK

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe
    "C:\Users\Admin\AppData\Local\Temp\0e7822d0bb5acc63f66959ed354f0faa72518c0f6d5f0fb9c2be93c10f3898f1.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\sc.exe
      C:\Windows\system32\sc.exe stop SharedAccess
      2⤵
      • Launches sc.exe
      PID:1872
    • C:\Windows\SysWOW64\sc.exe
      C:\Windows\system32\sc.exe stop wscsvc
      2⤵
      • Launches sc.exe
      PID:2308
    • C:\Windows\SysWOW64\1230\smss.exe
      C:\Windows\system32\1230\smss.exe -d
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe stop SharedAccess
        3⤵
        • Launches sc.exe
        PID:2584
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe stop wscsvc
        3⤵
        • Launches sc.exe
        PID:2792

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\1230\smss.exe

          Filesize

          138KB

          MD5

          2f647b7ab48f1034ba90082c52a05629

          SHA1

          db4d516dd9c73ce6343cfeb8b6f0dde5355f90f3

          SHA256

          373d180f054101be76b083782fee8786f7017c4731b50925da4d0729e5506d7c

          SHA512

          ec8ace158ed7ba6c0fabedcceaa1713acd1894d3aae15b4ffbe63b662686b70c8337a3a2eb355a63b13a0fb079b76f61d5a5c7f8092f97fe6a7ddd0a39e76f07