Analysis
-
max time kernel
25s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe
Resource
win10v2004-20240419-en
General
-
Target
82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe
-
Size
927KB
-
MD5
a9e8e5384cb5cda5c69023ed02746f64
-
SHA1
cceebb884793456a2dbb19b33b6f6a78df9e2caf
-
SHA256
82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17
-
SHA512
fc889033f1e03ae4dee521d3aec7fa3b55615a0975a8879b1c562c0bd129710d3b853981b39f0026fc70b032736cfd9e3065917bf01f5609a4e6374889a02af6
-
SSDEEP
24576:Wbd+tZe0p4Ek4niOkl/A04szE87JKTvmc:Wbd+PeW4SkZP4sz9Mbz
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 7 IoCs
resource yara_rule behavioral1/memory/2884-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/files/0x000b000000014284-8.dat UPX behavioral1/memory/2884-5-0x0000000000290000-0x00000000002AB000-memory.dmp UPX behavioral1/memory/2884-16-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2832-11-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2340-28-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2832-27-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
pid Process 2832 MSWDM.EXE 2340 MSWDM.EXE 2580 82F1A9F9D12C219275B596F588FAB772FF2F54A82080FE04DBADDF85D44A7E17.EXE -
Loads dropped DLL 2 IoCs
pid Process 2340 MSWDM.EXE 2340 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe File opened for modification C:\Windows\devFBA.tmp 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2340 MSWDM.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2580 82F1A9F9D12C219275B596F588FAB772FF2F54A82080FE04DBADDF85D44A7E17.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2580 82F1A9F9D12C219275B596F588FAB772FF2F54A82080FE04DBADDF85D44A7E17.EXE Token: 35 2580 82F1A9F9D12C219275B596F588FAB772FF2F54A82080FE04DBADDF85D44A7E17.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2832 2884 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe 28 PID 2884 wrote to memory of 2832 2884 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe 28 PID 2884 wrote to memory of 2832 2884 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe 28 PID 2884 wrote to memory of 2832 2884 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe 28 PID 2884 wrote to memory of 2340 2884 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe 29 PID 2884 wrote to memory of 2340 2884 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe 29 PID 2884 wrote to memory of 2340 2884 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe 29 PID 2884 wrote to memory of 2340 2884 82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe 29 PID 2340 wrote to memory of 2580 2340 MSWDM.EXE 30 PID 2340 wrote to memory of 2580 2340 MSWDM.EXE 30 PID 2340 wrote to memory of 2580 2340 MSWDM.EXE 30 PID 2340 wrote to memory of 2580 2340 MSWDM.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe"C:\Users\Admin\AppData\Local\Temp\82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2832
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devFBA.tmp!C:\Users\Admin\AppData\Local\Temp\82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\82F1A9F9D12C219275B596F588FAB772FF2F54A82080FE04DBADDF85D44A7E17.EXE
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5ca1665aebc386a9e1e00e62a6f24bccd
SHA1ace8a60b685b6e870d0952fd7de8b1157112db6a
SHA2569a7574d09ccc52c090ac586db59b15f7295fb15f6c2a1492558cb6d4cfdd5d3d
SHA512bd227870c2e6b67e11e532e43aecdd0af65745a31cc0beed86032bb00879a3eddeb9ddeae7bcc7089fee758179e2b7b9f567957f7f2fcfc69ed766d5feaa6d17
-
\Users\Admin\AppData\Local\Temp\82f1a9f9d12c219275b596f588fab772ff2f54a82080fe04dbaddf85d44a7e17.exe
Filesize847KB
MD5c8f40f25f783a52262bdaedeb5555427
SHA1e45e198607c8d7398745baa71780e3e7a2f6deca
SHA256e81b44ee7381ae3b630488b6fb7e3d9ffbdd9ac3032181d4ccaaff3409b57316
SHA512f5944743f54028eb1dd0f2d68468726b177d33185324da0da96cdd20768bab4ca2e507ae9157b2733fd6240c920b7e15a5f5b9f284ee09d0fd385fc895b97191