Analysis
-
max time kernel
142s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe
Resource
win7-20240220-en
General
-
Target
8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe
-
Size
119KB
-
MD5
db5a6fe159f5803d4d31d8ec281b72a8
-
SHA1
eadaff849a1796b6559e3c56142e5eee0e033988
-
SHA256
8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5
-
SHA512
d9a11a34d737e54b36c512df82e23d5be761e266502c59555d7e1360a4f39212df3ac20c9877d15a7d8d8f9fdf5b80fad502c54dc949efb0475d3d70ca419ada
-
SSDEEP
3072:OE9j8b3ZXgKC1hX//iASOXRJzDOD26j/3Dct:OEebiKuX//iZOXRJ3OD26jQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3948 smss.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1604 sc.exe 4168 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4164 8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe 3948 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4164 wrote to memory of 1604 4164 8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe 82 PID 4164 wrote to memory of 1604 4164 8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe 82 PID 4164 wrote to memory of 1604 4164 8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe 82 PID 4164 wrote to memory of 3948 4164 8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe 84 PID 4164 wrote to memory of 3948 4164 8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe 84 PID 4164 wrote to memory of 3948 4164 8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe 84 PID 3948 wrote to memory of 4168 3948 smss.exe 85 PID 3948 wrote to memory of 4168 3948 smss.exe 85 PID 3948 wrote to memory of 4168 3948 smss.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe"C:\Users\Admin\AppData\Local\Temp\8c6efc34597ebe3b44b5f42ea50028c1b68a6024af64f91909713359bbb401d5.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:1604
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:4168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5b41faacdf05c5a7a53eeee93bd13ecff
SHA1d2bbb443c0dc69a78691ea2803bb7f1cff9d87c9
SHA25617fdeb28a18a6878ec39b04100989c35792733adac8c49e1b6a58cc617b0d5a6
SHA512331dcc29b82365d75f4e80158424613091fb1f4a637555b73e3e061d8cd813392823a00dc79e368cff4d52aa0f66ce8a3f16f1be7f49540ba62e1d71bd0bc3e9