Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe
Resource
win7-20240508-en
General
-
Target
d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe
-
Size
119KB
-
MD5
65d5472622dc4484fc8648e81db67b61
-
SHA1
12988827904fe225c468c921aa2d26475702507e
-
SHA256
d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511
-
SHA512
7d141bab8934a6e0217faa8427ee883c8e1b9dd13bad4f02de2504673368be01142783a6a11cf00ce98ea2112934fe52a2f9455f1ded5228048ece96baa6e841
-
SSDEEP
3072:OE9j8b3ZXgKC1hX//iASOXRJzDOD26j/3Dc+:OEebiKuX//iZOXRJ3OD26jB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1928 smss.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2720 sc.exe 1712 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 948 d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe 1928 smss.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 948 wrote to memory of 2720 948 d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe 93 PID 948 wrote to memory of 2720 948 d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe 93 PID 948 wrote to memory of 2720 948 d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe 93 PID 948 wrote to memory of 1928 948 d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe 96 PID 948 wrote to memory of 1928 948 d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe 96 PID 948 wrote to memory of 1928 948 d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe 96 PID 1928 wrote to memory of 1712 1928 smss.exe 97 PID 1928 wrote to memory of 1712 1928 smss.exe 97 PID 1928 wrote to memory of 1712 1928 smss.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe"C:\Users\Admin\AppData\Local\Temp\d1bdc429d88aaafcc9b67700ec1f5e326abe81ac3a4f1b8fd1b33c8facd73511.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:2720
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:1712
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD51a56acfda382462ee7b64db2f83e2440
SHA1ac0d8e973a70d9bf9323d8acd2b09c6f697cd19f
SHA256af4673de0a3c459e2f2733de32f651cd3db252c630f6b74558c82ec6b029d2b1
SHA512f1912ecb348255ea1e2787799b4b4ff55cc311fd5ef00c9f7b79481d7954e0b063fd4fcbc77c72eeb6c021814a4f60684a9df11f367c08bc641cc0e3d4509d96