Analysis
-
max time kernel
131s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe
Resource
win7-20240419-en
General
-
Target
81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe
-
Size
138KB
-
MD5
58b9169440a6b13ad0883200a49ed35a
-
SHA1
0df5d7faee37b8cadc09fc1fde95cd9780958709
-
SHA256
81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd
-
SHA512
be538d9825779b006a7d45ccd70c55b75ef41a9bcd55086e23550e842cdf6ca1258e3ed97c3c12b38b4f9c18f7b789d5e814033c6a76b78158484543d031f463
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPS:r7YubEwYXRWhpAJUHhzm4hUukS6Kmeco
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
smss.exepid process 2728 smss.exe -
Drops file in System32 directory 3 IoCs
Processes:
81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exesmss.exedescription ioc process File opened for modification C:\Windows\SysWOW64\1230\smss.exe 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 1988 sc.exe 3616 sc.exe 3972 sc.exe 4408 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exesmss.exepid process 3524 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe 2728 smss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exesmss.exedescription pid process target process PID 3524 wrote to memory of 1988 3524 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe sc.exe PID 3524 wrote to memory of 1988 3524 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe sc.exe PID 3524 wrote to memory of 1988 3524 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe sc.exe PID 3524 wrote to memory of 3616 3524 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe sc.exe PID 3524 wrote to memory of 3616 3524 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe sc.exe PID 3524 wrote to memory of 3616 3524 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe sc.exe PID 3524 wrote to memory of 2728 3524 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe smss.exe PID 3524 wrote to memory of 2728 3524 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe smss.exe PID 3524 wrote to memory of 2728 3524 81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe smss.exe PID 2728 wrote to memory of 3972 2728 smss.exe sc.exe PID 2728 wrote to memory of 3972 2728 smss.exe sc.exe PID 2728 wrote to memory of 3972 2728 smss.exe sc.exe PID 2728 wrote to memory of 4408 2728 smss.exe sc.exe PID 2728 wrote to memory of 4408 2728 smss.exe sc.exe PID 2728 wrote to memory of 4408 2728 smss.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe"C:\Users\Admin\AppData\Local\Temp\81f6d733aceb61d4b0a5232bf0a08dadebddd56e0473caf72f24d623c563c7cd.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:1988 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:3616 -
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:3972 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD51831da23a502c68dd808bdb08d1b1ddd
SHA12c54489580879eb01971d707a9d46a9cb1ebecb1
SHA2569f043c61e7e18098266430a54ed5336a5827bb2fc13f356a06a0fc8609326b94
SHA512868d77f24094f328ad1403b7fe0ce00547feacabea7e96abe5452ee13fd19d8ac575c8193dc16726f251ca38190254c97318c73da1054a43041f24909de0dde5