Analysis
-
max time kernel
19s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe
Resource
win10v2004-20240508-en
General
-
Target
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe
-
Size
506KB
-
MD5
110c9d0751fc34165b2ac572d1da64b1
-
SHA1
b8f495f76da0467fc0a57c8312b4e2b1ce0fc38a
-
SHA256
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918
-
SHA512
32219b18bb42bb2b8f7cead20e7598b28dfd2de2b2f561bcd1d7c4f0db96d9b0554b97044400d0c66c222838deb26190e6f0d2da256517828d3d714154861f99
-
SSDEEP
12288:wlbU+M1gL5pRTcAkS/3hzN8qE43fm78V8:WbU+p5jcAkSYqyE8
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 9 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2204-12-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/3036-14-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2212-21-0x0000000000400000-0x000000000041B000-memory.dmp UPX C:\WINDOWS\MSWDM.EXE UPX behavioral1/memory/2608-30-0x0000000000400000-0x000000000041B000-memory.dmp UPX C:\Users\Admin\AppData\Local\Temp\137DA267595362D0DD8C7DB94C1B3EDE5DBF1C50DB11910F1E744FF6B1F33918.EXE UPX behavioral1/memory/3036-33-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2212-34-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXE137DA267595362D0DD8C7DB94C1B3EDE5DBF1C50DB11910F1E744FF6B1F33918.EXEMSWDM.EXEpid process 3036 MSWDM.EXE 2212 MSWDM.EXE 2592 137DA267595362D0DD8C7DB94C1B3EDE5DBF1C50DB11910F1E744FF6B1F33918.EXE 2608 MSWDM.EXE -
Loads dropped DLL 2 IoCs
Processes:
MSWDM.EXEpid process 3036 MSWDM.EXE 2712 -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
MSWDM.EXE137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
Processes:
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exeMSWDM.EXEdescription ioc process File created C:\WINDOWS\MSWDM.EXE 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe File opened for modification C:\Windows\devE24.tmp 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe File opened for modification C:\Windows\devE24.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MSWDM.EXEpid process 3036 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exeMSWDM.EXEdescription pid process target process PID 2204 wrote to memory of 2212 2204 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe MSWDM.EXE PID 2204 wrote to memory of 2212 2204 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe MSWDM.EXE PID 2204 wrote to memory of 2212 2204 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe MSWDM.EXE PID 2204 wrote to memory of 2212 2204 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe MSWDM.EXE PID 2204 wrote to memory of 3036 2204 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe MSWDM.EXE PID 2204 wrote to memory of 3036 2204 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe MSWDM.EXE PID 2204 wrote to memory of 3036 2204 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe MSWDM.EXE PID 2204 wrote to memory of 3036 2204 137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe MSWDM.EXE PID 3036 wrote to memory of 2592 3036 MSWDM.EXE 137DA267595362D0DD8C7DB94C1B3EDE5DBF1C50DB11910F1E744FF6B1F33918.EXE PID 3036 wrote to memory of 2592 3036 MSWDM.EXE 137DA267595362D0DD8C7DB94C1B3EDE5DBF1C50DB11910F1E744FF6B1F33918.EXE PID 3036 wrote to memory of 2592 3036 MSWDM.EXE 137DA267595362D0DD8C7DB94C1B3EDE5DBF1C50DB11910F1E744FF6B1F33918.EXE PID 3036 wrote to memory of 2592 3036 MSWDM.EXE 137DA267595362D0DD8C7DB94C1B3EDE5DBF1C50DB11910F1E744FF6B1F33918.EXE PID 3036 wrote to memory of 2608 3036 MSWDM.EXE MSWDM.EXE PID 3036 wrote to memory of 2608 3036 MSWDM.EXE MSWDM.EXE PID 3036 wrote to memory of 2608 3036 MSWDM.EXE MSWDM.EXE PID 3036 wrote to memory of 2608 3036 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe"C:\Users\Admin\AppData\Local\Temp\137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devE24.tmp!C:\Users\Admin\AppData\Local\Temp\137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\137DA267595362D0DD8C7DB94C1B3EDE5DBF1C50DB11910F1E744FF6B1F33918.EXE
- Executes dropped EXE
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devE24.tmp!C:\Users\Admin\AppData\Local\Temp\137DA267595362D0DD8C7DB94C1B3EDE5DBF1C50DB11910F1E744FF6B1F33918.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\137DA267595362D0DD8C7DB94C1B3EDE5DBF1C50DB11910F1E744FF6B1F33918.EXEFilesize
506KB
MD591091f0f571018dd5703847cea5df3a0
SHA133e4cb25b907cd6e65065a663778a45299548b3d
SHA256083f0bd5f4c000f8777d6098014a48b9d6b1de8d087ee635e0c3019c1315de16
SHA512db99d3c655ea3073ad329e716230513c69db85d31ebb54370afa004e4f2f1aa95aa31d21a55e8cc5ec844105a1db3942eff08d9b41e0d3c945bbacd0be1bc660
-
C:\WINDOWS\MSWDM.EXEFilesize
48KB
MD5bbbb0cd00ecee4398cfbb727e05fc129
SHA1f5e881fe23eed99368e64f59bcff02ac803ec8ea
SHA25613c373c306bf19c9926d4d44d2f6d1789938436821ad2a0de9b58ddb86ef6b15
SHA512cfd58804e453d022a62715fa236a974ec693296dc634821c9051c77467b35d83e3d89d178a2c1cf37d21f7e6a6a147ff51b82a475ed1d3d5403ca165dc6bcb8b
-
\Users\Admin\AppData\Local\Temp\137da267595362d0dd8c7db94c1b3ede5dbf1c50db11910f1e744ff6b1f33918.exeFilesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
memory/2204-0-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2204-12-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2212-21-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2212-34-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2608-30-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/3036-14-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/3036-33-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/3036-24-0x0000000000260000-0x000000000027B000-memory.dmpFilesize
108KB