Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe
Resource
win10v2004-20240426-en
General
-
Target
4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe
-
Size
179KB
-
MD5
98a799292c19a8c66ca9644e10f7446a
-
SHA1
29387fc643e7e01fa1a5cec718b1e784d8248825
-
SHA256
4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57
-
SHA512
73ad05fb47220219dbbf200704015c5d309ead4df5474dab839bc1f7968302c7757553f2cf22b4637ce2e0d2d6ec8995a370530aed79e216d5b79f00ca26891a
-
SSDEEP
3072:XXTTASJKf2n5AxE2NpxOa2XdU2QF4s5XgIDFyHb8kHofL/09rGB:XvASJKenie2xT2NU2OTFQb8Fb0IB
Malware Config
Signatures
-
Detects executables packed with aPLib. 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2076-0-0x0000000000840000-0x0000000000870000-memory.dmp INDICATOR_EXE_Packed_aPLib behavioral1/memory/2076-270-0x0000000000840000-0x0000000000870000-memory.dmp INDICATOR_EXE_Packed_aPLib -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent5 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\F604D4~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Eset\Nod svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\AVAST Software\Avast svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exedescription pid process target process PID 2076 set thread context of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe 2252 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exedescription pid process target process PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2252 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe svchost.exe PID 2076 wrote to memory of 2352 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe cmd.exe PID 2076 wrote to memory of 2352 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe cmd.exe PID 2076 wrote to memory of 2352 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe cmd.exe PID 2076 wrote to memory of 2352 2076 4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe"C:\Users\Admin\AppData\Local\Temp\4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\f604d4fj2.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\phlEA56.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\4489807521e3507dc2955009ecfd2ec9e2545ad0d4958cd85c52442a450e6e57.exe""2⤵PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35B
MD5d36f6dfc8a95338e43a07ff47d0b9825
SHA15d167e2630e909af7a4ad4d7834346e562ae2820
SHA256855e7677f6210ec52cf77332234b62520a9910585e12cb6f6fdecd4c2884db52
SHA512f3cdf76acdfd396dd768c1487040fc450191737afe0244f70e50675b5152480eefb5e8bd2e63e97c6d33999bf4ad64c312aeda2db09f108fb64abd9ba46ee8f7