Analysis
-
max time kernel
19s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:54
Static task
static1
Behavioral task
behavioral1
Sample
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe
Resource
win10v2004-20240226-en
General
-
Target
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe
-
Size
2.2MB
-
MD5
9fc6cda3cbf7724829b3091d1b1f4d92
-
SHA1
c29041f50413c3ea94d8ed326558fc5caceb61cf
-
SHA256
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230
-
SHA512
264462a23d44315f4cce6229afe3c5e3626feae58b6cbbaf331b65476efe31a8deb839686f3e5e4dc89f0f3baca519c481fda609e1ff0d809a9d8297b5da353d
-
SSDEEP
49152:Wbd+JCbRquA/m2yL5zbfFiV+XenmE3/zX:Wbd+Goq2VjnmU
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 8 IoCs
Processes:
resource yara_rule behavioral1/memory/2084-1-0x0000000000400000-0x000000000041B000-memory.dmp UPX C:\Windows\MSWDM.EXE UPX behavioral1/memory/2084-13-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/3036-31-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2540-28-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/3036-17-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2096-15-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2096-32-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXE97ED1FBA8F050D65D2BF9596D4353B8CBA49CC11F2999EAF06385657FB44F230.EXEMSWDM.EXEpid process 2096 MSWDM.EXE 3036 MSWDM.EXE 2624 97ED1FBA8F050D65D2BF9596D4353B8CBA49CC11F2999EAF06385657FB44F230.EXE 2540 MSWDM.EXE -
Loads dropped DLL 2 IoCs
Processes:
MSWDM.EXEpid process 3036 MSWDM.EXE 2608 -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exeMSWDM.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 2 IoCs
Processes:
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exedescription ioc process File created C:\WINDOWS\MSWDM.EXE 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe File opened for modification C:\Windows\devD88.tmp 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MSWDM.EXEpid process 3036 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exeMSWDM.EXEdescription pid process target process PID 2084 wrote to memory of 2096 2084 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe MSWDM.EXE PID 2084 wrote to memory of 2096 2084 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe MSWDM.EXE PID 2084 wrote to memory of 2096 2084 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe MSWDM.EXE PID 2084 wrote to memory of 2096 2084 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe MSWDM.EXE PID 2084 wrote to memory of 3036 2084 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe MSWDM.EXE PID 2084 wrote to memory of 3036 2084 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe MSWDM.EXE PID 2084 wrote to memory of 3036 2084 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe MSWDM.EXE PID 2084 wrote to memory of 3036 2084 97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe MSWDM.EXE PID 3036 wrote to memory of 2624 3036 MSWDM.EXE 97ED1FBA8F050D65D2BF9596D4353B8CBA49CC11F2999EAF06385657FB44F230.EXE PID 3036 wrote to memory of 2624 3036 MSWDM.EXE 97ED1FBA8F050D65D2BF9596D4353B8CBA49CC11F2999EAF06385657FB44F230.EXE PID 3036 wrote to memory of 2624 3036 MSWDM.EXE 97ED1FBA8F050D65D2BF9596D4353B8CBA49CC11F2999EAF06385657FB44F230.EXE PID 3036 wrote to memory of 2624 3036 MSWDM.EXE 97ED1FBA8F050D65D2BF9596D4353B8CBA49CC11F2999EAF06385657FB44F230.EXE PID 3036 wrote to memory of 2540 3036 MSWDM.EXE MSWDM.EXE PID 3036 wrote to memory of 2540 3036 MSWDM.EXE MSWDM.EXE PID 3036 wrote to memory of 2540 3036 MSWDM.EXE MSWDM.EXE PID 3036 wrote to memory of 2540 3036 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe"C:\Users\Admin\AppData\Local\Temp\97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2096 -
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devD88.tmp!C:\Users\Admin\AppData\Local\Temp\97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\97ED1FBA8F050D65D2BF9596D4353B8CBA49CC11F2999EAF06385657FB44F230.EXE
- Executes dropped EXE
PID:2624 -
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devD88.tmp!C:\Users\Admin\AppData\Local\Temp\97ED1FBA8F050D65D2BF9596D4353B8CBA49CC11F2999EAF06385657FB44F230.EXE!3⤵
- Executes dropped EXE
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f8b33e467968a659f9cbf7163adb6b0b
SHA1ff0f6ee6ea88e651db722999d9e57d5284c22b97
SHA256e948a5a76cb3a2248c3bf27e9960a170f884b4008cbd484ae97bc8e049966bc8
SHA5124f3734c9b5ce9fcb97ab9cd8d14dc1ef8821f63ae3331e32ea410d1a056a90c5acd6ace8f7f68b138c756b8a1c625afc6817b95395e2e9a84872a41f2737b56d
-
\Users\Admin\AppData\Local\Temp\97ed1fba8f050d65d2bf9596d4353b8cba49cc11f2999eaf06385657fb44f230.exe
Filesize2.1MB
MD5b8d69fa2755c3ab1f12f8866a8e2a4f7
SHA18e3cdfb20e158c2906323ba0094a18c7dd2aaf2d
SHA2567e0976036431640ae1d9f1c0b52bcea5dd37ef86cd3f5304dc8a96459d9483cd
SHA5125acac46068b331216978500f67a7fa5257bc5b05133fab6d88280b670ae4885ef2d5d1f531169b66bf1952e082f56b1ad2bc3901479b740f96c53ea405adda18