Analysis
-
max time kernel
19s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe
Resource
win10v2004-20240226-en
General
-
Target
782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe
-
Size
501KB
-
MD5
093ce9a69fc120fe2838e3e1d7d6feb0
-
SHA1
de619d2a6c585d57b38ff3fae3ef74b06ac72e16
-
SHA256
782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173
-
SHA512
f4f5877b5dca88978d87e2b9b7f5d96735e9697a4b0162dbf3e6ca22fb3fac8da8ca1901e13f0aeb9aa3cfb5278c79f33129d90543f5bc20419909d90023c1e5
-
SSDEEP
6144:wlj7cMnI+c78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAFN:wlbI+285bM3npxYfj63hgD1Zie
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXE782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXEMSWDM.EXEpid process 3024 MSWDM.EXE 2988 MSWDM.EXE 2412 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE 2564 MSWDM.EXE -
Loads dropped DLL 1 IoCs
Processes:
MSWDM.EXEpid process 3024 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exeMSWDM.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
Processes:
782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exeMSWDM.EXEdescription ioc process File created C:\WINDOWS\MSWDM.EXE 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe File opened for modification C:\Windows\dev667.tmp 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe File opened for modification C:\Windows\dev667.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MSWDM.EXEpid process 3024 MSWDM.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXEpid process 2412 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE 2412 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE 2412 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exeMSWDM.EXEdescription pid process target process PID 2912 wrote to memory of 2988 2912 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe MSWDM.EXE PID 2912 wrote to memory of 2988 2912 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe MSWDM.EXE PID 2912 wrote to memory of 2988 2912 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe MSWDM.EXE PID 2912 wrote to memory of 2988 2912 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe MSWDM.EXE PID 2912 wrote to memory of 3024 2912 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe MSWDM.EXE PID 2912 wrote to memory of 3024 2912 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe MSWDM.EXE PID 2912 wrote to memory of 3024 2912 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe MSWDM.EXE PID 2912 wrote to memory of 3024 2912 782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe MSWDM.EXE PID 3024 wrote to memory of 2412 3024 MSWDM.EXE 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE PID 3024 wrote to memory of 2412 3024 MSWDM.EXE 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE PID 3024 wrote to memory of 2412 3024 MSWDM.EXE 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE PID 3024 wrote to memory of 2412 3024 MSWDM.EXE 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE PID 3024 wrote to memory of 2412 3024 MSWDM.EXE 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE PID 3024 wrote to memory of 2412 3024 MSWDM.EXE 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE PID 3024 wrote to memory of 2412 3024 MSWDM.EXE 782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE PID 3024 wrote to memory of 2564 3024 MSWDM.EXE MSWDM.EXE PID 3024 wrote to memory of 2564 3024 MSWDM.EXE MSWDM.EXE PID 3024 wrote to memory of 2564 3024 MSWDM.EXE MSWDM.EXE PID 3024 wrote to memory of 2564 3024 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe"C:\Users\Admin\AppData\Local\Temp\782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2988
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev667.tmp!C:\Users\Admin\AppData\Local\Temp\782c886b9d782ee1a19e079ee299f69b090963a31bde12d481b602a4cf21c173.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2412
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev667.tmp!C:\Users\Admin\AppData\Local\Temp\782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\782C886B9D782EE1A19E079EE299F69B090963A31BDE12D481B602A4CF21C173.EXE
Filesize501KB
MD5a43e4b24241c0669598c5491f6a2ec59
SHA1bc6c7c567722c54fd7c4519b75696fe715e696b0
SHA256105c8135f30837976b3b50ea28ff406e197a8d423602251d6ad7bc583637ff5e
SHA51224d6f87547a3c429f23d4f937a7834df990245397b1e317c888097768493cdfa7800d6966d7ae513518b4eb38c6f3ce21a74d63c23d81215473d7cc8501b416b
-
Filesize
47KB
MD58281630c34398a6569e720407a61ca05
SHA1d983308e8fe1bab035342cd8d2ddc63cd9ce1ac0
SHA2568f0e45e4b02d7e47c2a82eaf263756167dbc07fb1e50eaf7f8f0b232d4d097e0
SHA512483fab964c6e7899af972bc14101ef225722ff09f544ab2e2dc37f0af781c20b3a526610922c0fe2a1d7dc53ffc7ee0ee6a030bc73b1f2b35f7ea36568945187
-
Filesize
453KB
MD596f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149