Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe
Resource
win7-20240221-en
General
-
Target
ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe
-
Size
118KB
-
MD5
aa66ed22621009a9cac7e9ece12a6c95
-
SHA1
b6c4b49715a0760779b9ebb417c296ace49210ef
-
SHA256
ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0
-
SHA512
9d07d9f78fb563f297b965f2e2f8618c7f05454d58ace74a59482afa8b80991e4dc170b38f18028910adaabea2e013836971f653a79da60a620cc683fd0c45c9
-
SSDEEP
3072:OE9j8b3ZXgKC1hX//iASOXRJzDOD26j/3DcO:OEebiKuX//iZOXRJ3OD26jH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
smss.exepid process 2872 smss.exe -
Loads dropped DLL 2 IoCs
Processes:
ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exepid process 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe -
Drops file in System32 directory 3 IoCs
Processes:
ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exesmss.exedescription ioc process File opened for modification C:\Windows\SysWOW64\1230\smss.exe ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 1692 sc.exe 2232 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exesmss.exepid process 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe 2872 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exesmss.exedescription pid process target process PID 2992 wrote to memory of 1692 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe sc.exe PID 2992 wrote to memory of 1692 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe sc.exe PID 2992 wrote to memory of 1692 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe sc.exe PID 2992 wrote to memory of 1692 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe sc.exe PID 2992 wrote to memory of 2872 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe smss.exe PID 2992 wrote to memory of 2872 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe smss.exe PID 2992 wrote to memory of 2872 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe smss.exe PID 2992 wrote to memory of 2872 2992 ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe smss.exe PID 2872 wrote to memory of 2232 2872 smss.exe sc.exe PID 2872 wrote to memory of 2232 2872 smss.exe sc.exe PID 2872 wrote to memory of 2232 2872 smss.exe sc.exe PID 2872 wrote to memory of 2232 2872 smss.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe"C:\Users\Admin\AppData\Local\Temp\ca7010b453502d8925e70736196f0d4af0fa6b0db913a2b803b67f1ee87735e0.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2232
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD5c8dc1aef50845008f1606d9155071ebf
SHA1b588c0a081e532f43fb32ebe51a1b339c3a5a638
SHA256770c5dd633851edc2f1ddcd7f0cbf16780277829d97efe428f18e1eb2a65435e
SHA5125b41792bac2b2af24b2fdfd49f3d15be47c5b789db176f64f78b86da6bf699d72b2727d18f5f0d8bbe01a08d8e859bc5e26a068752a474eaacd3774cc1277854