Analysis
-
max time kernel
20s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe
Resource
win10v2004-20240508-en
General
-
Target
5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe
-
Size
246KB
-
MD5
056e17de67ca2a3176adc633ada259c8
-
SHA1
819af76d74761c1d08bacd6cd42298927bb51103
-
SHA256
5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0
-
SHA512
8f078e247b46a28ca54e0059a2038310ac589965b25e692aeafb9e690d6e4bb54d15aca5d2ff2a4d1b38a0e26ca5f230867b034cf60a0967b37f129c390930a6
-
SSDEEP
6144:wlj7cMni+ZdeKzC/leySe8AIqpoHbnDns1ND9R:wlbi+Z/VyV8hEoHbI3b
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 10 IoCs
resource yara_rule behavioral1/memory/1724-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/files/0x000c000000013ab9-10.dat UPX behavioral1/memory/1724-12-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/1900-22-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/3064-14-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/3064-33-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/files/0x0011000000016a6f-31.dat UPX behavioral1/memory/2200-30-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2200-25-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/1900-34-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
pid Process 3064 MSWDM.EXE 1900 MSWDM.EXE 2556 5808173B038B0A33BCED01932C0B7C22072011D63DE0DBAA79052837B7D67EC0.EXE 2200 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 3064 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe File opened for modification C:\Windows\dev192C.tmp 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe File opened for modification C:\Windows\dev192C.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3064 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1900 1724 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 28 PID 1724 wrote to memory of 1900 1724 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 28 PID 1724 wrote to memory of 1900 1724 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 28 PID 1724 wrote to memory of 1900 1724 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 28 PID 1724 wrote to memory of 3064 1724 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 29 PID 1724 wrote to memory of 3064 1724 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 29 PID 1724 wrote to memory of 3064 1724 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 29 PID 1724 wrote to memory of 3064 1724 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 29 PID 3064 wrote to memory of 2556 3064 MSWDM.EXE 30 PID 3064 wrote to memory of 2556 3064 MSWDM.EXE 30 PID 3064 wrote to memory of 2556 3064 MSWDM.EXE 30 PID 3064 wrote to memory of 2556 3064 MSWDM.EXE 30 PID 3064 wrote to memory of 2200 3064 MSWDM.EXE 31 PID 3064 wrote to memory of 2200 3064 MSWDM.EXE 31 PID 3064 wrote to memory of 2200 3064 MSWDM.EXE 31 PID 3064 wrote to memory of 2200 3064 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe"C:\Users\Admin\AppData\Local\Temp\5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1900
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev192C.tmp!C:\Users\Admin\AppData\Local\Temp\5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\5808173B038B0A33BCED01932C0B7C22072011D63DE0DBAA79052837B7D67EC0.EXE
- Executes dropped EXE
PID:2556
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev192C.tmp!C:\Users\Admin\AppData\Local\Temp\5808173B038B0A33BCED01932C0B7C22072011D63DE0DBAA79052837B7D67EC0.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5808173B038B0A33BCED01932C0B7C22072011D63DE0DBAA79052837B7D67EC0.EXE
Filesize246KB
MD57c8637b78c55d657e19fbeb36c5776ac
SHA1d07ca1b5d23af1cb398a75ec7ced8e6859dafd87
SHA256af1fae030989849c4323e3e34e8c9c0cfadfb4fe14d03bb68fb397d65de525cf
SHA51279e0e0463b010da0a869cd2e59280a72d7ee0a3e9745ffd1b4d1a3093cb151d5f75cf73f9ec3abd795c1c54c5c2101ebf8e38905f7d64a554e31936c488177af
-
C:\Users\Admin\AppData\Local\Temp\5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe
Filesize198KB
MD5e133c2d85cff4edd7fe8e8f0f8be6cdb
SHA1b8269209ebb6fe44bc50dab35f97b0ae244701b4
SHA2566c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d
SHA512701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1
-
Filesize
47KB
MD517b789e1d1c2ac8883a68e3fdf6e06b1
SHA1f04386e2facad18e7412954d63079ea4a794457b
SHA256a1bc39e4bbc1a47b5678b2eefe3611bc61dfcb2b93025f8352123cce55a3bd69
SHA51201cb25a97e31da8947669536251215c1df9b8001d774269b17b68244a5516a452e8e540d0c6ea13d58d5fe8833fa7be7007a75d51659bbdb41dc7f3c90141f81