Analysis
-
max time kernel
19s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe
Resource
win10v2004-20240508-en
General
-
Target
387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe
-
Size
383KB
-
MD5
8c8992742e0b8da2566e20cbf47daca0
-
SHA1
1536a36b17ba21d071f9192f7e20463d14a744b8
-
SHA256
387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51
-
SHA512
1a8d076512ce8775b57559bdc47b359b9f1f12fa60ac1b1ae21aa36b8afb78c5c0d852ee96878daa0e6b7623baae82c60d95ad150213569c08f53aad4c6b7939
-
SSDEEP
6144:wlj7cMnb+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCY:wlbb+8U66b5zhVymA/XSRhB
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 9 IoCs
resource yara_rule behavioral1/memory/1736-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/files/0x000b0000000144e8-5.dat UPX behavioral1/memory/2820-14-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2528-21-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2528-30-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2656-27-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2656-25-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/1736-12-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2820-31-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
pid Process 2820 MSWDM.EXE 2528 MSWDM.EXE 2644 387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE 2656 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2528 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe File opened for modification C:\Windows\dev140D.tmp 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2528 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2820 1736 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 28 PID 1736 wrote to memory of 2820 1736 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 28 PID 1736 wrote to memory of 2820 1736 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 28 PID 1736 wrote to memory of 2820 1736 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 28 PID 1736 wrote to memory of 2528 1736 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 29 PID 1736 wrote to memory of 2528 1736 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 29 PID 1736 wrote to memory of 2528 1736 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 29 PID 1736 wrote to memory of 2528 1736 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 29 PID 2528 wrote to memory of 2644 2528 MSWDM.EXE 30 PID 2528 wrote to memory of 2644 2528 MSWDM.EXE 30 PID 2528 wrote to memory of 2644 2528 MSWDM.EXE 30 PID 2528 wrote to memory of 2644 2528 MSWDM.EXE 30 PID 2528 wrote to memory of 2656 2528 MSWDM.EXE 31 PID 2528 wrote to memory of 2656 2528 MSWDM.EXE 31 PID 2528 wrote to memory of 2656 2528 MSWDM.EXE 31 PID 2528 wrote to memory of 2656 2528 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe"C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2820
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev140D.tmp!C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE
- Executes dropped EXE
PID:2644
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev140D.tmp!C:\Users\Admin\AppData\Local\Temp\387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE!3⤵
- Executes dropped EXE
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5e232e754f601471d0aebcb1a45529cc9
SHA18371dd957e9d81df57ceacd6235e77a15e511659
SHA2562f9a865d6d559a837567f5234e5491cdbf0eefa186b9452e36414c5acd18085b
SHA512fb9898459d2814b446ba7edd03566d6c4ff411f75854cc5d18f0f5f186a3c45a2bebc78d8b4a886bb0b3a9b917182a0aeeb64b3112eb1ec7b52bef8ea2a9ddc5
-
\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe
Filesize335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f