Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe
Resource
win7-20240221-en
General
-
Target
b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe
-
Size
138KB
-
MD5
5d8d92fbda0b38017fd587d050d31b9d
-
SHA1
85435615eed52c53accc0f4d421a0fef76de08f9
-
SHA256
b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721
-
SHA512
d6b1a3cee19d6d27f7aba480551b8203c1ffac88425ec4557c81aef7629aa974068af64005a9233bcb78c3364416b941edeb650049322b475ded800f654449cd
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPY:r7YubEwYXRWhpAJUHhzm4hUukS6Kmecq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3020 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2012 sc.exe 1840 sc.exe 2584 sc.exe 2696 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 3020 smss.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2012 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 28 PID 1948 wrote to memory of 2012 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 28 PID 1948 wrote to memory of 2012 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 28 PID 1948 wrote to memory of 2012 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 28 PID 1948 wrote to memory of 1840 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 30 PID 1948 wrote to memory of 1840 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 30 PID 1948 wrote to memory of 1840 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 30 PID 1948 wrote to memory of 1840 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 30 PID 1948 wrote to memory of 3020 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 32 PID 1948 wrote to memory of 3020 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 32 PID 1948 wrote to memory of 3020 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 32 PID 1948 wrote to memory of 3020 1948 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 32 PID 3020 wrote to memory of 2584 3020 smss.exe 33 PID 3020 wrote to memory of 2584 3020 smss.exe 33 PID 3020 wrote to memory of 2584 3020 smss.exe 33 PID 3020 wrote to memory of 2584 3020 smss.exe 33 PID 3020 wrote to memory of 2696 3020 smss.exe 35 PID 3020 wrote to memory of 2696 3020 smss.exe 35 PID 3020 wrote to memory of 2696 3020 smss.exe 35 PID 3020 wrote to memory of 2696 3020 smss.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe"C:\Users\Admin\AppData\Local\Temp\b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:2012
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:1840
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:2584
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD57bc18297b556b81885a0e6744f2c1c15
SHA15ca704a2cab8e423256b2f420a69640f0f0e20ac
SHA256265b2064bd354f6897e01d41655c29b867ac5170a259ced9635c84c92e13e23a
SHA512ab99d0ab2a6d1de7bad522843cdb3404afba256db91967a7efeb433e381f2635fa0b21295aed140db2c738c66aadf786a0d819adc52ae2a1739134b55e39d74e