Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/06/2024, 01:30

General

  • Target

    b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe

  • Size

    138KB

  • MD5

    5d8d92fbda0b38017fd587d050d31b9d

  • SHA1

    85435615eed52c53accc0f4d421a0fef76de08f9

  • SHA256

    b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721

  • SHA512

    d6b1a3cee19d6d27f7aba480551b8203c1ffac88425ec4557c81aef7629aa974068af64005a9233bcb78c3364416b941edeb650049322b475ded800f654449cd

  • SSDEEP

    1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPY:r7YubEwYXRWhpAJUHhzm4hUukS6Kmecq

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe
    "C:\Users\Admin\AppData\Local\Temp\b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\sc.exe
      C:\Windows\system32\sc.exe stop SharedAccess
      2⤵
      • Launches sc.exe
      PID:2012
    • C:\Windows\SysWOW64\sc.exe
      C:\Windows\system32\sc.exe stop wscsvc
      2⤵
      • Launches sc.exe
      PID:1840
    • C:\Windows\SysWOW64\1230\smss.exe
      C:\Windows\system32\1230\smss.exe -d
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe stop SharedAccess
        3⤵
        • Launches sc.exe
        PID:2584
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe stop wscsvc
        3⤵
        • Launches sc.exe
        PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\1230\smss.exe

    Filesize

    138KB

    MD5

    7bc18297b556b81885a0e6744f2c1c15

    SHA1

    5ca704a2cab8e423256b2f420a69640f0f0e20ac

    SHA256

    265b2064bd354f6897e01d41655c29b867ac5170a259ced9635c84c92e13e23a

    SHA512

    ab99d0ab2a6d1de7bad522843cdb3404afba256db91967a7efeb433e381f2635fa0b21295aed140db2c738c66aadf786a0d819adc52ae2a1739134b55e39d74e