Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe
Resource
win7-20240221-en
General
-
Target
b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe
-
Size
138KB
-
MD5
5d8d92fbda0b38017fd587d050d31b9d
-
SHA1
85435615eed52c53accc0f4d421a0fef76de08f9
-
SHA256
b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721
-
SHA512
d6b1a3cee19d6d27f7aba480551b8203c1ffac88425ec4557c81aef7629aa974068af64005a9233bcb78c3364416b941edeb650049322b475ded800f654449cd
-
SSDEEP
1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPY:r7YubEwYXRWhpAJUHhzm4hUukS6Kmecq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2880 smss.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1230\smss.exe b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe File opened for modification C:\Windows\SysWOW64\1230\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\Service.exe smss.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4352 sc.exe 2816 sc.exe 3708 sc.exe 4160 sc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 8 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 2880 smss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 8 wrote to memory of 4352 8 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 81 PID 8 wrote to memory of 4352 8 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 81 PID 8 wrote to memory of 4352 8 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 81 PID 8 wrote to memory of 2816 8 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 83 PID 8 wrote to memory of 2816 8 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 83 PID 8 wrote to memory of 2816 8 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 83 PID 8 wrote to memory of 2880 8 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 85 PID 8 wrote to memory of 2880 8 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 85 PID 8 wrote to memory of 2880 8 b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe 85 PID 2880 wrote to memory of 3708 2880 smss.exe 86 PID 2880 wrote to memory of 3708 2880 smss.exe 86 PID 2880 wrote to memory of 3708 2880 smss.exe 86 PID 2880 wrote to memory of 4160 2880 smss.exe 88 PID 2880 wrote to memory of 4160 2880 smss.exe 88 PID 2880 wrote to memory of 4160 2880 smss.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe"C:\Users\Admin\AppData\Local\Temp\b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess2⤵
- Launches sc.exe
PID:4352
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc2⤵
- Launches sc.exe
PID:2816
-
-
C:\Windows\SysWOW64\1230\smss.exeC:\Windows\system32\1230\smss.exe -d2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop SharedAccess3⤵
- Launches sc.exe
PID:3708
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe stop wscsvc3⤵
- Launches sc.exe
PID:4160
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD54ed9e19c595791d3a4a91e4a8e0cd57c
SHA1814dc12ce4e6ee2702f03357f90cb8942c8e97f9
SHA256e1bcef9d57b1ace3025f184652cff10dbd9bd203524a57ff49da9d7fb173bff5
SHA512ddf70651ca6169273891be16e03a4cfab882c70d07cd6a85cf51bf50bbf3ad66c70df9a7bcf9f69f1a33bd916aec25fce4a3ea14186746cd01490058cb9702b5