Analysis

  • max time kernel
    51s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/06/2024, 01:30

General

  • Target

    b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe

  • Size

    138KB

  • MD5

    5d8d92fbda0b38017fd587d050d31b9d

  • SHA1

    85435615eed52c53accc0f4d421a0fef76de08f9

  • SHA256

    b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721

  • SHA512

    d6b1a3cee19d6d27f7aba480551b8203c1ffac88425ec4557c81aef7629aa974068af64005a9233bcb78c3364416b941edeb650049322b475ded800f654449cd

  • SSDEEP

    1536:rC2/fYuPfbESFYXRWhpKRycRd57JkIqFHhzm4hWru/BzihhMN45MF5FvHP132xPY:r7YubEwYXRWhpAJUHhzm4hUukS6Kmecq

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe
    "C:\Users\Admin\AppData\Local\Temp\b9f723a888dcbfe931bdc979e6f9b6b7c26cfac1909e7a9a1a02c358421dd721.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:8
    • C:\Windows\SysWOW64\sc.exe
      C:\Windows\system32\sc.exe stop SharedAccess
      2⤵
      • Launches sc.exe
      PID:4352
    • C:\Windows\SysWOW64\sc.exe
      C:\Windows\system32\sc.exe stop wscsvc
      2⤵
      • Launches sc.exe
      PID:2816
    • C:\Windows\SysWOW64\1230\smss.exe
      C:\Windows\system32\1230\smss.exe -d
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe stop SharedAccess
        3⤵
        • Launches sc.exe
        PID:3708
      • C:\Windows\SysWOW64\sc.exe
        C:\Windows\system32\sc.exe stop wscsvc
        3⤵
        • Launches sc.exe
        PID:4160

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\1230\smss.exe

          Filesize

          138KB

          MD5

          4ed9e19c595791d3a4a91e4a8e0cd57c

          SHA1

          814dc12ce4e6ee2702f03357f90cb8942c8e97f9

          SHA256

          e1bcef9d57b1ace3025f184652cff10dbd9bd203524a57ff49da9d7fb173bff5

          SHA512

          ddf70651ca6169273891be16e03a4cfab882c70d07cd6a85cf51bf50bbf3ad66c70df9a7bcf9f69f1a33bd916aec25fce4a3ea14186746cd01490058cb9702b5