Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exe
Resource
win10v2004-20240226-en
General
-
Target
9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exe
-
Size
225KB
-
MD5
47f54d06e5c57d16c86d4288e762d75c
-
SHA1
dd8c8d497dcc76371c72edea24345472719cfccd
-
SHA256
9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf
-
SHA512
a786732ca3affd4b1dd7d6796693bbc0bd95616515a7284ba127895b9a51ce2805f162fc25cc9ec25eb43615149b74863e789204c6b249a5f5dc0691c1a515a3
-
SSDEEP
6144:FA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:FATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\53F70BBF = "C:\\Users\\Admin\\AppData\\Roaming\\53F70BBF\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
winver.exepid process 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe 2652 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
winver.exeExplorer.EXEpid process 2652 winver.exe 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exewinver.exedescription pid process target process PID 1704 wrote to memory of 2652 1704 9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exe winver.exe PID 1704 wrote to memory of 2652 1704 9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exe winver.exe PID 1704 wrote to memory of 2652 1704 9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exe winver.exe PID 1704 wrote to memory of 2652 1704 9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exe winver.exe PID 1704 wrote to memory of 2652 1704 9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exe winver.exe PID 2652 wrote to memory of 1192 2652 winver.exe Explorer.EXE PID 2652 wrote to memory of 1088 2652 winver.exe taskhost.exe PID 2652 wrote to memory of 1164 2652 winver.exe Dwm.exe PID 2652 wrote to memory of 1192 2652 winver.exe Explorer.EXE
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exe"C:\Users\Admin\AppData\Local\Temp\9a66b08b371ec0741b6fcd8ee1a582fd748d7953bfff5c7da55b5e5bae9d92cf.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1088-21-0x00000000020F0000-0x00000000020F6000-memory.dmpFilesize
24KB
-
memory/1088-11-0x00000000020F0000-0x00000000020F6000-memory.dmpFilesize
24KB
-
memory/1164-14-0x00000000001B0000-0x00000000001B6000-memory.dmpFilesize
24KB
-
memory/1164-23-0x00000000001B0000-0x00000000001B6000-memory.dmpFilesize
24KB
-
memory/1192-6-0x0000000002E90000-0x0000000002E96000-memory.dmpFilesize
24KB
-
memory/1192-17-0x0000000002F10000-0x0000000002F16000-memory.dmpFilesize
24KB
-
memory/1192-1-0x0000000002E90000-0x0000000002E96000-memory.dmpFilesize
24KB
-
memory/1192-3-0x0000000002E90000-0x0000000002E96000-memory.dmpFilesize
24KB
-
memory/1192-22-0x0000000002F10000-0x0000000002F16000-memory.dmpFilesize
24KB
-
memory/1704-8-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2652-20-0x0000000000260000-0x0000000000266000-memory.dmpFilesize
24KB
-
memory/2652-4-0x00000000000B0000-0x00000000000B6000-memory.dmpFilesize
24KB
-
memory/2652-25-0x0000000000260000-0x0000000000266000-memory.dmpFilesize
24KB